tools (e.g. Splunk, New Relic) that provide operational insight into the health of live applications and systems. Experience in applying a range of cloud security tools and techniques (e.g. threatmodelling, vulnerability scanning, dependency checking, reducing attack surface area), ideally incorporating these tools and techniques into automated pipelines. The desire to upskill and enable product engineering squads to More ❯
professional services context. Understand technology trends, cyber threats, and industry issues. Excellent written and oral communication, report writing and presentation skills. Experience of executing security testing techniques such as threatmodelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black box testing). What we More ❯
assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration testing, threatmodelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our Cyber Security services across our broad More ❯
applying security technologies to architectures and solution designs, such as Privilege Access Management, SSO, IDAM, Network security and encryption Understanding of IT infrastructure, technical concepts, and design methodologies Understand threatmodelling and development of reference architecture Ability to learn and adapt quickly Preferred hands on experience in Network and/or Cloud security Ideally hold SABSA/TOGAF More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security … tools used in the SOC. Collaborate with other teams to enhance threat intelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering, security operations and incident response activities. … You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threat intelligence teams, and develop new detection algorithms. About the team AWS-SOC Team manages security issues across the globe. A security engineer within the team is responsible for maintaining physical and logical security for customers. Diverse More ❯
and analyze security alerts from various sources to detect and respond to potential threats in real-time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensic analysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security … tools used in the SOC. - Collaborate with other teams to enhance threat intelligence, improve incident response procedures, and provide regular reports on security posture. A day in the life As a Security Engineer in Detections, your day revolves around safeguarding our digital assets. This position supports other AWS Security Engineers with security engineering, security operations and incident response activities. … You will be responsible for coordinating and facilitating security response activities, fine-tuning detection rules. You'll investigate potential incidents, collaborate with threat intelligence teams, and develop new detection algorithms. About the team Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description, we encourage More ❯
data security. You will maintain watchTowr's alignment to numerous industry standards, including ISO27001 and SOC2 Type 2, while going steps further where relevant due to watchTowr's unique threat model. You will oversee security monitoring, threat analysis, threat hunting, penetration testing, and vulnerability management to align cyber risk management with the company's risk strategy. You More ❯
team spend their time on the highest-value tasks. Join the stores AppSec organization to work hard, have fun, and make history! Key job responsibilities Creating, updating, and maintaining threat models for a wide variety of software projects. Manual and Automated Secure Code Review, primarily in Java, Python and Javascript. Development of security automation tools. Adversarial security analysis using … QUALIFICATIONS BS in Computer Science or equivalent qualification or extensive years of demonstrated experience in areas such as application security, offensive security and/or systems security. Understanding of threat modeling, manual source code review, security vulnerabilities, attacker exploit techniques, and methods for their remediation. Excellent written and verbal communication skills with the ability to adapt messaging to executive More ❯
other security product like Trivy Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
security product like Trivy preferred Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at all stages of Product delivery More ❯
partner closely with product teams to make sure that our users can safely and confidently engage with the onchain world. What you'll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated Threat Intelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space-based threats, SATCOM systems, and evolving strategic risks in the defence … Time) Clearance: DV Cleared (UK Nationals only) Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threat intelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You'll work closely with military stakeholders … intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of requirements (Golden Thread) across all levels of the programme. Lead Threat Forums and stakeholder engagement workshops More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Connexa
A public sector digital transformation consultancy is seeking a highly capable and motivated Threat Intelligence Manager to play a critical role in a high-profile, strategically vital defence space programme. This role is ideal for a candidate with experience in MOD environments, with a firm grasp of space-based threats, SATCOM systems, and evolving strategic risks in the defence … Time) Clearance: DV Cleared (UK Nationals only) Salary/Rate: Competitive, depending on experience As a key part of our systems engineering team, you'll be responsible for maintaining threat coherence across programme layers, managing threat intelligence inputs, and ensuring requirements remain traceable and integrated from URD through to system delivery. You'll work closely with military stakeholders … intelligence SMEs, and engineering teams to provide clarity, direction, and foresight on emerging threat landscapes. Key Responsibilities Maintain and evolve the programme Threat Annex to reflect current and emerging space-based threats (including SATCOM vulnerabilities). Drive coherence and traceability of requirements (Golden Thread) across all levels of the programme. Lead Threat Forums and stakeholder engagement workshops More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯
