principles. Collaborate with external security partners to conduct penetration testing and manage results—removing false positives and translating validated findings into actionable improvements for engineering teams. Conduct and lead threat modeling activities to identify real-world attack vectors and apply pragmatic controls that reduce risk. Support incident response efforts, assist in the development of remediation plans, deploy fixes, and More ❯
principles. Collaborate with external security partners to conduct penetration testing and manage results—removing false positives and translating validated findings into actionable improvements for engineering teams. Conduct and lead threat modeling activities to identify real-world attack vectors and apply pragmatic controls that reduce risk. Support incident response efforts, assist in the development of remediation plans, deploy fixes, and More ❯
and delivering security architecture across hybrid, cloud, and on-premises environments. Navigating complex technical ecosystems that span operational tech, cloud, and on-premise systems. Producing high-quality deliverables, from threat models and risk assessments to secure architecture blueprints. Collaborating with cross-functional teams and clients, translating technical detail into business language. Partnering with client teams, project managers, and technical More ❯
technology and digital transformation organisation delivering critical projects across energy, water, renewables, and manufacturing. The Senior ICS OT Cyber Security Engineer will secure and optimise industrial control systems, conduct threat assessments, penetration testing, and design technical solutions to mitigate cyber risks. The role involves mentoring junior engineers, collaborating with stakeholders, with occasional travel to client sites and the Stone … office. Key Responsibilities of the Senior ICS OT Cyber Security Engineer: Design and secure OT/ICS networks and cross-domain communications. Conduct threatmodelling, vulnerability assessments, and red team exercises. Implement cybersecurity solutions, audit systems, and ensure compliance with relevant frameworks. Mentor junior team members and support project delivery. Maintain strong client and stakeholder relationships. Key Requirements More ❯
our Operational Technology team. You'll work on live and upcoming projects across critical infrastructure sectors including energy, water, renewables, and manufacturing-designing secure OT networks and leading advanced threat mitigation strategies. What You'll Do: Design and secure OT networks across regulated industries Lead threatmodelling, penetration testing, and red teaming in ICS environments Engineer security More ❯
our Operational Technology team. You'll work on live and upcoming projects across critical infrastructure sectors including energy, water, renewables, and manufacturing-designing secure OT networks and leading advanced threat mitigation strategies. What You'll Do: Design and secure OT networks across regulated industries Lead threatmodelling, penetration testing, and red teaming in ICS environments Engineer security More ❯
you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threatmodelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage physical security (access control etc) What experience do you need? 2+ years experience More ❯
you be doing? Manage security controls across on prem and AWS environments. Lead incident response, vulnerability assessments and pentest co-ordination. Manage IAM systems and support Engineering teams with threatmodelling and secure development practices. Own ISO27001, Cyber Essentials+, PCI-DSS and GDPR compliance. Manage physical security (access control etc) What experience do you need? 2+ years experience More ❯
secure software at speed. What You'll Lead & Deliver Embed security into the SDLC from architecture through production Automate guardrails and integrate security tooling into CI/CD Drive threatmodelling + security design reviews for new features Create internal security tools, libraries, and developer workflows Mentor engineers and uplift security engineering craft Partner with product & platform teams More ❯
secure software at speed. 🧠 What You’ll Lead & Deliver Embed security into the SDLC from architecture through production Automate guardrails and integrate security tooling into CI/CD Drive threatmodelling + security design reviews for new features Create internal security tools, libraries, and developer workflows Mentor engineers and uplift security engineering craft Partner with product & platform teams More ❯
secure software at speed. 🧠 What You’ll Lead & Deliver Embed security into the SDLC from architecture through production Automate guardrails and integrate security tooling into CI/CD Drive threatmodelling + security design reviews for new features Create internal security tools, libraries, and developer workflows Mentor engineers and uplift security engineering craft Partner with product & platform teams More ❯
london (city of london), south east england, united kingdom
Atarus
secure software at speed. 🧠 What You’ll Lead & Deliver Embed security into the SDLC from architecture through production Automate guardrails and integrate security tooling into CI/CD Drive threatmodelling + security design reviews for new features Create internal security tools, libraries, and developer workflows Mentor engineers and uplift security engineering craft Partner with product & platform teams More ❯
Docker. Embedding security into CI/CD pipelines (Jenkins, GitHub Actions, CodePipeline) through SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threatmodelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing More ❯
london, south east england, united kingdom Hybrid / WFH Options
Immersum
Docker. Embedding security into CI/CD pipelines (Jenkins, GitHub Actions, CodePipeline) through SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threatmodelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Immersum
Docker. Embedding security into CI/CD pipelines (Jenkins, GitHub Actions, CodePipeline) through SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threatmodelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Immersum
