76 to 86 of 86 Threat Modelling Jobs in the UK

Principal Secure by Design Consultant - SBD

Hiring Organisation
Resourcing Group
Location
Bradley Stoke, Gloucestershire, UK
Employment Type
Full-time
Role: Lead each project and programme with Secure by Design Identify security risks, constraints, and dependencies, and translate these into clear, prioritised recommendations. Facilitate threat modelling and risk workshops with multidisciplinary teams. Define pragmatic security control expectations aligned to service risk and context. Produce concise written outputs that ...

Cryptographer

Hiring Organisation
microTECH Global LTD
Location
England, United Kingdom
requirements set by the government agencies. The security assessment task includes testing applications in line with well-known industry standards including: OWASP MASVS testing, threat modelling, tool relating to data flow analysis within the device and to the network; static and dynamic testing using tools such as MobSF ...

Senior Applied Cryptographer

Hiring Organisation
Teranode Group
Location
England, United Kingdom
cryptography and blockchain and actively shares knowledge with the team. Analytical and problem‐solving skills with a rigorous approach to security trade-offs and threat modeling. High sense of ownership, accountability, and integrity when working on mission‐critical security components that protect user assets and sensitive data. ...

Cyber Product Owner

Location
London, United Kingdom
cyber initiatives Engage with stakeholders to understand operational pain points and continuously improve authentication and authorisation journeys Develop and maintain an up to date threat model and risk view of the IAM landscape What you ll bring to British Airways Strong hands on experience with enterprise IAM tooling ...

Senior Security Engineer

Hiring Organisation
Develop
Location
London, United Kingdom
Employment Type
Permanent
Salary
£80,000
runbooks. Conduct technical assessments across identity, endpoint, cloud posture, logging, and security operations. Develop, optimise, and tune KQL queries for detection engineering and threat hunting. Review and enhance security configurations across cloud and SIEM/SOAR platforms. Manage engagements through architecture, deployment, tuning, documentation, and customer enablement. Identify security … gaps and recommend improvements across logging, identity, endpoint hardening, cloud posture, and threat detection. Platform & Engineering Understand how endpoints, servers, domain controllers, and cloud workloads operate, and how security controls integrate with them. Support remediation of misconfigurations and optimisation of security deployments. Leverage scripting, APIs, and automation to streamline ...

Network Product Owner

Hiring Organisation
Experis
Location
Manchester, United Kingdom
Employment Type
Contract
Contract Rate
£580 - £630/day
management integration, micro-segmentation strategies, and continuous verification principles. Skilled in managing network security product backlog prioritized based on risk assessment, business value, and threat landscape, with deep collaboration with security operations, infrastructure, and compliance teams. Strong understanding of API-level integration between security platforms and orchestration systems. Previous … principles, Software[1]Defined Perimeter (SDP), identity-aware proxy architectures, 802.1X authentication, certificate-based authentication, policy-based access control, stateful/stateless firewall technologies, threat intelligence integration, and network segmentation strategies. Expertise in security policy modelling, documentation of end-to-end security workflow specifications (e.g., threat models ...

Network Product Owner

Hiring Organisation
CBSbutler Holdings Limited trading as CBSbutler
Location
Manchester, United Kingdom
Employment Type
Contract
Contract Rate
£550 - £597/day
regulatory requirements. You will work closely with security operations, infrastructure, architecture, and compliance teams to prioritise delivery based on risk, business value, and evolving threat landscapes. Key Responsibilities Product Strategy & Vision Define and communicate a clear network security product vision aligned with Zero Trust architecture, governance frameworks, and regulatory … Access Control (NAC) Next-Generation Firewalls (NGFW) IDS/IPS platforms SIEM integrations Support deployments across physical, virtual, and cloud environments. Document security architectures, threat models, control frameworks, and policy workflows aligned to industry standards. Required Technical Expertise Strong understanding of network security fundamentals and Zero Trust architectures. Experience ...

Product Delivery Manager

Hiring Organisation
LHH
Location
England, United Kingdom
Engineering (MBSE) (SysML/UML, Cameo, DOORS NG integration, model governance) System of Systems/Architecture (UAF/DoDAF, mission threads, capability and operational modelling, interface governance) Software Factory/Digital Software Delivery (CI/CD, DevSecOps toolchains, software lifecycle environments, evidence generation) Safety Engineering (Digital Safety) (Hazard analysis … safety cases, model-based safety, certification evidence) Product Security/Cyber Engineering (Threat & risk modelling, SBOM, vulnerability management, security assurance) Processes & Integration (Engineering governance, standards, tool interoperability, digital thread integration) Each role has a clearly defined scope — you are not expected to cover all areas . Key Responsibilities ...

Embedded Software Engineer

Hiring Organisation
McNally Recruitment Ltd
Location
Glasgow City, Scotland, United Kingdom
ensuring the secure design and implementation of embedded firmware and software components within our product portfolio. This role involves applying secure coding practices, performing threat modeling, and ensuring compliance with industry standards and internal processes. The ideal candidate will have a strong background in embedded systems development … days in the Scottish office , therefore you should currently be located in Scotland. PRINCIPLE JOB RESPONSIBILITIES Perform security requirements analysis Conduct risk analysis and threat modeling Ensure secure design principles are applied, such as least privilege, defence in depth, and secure defaults Ensure secure implementation of requirements and threat ...

AI Security Consultant

Hiring Organisation
Sanderson Government and Defence
Location
London, United Kingdom
Employment Type
Contract
Contract Rate
£525 - £550 per day
support Central Government on a high-profile contract. This role is ideal for someone with deep expertise in AI security, risk management, and threat mitigation, particularly in government or highly regulated environments. The Role You will play a critical role in ensuring AI systems are secure, compliant, and resilient … with Secure by Design principles Defining and implementing AI governance, risk management, and mitigation strategies, following GDS (Government Digital Service) and NIST frameworks Conducting threat modeling, vulnerability assessments, and security audits for AI systems Advising stakeholders on secure AI development practices, prompt engineering, and safe AI agent deployment Supporting ...

Cyber Security Consultant – UK (Hybrid)

Hiring Organisation
KBC Technologies UK LTD
Location
Manchester, Lancashire, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
projects and ensuring a secure environment for the organisation and its customers. Key Responsibilities: Apply Agile methodologies to deliver multiple security initiatives simultaneously. Perform threat modeling , identify vulnerabilities, and assess risks in technical solutions. Support safe architectural decisions and design secure solutions with clear controls. Define security testing requirements … knowledge of cybersecurity domains : endpoint, network, cryptography, IAM. Exposure to modern enterprise technologies , including Cloud and AI. Experience with RESTful APIs, containerized microservices, and threat modeling frameworks (e.g., STRIDE, MITRE ATT&CK). Dynamic, solution-oriented, and able to work under pressure. Desirable: Awareness of industry security standards ...