in securing complex, cloud-first environments within a data-rich, high-scale business — helping protect critical infrastructure and client data across global platforms. What You’ll Be Doing Leading threat detection and incident response across GCP environments Building and refining cloud-native detections using Kusto Query Language (KQL) Driving security automation and Infrastructure-as-Code practices Enhancing cloud visibility … through effective logging, monitoring, and threatmodelling Collaborating with SOC analysts, engineers, and data teams to secure workloads and services Performing proactive threat hunts and maturing detection logic over time Key skills and experience include: Cloud security expertise in Google Cloud Platform Hands-on experience with cloud-native tools (e.g., Defender for Cloud, GCP Security Command Center … Detection engineering using KQL, particularly with Microsoft Sentinel Familiarity with Kubernetes, Docker, and securing containerised services Understanding of Zero Trust Architecture, MITRE ATT&CK, and cloud threat models Experience with SOAR platforms and automation pipelines Scripting or programming skills (Python, PowerShell, Bash, etc.) Interviews are moving fast — apply now or reach out to learn more. More ❯
connected hardware products. You will work closely with firmware, hardware, and cloud teams to ensure our devices are secure by design and resilient to emerging threats. Job Responsibilities Conduct threatmodelling and risk assessments for IoT devices, firmware, and communication protocols. Design and implement secure boot, secure firmware updates (OTA), and hardware-level security controls (e.g., TPM, secure … elements). Perform firmware and embedded software security assessments. Collaborate with hardware and embedded teams on secure product architecture. Monitor evolving IoT threat landscapes and update security policies accordingly. Contribute to internal security standards and assist in compliance with industry benchmarks (e.g., ETSI EN , NIST IR 8259). Work with the AppSec and Cloud Security teams to ensure end … end system security. Qualifications 4+ years of experience in IoT, embedded, or hardware security. Deep knowledge of embedded systems, firmware development, and relevant communication protocols. Experience with common IoT threat vectors and mitigations. Familiarity with secure coding practices in C/C++ or any other language and embedded environments. Hands-on experience with hardware debugging tools (e.g., JTAG, logic More ❯
connected hardware products. You will work closely with firmware, hardware, and cloud teams to ensure our devices are secure by design and resilient to emerging threats. Job Responsibilities Conduct threatmodelling and risk assessments for IoT devices, firmware, and communication protocols. Design and implement secure boot, secure firmware updates (OTA), and hardware-level security controls (e.g., TPM, secure … elements). Perform firmware and embedded software security assessments. Collaborate with hardware and embedded teams on secure product architecture. Monitor evolving IoT threat landscapes and update security policies accordingly. Contribute to internal security standards and assist in compliance with industry benchmarks (e.g., ETSI EN , NIST IR 8259). Work with the AppSec and Cloud Security teams to ensure end … end system security. Qualifications 4+ years of experience in IoT, embedded, or hardware security. Deep knowledge of embedded systems, firmware development, and relevant communication protocols. Experience with common IoT threat vectors and mitigations. Familiarity with secure coding practices in C/C++ or any other language and embedded environments. Hands-on experience with hardware debugging tools (e.g., JTAG, logic More ❯
drive awareness of security from the earliest stages of design through to deployment. You'll help integrate automated security tooling and checks into our CI/CD pipelines, facilitate threatmodelling sessions, and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and … in CI/CD Hands-on experience with security tools like SAST, DAST, and SCA Familiar with cloud environments (especially AWS), containers, and microservices Comfortable reviewing technical designs, performing threatmodelling, and advising on secure architecture Strong communicator who collaborates well with engineers and promotes secure-by-default practices We might not be right for you if: You More ❯
Responsibilities Conduct assessments of projects and third-party vendors to ensure cybersecurity standards are met Stay updated on cyber threats and develop strategies to mitigate risks Lead and define threatmodelling activities of systems and applications Conduct regular training sessions and awareness programs for development teams Continuously evaluate and improve existing security measures Ensure ongoing compliance with legal More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
to high profile clients across all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threatmodelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our career More ❯
alerting systems for the respective platform to facilitate effective incident management. Tool Development: Build tools aligned with the relevant framework and strategy to support the platform. Security and Compliance: Threatmodelling and risk assessments. Continuous Improvement: Leverage test automation to minimize system downtime and improve uptime metrics by proactively monitoring and resolving issues. CI/CD: Write and More ❯
alerting systems for the respective platform to facilitate effective incident management. Tool Development: Build tools aligned with the relevant framework and strategy to support the platform. Security and Compliance: Threatmodelling and risk assessments. Continuous Improvement: Leverage test automation to minimize system downtime and improve uptime metrics by proactively monitoring and resolving issues. CI/CD: Write and More ❯
and support in certification journey; Support our sales with your technical expertise; You will work on gap assessments or risk assessments based on IEC62443, IT/OT site assessments, Threat Modeling, NIS compliance checks and Security Maturity Assessments . All these services are designed to support our customers to identify risks and improve their security resilience, no matter their … networks and industrial devices like PLCs, DCS, Safety systems, and SCADA; Experience with industrial communication protocols , like Modbus, IEC104, and vendor-specific protocols; Experience with conducting risk assessments and threat modelings ; Strong ability to communicate technical concepts and assessment results verbally and in written reports in simple terms; Knowledge of IEC 62443, MITRE ATT&CK for ICS, NIST CSF More ❯
Technical Support/Pre-sales role Sharp troubleshooting and problem-solving skills Strong and up to date technical understanding of Microsoft technologies Expertise in data security, risk analysis and threat models in the information security space Experience with installation and configuration of a variety of security products Experience with virtual desktop environments, preferably in both VMWare and Citrix High More ❯