is critical, as is a high level of ownership and accountability. Key Job Responsibilities Your work will include: Application security reviews Secure architecture design Threat modeling Projects and research work as needed Security training and outreach to internal development teams Security guidance documentation Security metrics delivery and improvements Assistance … language 5+ years of experience in a similar role PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ More ❯
is critical, as is a high level of ownership and accountability. Key job responsibilities Your work will include: Application security reviews Secure architecture design Threat modeling Projects and research work as needed Security training and outreach to internal development teams Security guidance documentation Security metrics delivery and improvements Assistance … language - 5+ years of experience in a similar role PREFERRED QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act as the escalation point for Security Operations, driving swift … assets. Manage and fine-tune security tools to ensure optimal performance and coverage. Provide expert-level, second-line support to Security Operations for complex threat scenarios. Conduct thorough threat modeling and risk assessments to uncover vulnerabilities and drive proactive defenses. Oversee the relationship with our Managed Detection & Response … MDR) partner to ensure top-tier threat detection and response. Drive execution of the security roadmap, aligning with evolving business goals and threat landscapes. Partner with cross-functional teams to promote security best practices and embed security into daily operations. Requirements: 5+ years of hands-on experience in More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act as the escalation point for Security Operations, driving swift … assets. Manage and fine-tune security tools to ensure optimal performance and coverage. Provide expert-level, second-line support to Security Operations for complex threat scenarios. Conduct thorough threat modeling and risk assessments to uncover vulnerabilities and drive proactive defenses. Oversee the relationship with our Managed Detection & Response … MDR) partner to ensure top-tier threat detection and response. Drive execution of the security roadmap, aligning with evolving business goals and threat landscapes. Partner with cross-functional teams to promote security best practices and embed security into daily operations. Requirements: 5+ years of hands-on experience in More ❯
If you enjoy diving deep into attacker behaviors, writing detection rules that actually catch things (not just flag every login attempt), and helping drive threat visibility across modern tech stacks — this might be for you! You'll be part of a global cyber defence team building and refining detections … across SIEM, EDR, and ELK stacks , and collaborating with security analysts, threat hunters, and incident responders to stop threats faster and smarter. 🔧 What You'll Be Doing Writing & tuning detection rules across SIEM/EDR/ELK to surface real attacker behaviors (not noise) Analyzing TTPs, threat intel … attacker methodology Solid experience with ELK, Splunk, or similar SIEM platforms Comfort pivoting through logs under pressure and building fast, accurate queries Experience with threat modeling and mapping detections to MITRE ATT&CK Bonus: You've worked with version control for detection rules, or done some detection-as-code More ❯
System Security Assessment (Hardware + Firmware): Lead architecture-level security assessments and risk analyses across SoC and low-level firmware components. Conduct in-depth threat modeling of boot flows, firmware, memory protection mechanisms, and secure execution environments. Detailed attack-modelling and review security features across firmware interfaces. Firmware … the intersection of hardware and firmware. Deep experience in areas such as secure boot, key provisioning, firmware mitigations, and hardware-enforced isolation. Understanding of threat models including firmware exploitation, privilege-escalation, code injection, and side-channel attacks. Solid grasp of Arm TrustZone, secure world monitor designs, memory and IO More ❯
Cloud (ADC) roles engage with customers requiring specialized security solutions for their cloud services. The ReSec Red Team participates in security research, penetration testing, threat modeling, and design. We are seeking a Senior Security Engineer with a focus on database security to ensure our services and applications adhere to … AWS or similar cloud platforms. Knowledge of full-stack Linux/Unix architectures. Working knowledge of C/C++. Experience managing security incidents and threat response. Additional qualities include a passion for security research, participation in security competitions or bug bounty programs, domain expertise in security architecture, communication security More ❯
and operations penetration testing. You will be responsible for automating repetitive tasks. You will be responsible for influencing Amazon services through the creation of threat mitigation plans. You will work directly with internal teams to solve challenging software problems. You must produce results in the face of ambiguity and … recurring and holistic testing of a critical group of our production services. Ensure remediation of risks by partnering with service teams. Perform design review, threat modeling, security review, penetration testing, and red teaming on production systems for our services. Scope and perform penetration testing & vulnerability research of complex proprietary More ❯
will be responsible for analyzing the security of applications and services, discovering and addressing security issues, building security automation, and quickly reacting to new threat scenarios. Key job responsibilities: Application security reviews Mobile security reviews Secure architecture design Threat modeling Projects and research work as needed Security training … Python, Java, C++ Expert knowledge of network security in the cloud 5+ years of experience in application security with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. More ❯
Join Our Team as a Product Support Engineer at Iriusrisk! IriusRisk is the world's leading automated threat modeling tool. Born out of a desire to advance threat modeling as an activity and ensure that software is secure from the design stage. IriusRisk helps the largest banks and … excellent service. Collaboration: Work with Engineering and Customer Success to provide timely solutions and workarounds. Technical Knowledge: Gain deep technical understanding of IriusRisk and threat modeling concepts. Knowledge Base Contributions: Create and maintain technical documentation, troubleshooting guides, and knowledge base articles. Documentation: Keep thorough records of customer interactions, troubleshooting … improvement suggestions. What we offer 100% remote working. Excellent working environment. Work in a highly qualified professional team with world-class references in the Threat modeling sector. Real career development opportunities within the company. We focus on the 'Do it well' culture and are not afraid to invest in More ❯
Mandatory Skills : Working experience with driving design decisions using Threat Modeling (STRIDE/MITRE ATT&CK) Practical experience in hardening GCP Services Practical experience with a CNAPP/CSPM tool Experience with formal documentation of cloud controls (Threat Model Reports, Policy Summary Pages More ❯
Mandatory Skills : Working experience with driving design decisions using Threat Modeling (STRIDE/MITRE ATT&CK) Practical experience in hardening GCP Services Practical experience with a CNAPP/CSPM tool Experience with formal documentation of cloud controls (Threat Model Reports, Policy Summary Pages More ❯
Response Informatics is hiring for GCP Lead Security Role : GCP Lead Security Location : London, United kingdom Required: 1.Working experience with driving design decisions using Threat Modeling (STRIDE/MITRE ATT&CK) 2.Practical experience in hardening GCP Services 3.Practical experience with a CNAPP/CSPM tool 4. Experience with formal … documentation of cloud controls (Threat Model Reports, Policy Summary Pages) NOTE: SPONSORSHIP WILL BE PROVIDED AND CANDIDATE FROM INDIA ALSO WILL BE CONSIDERED If you’re interested and you have above experience, please share your updated CV to Srinivas.p@responseinformatics.com More ❯
Response Informatics is hiring for GCP Lead Security Role : GCP Lead Security Location : London, United kingdom Required: 1.Working experience with driving design decisions using Threat Modeling (STRIDE/MITRE ATT&CK) 2.Practical experience in hardening GCP Services 3.Practical experience with a CNAPP/CSPM tool 4. Experience with formal … documentation of cloud controls (Threat Model Reports, Policy Summary Pages) NOTE: SPONSORSHIP WILL BE PROVIDED AND CANDIDATE FROM INDIA ALSO WILL BE CONSIDERED If you’re interested and you have above experience, please share your updated CV to Srinivas.p@responseinformatics.com More ❯