Docker. Embedding security into CI/CD pipelines (Jenkins, GitHub Actions, CodePipeline) through SAST/DAST and dependency scanning. Collaborating with developers and product teams to promote DevSecOps practices, threatmodelling and secure coding. Conducting security assessments, monitoring for vulnerabilities and leading remediation efforts. Operating and extending monitoring, logging and alerting systems for both performance and security. Managing More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
solutions that meet client requirements and implement the appropriate tools, technologies & processes to mitigate critical security risks (e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). You'll conduct comprehensive attack path analysis and threatmodelling, mapping adversary tactics and techniques to industrial … You'll lead and execute advanced penetration testing, red teaming, and adversary simulation exercises within OT/ICS environments, leveraging frameworks such as MITRE ATT&CK for ICS and modelling using Bow-Tie Analysis to proactively identify and exploit vulnerabilities. You'll conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of More ❯
of a solution with a Government customer. In order to be successful, you will have the following experience: Extensive consulting background, ideally within Cyber Security settings Strong understanding of threat assessment, incident response and security governance frameworks Exceptional communication skills, able to manage customer engagement and work with technology/development teams CISSP, CISM or CPP certifications would be … Clearance is essential Within this role, you will be responsible for: Manage the delivery and deployment of a solution on premises for a Government customer Provide expert risk analysis, threatmodelling, and mitigation planning for mission-critical systems and environments. Design, implement, and optimise integrated security frameworks combining cyber, physical, and information assurance disciplines. Advise C-suite and More ❯
of a solution with a Government customer. In order to be successful, you will have the following experience: Extensive consulting background, ideally within Cyber Security settings Strong understanding of threat assessment, incident response and security governance frameworks Exceptional communication skills, able to manage customer engagement and work with technology/development teams CISSP, CISM or CPP certifications would be … Clearance is essential Within this role, you will be responsible for: Manage the delivery and deployment of a solution on premises for a Government customer Provide expert risk analysis, threatmodelling, and mitigation planning for mission-critical systems and environments. Design, implement, and optimise integrated security frameworks combining cyber, physical, and information assurance disciplines. Advise C-suite and More ❯
london (city of london), south east england, united kingdom
Experis UK
of a solution with a Government customer. In order to be successful, you will have the following experience: Extensive consulting background, ideally within Cyber Security settings Strong understanding of threat assessment, incident response and security governance frameworks Exceptional communication skills, able to manage customer engagement and work with technology/development teams CISSP, CISM or CPP certifications would be … Clearance is essential Within this role, you will be responsible for: Manage the delivery and deployment of a solution on premises for a Government customer Provide expert risk analysis, threatmodelling, and mitigation planning for mission-critical systems and environments. Design, implement, and optimise integrated security frameworks combining cyber, physical, and information assurance disciplines. Advise C-suite and More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and networks, ensuring alignment with business goals and compliance requirements. Develop and implement security policies, standards, and reference architectures following best practices and regulatory frameworks. Conduct risk assessments and threatmodelling to identify vulnerabilities and define effective mitigation strategies. Advise on the secure integration of new technologies, including cloud services, IAM solutions, and network security enhancements. Provide architectural More ❯
finaghy, antrim, united kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and networks, ensuring alignment with business goals and compliance requirements. Develop and implement security policies, standards, and reference architectures following best practices and regulatory frameworks. Conduct risk assessments and threatmodelling to identify vulnerabilities and define effective mitigation strategies. Advise on the secure integration of new technologies, including cloud services, IAM solutions, and network security enhancements. Provide architectural More ❯
newtownabbey, antrim, united kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and networks, ensuring alignment with business goals and compliance requirements. Develop and implement security policies, standards, and reference architectures following best practices and regulatory frameworks. Conduct risk assessments and threatmodelling to identify vulnerabilities and define effective mitigation strategies. Advise on the secure integration of new technologies, including cloud services, IAM solutions, and network security enhancements. Provide architectural More ❯
set in AWS, with the ability to collaborate and work with wider departments and senior stakeholders to translate technical security concepts into their language. Responsibilities Perform hands-on security threatmodelling of new technology and applications, ensuring everything is secure and in-line with in-house security standards/infrastructure – integrating with SAST with IAC. Work closely with More ❯
set in AWS, with the ability to collaborate and work with wider departments and senior stakeholders to translate technical security concepts into their language. Responsibilities Perform hands-on security threatmodelling of new technology and applications, ensuring everything is secure and in-line with in-house security standards/infrastructure - integrating with SAST with IAC. Work closely with More ❯