london, south east england, United Kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerability management programme, conducting threat … business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication and More ❯
one of the following areas: IP networking & OT On-premises architecture and Virtualization Cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system. Provision of authoritative specialist security advice in: Risk and threat-based mitigation to system designs. Control frameworks such as NIST, ISO, CIS. Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
one of the following areas: IP networking & OT On-premises architecture and Virtualization cloud platforms and Containerization Databases and LLMs Mobile Technologies & Application security Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements. Managing security requirements through the delivery and operational life … cycle of a system Provision of authoritative specialist security advice in Risk and threat-based mitigation to system designs Control frameworks such as NIST, ISO, CIS Protective monitoring, Authentication and authorization best practices. Develop excellent working relationships with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing More ❯
optimize scalable, secure, and compliant software solutions for medical devices and connected health applications. Ensure adherence to IEC 62304, FDA, and cybersecurity regulations, addressing threat modeling, secure coding practices, and risk management. Work with cross-functional teams to architect cloud solutions, ensuring performance, scalability, security, and compliance. Implement cloud … Compliance Ensure secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing More ❯
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents, alerts, and the implementation of security technologies. Conduct threat hunting, develop threat models, identify threat vectors, and create use cases for effective security monitoring. What do you need to thrive in More ❯
as a part of the broader KLA AI Security program. The ideal candidate will be able to demonstrate a breadth of knowledge across cybersecurity, threat intelligence, and artificial intelligence. Responsibilities: Conduct in-depth technical assessments of AI systems to identify security risks. Develop threat models for AI systems … mitigation strategies for identified risks, and coordinate with business partners to deploy countermeasures to reduce risk to systems and applications. Partner with the cyber threat intelligence team to research and remain current on threats and vulnerabilities to proactively find opportunities to amend our AI security strategy. Leverage research, industry More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intaso
Build OT-specific detection and response capabilities, including custom playbooks. Technology Implementation Oversee global deployment of SIEM (e.g., Splunk, Graylog, Wazuh), SOAR, EDR, and Threat Intel platforms. Vendor & Team Management Act as the primary contact for the outsourced SOC provider; manage SLAs and vendor performance. Build and mentor internal … Technical expertise with SIEM, SOAR, EDR, and OT protocols Familiar with SCADA/ICS environments and MITRE ATT&CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g., GCFA, GNFA), or … OT certs (e.g., GICSP, ISA/IEC 62443). Familiarity with cloud security tools, IT/OT integration, and threat modeling. More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT and networking concepts. Confident writing SIEM queries and performing threat-hunting. Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports … clients. Assisting with training and support for our junior analysts. Proactively suggesting improvements for existing SIEM alarms and developing new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real-time visibility for clients and stakeholders. Onboarding new clients, including More ❯
and implement comprehensive security strategies for Payments System Upgrades. Conduct thorough risk assessments to identify potential security threats and develop mitigation strategies. Create comprehensive threat models aligning with MITRE ATTACK/STRIDE frameworks. Recommend the best controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and … would be within a financially regulated enterprise (e.g., PCI compliance). Proven experience working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITRE ATTACK & STRIDE. Proficiency in assessing the Identity & Access Management functions & associated risks during Acquisition process. Be able to understand More ❯
swindon, wiltshire, south west england, United Kingdom
Tata Consultancy Services
and implement comprehensive security strategies for Payments System Upgrades. Conduct thorough risk assessments to identify potential security threats and develop mitigation strategies. Create comprehensive threat models aligning with MITRE ATTACK/STRIDE frameworks. Recommend the best controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and … would be within a financially regulated enterprise (e.g., PCI compliance). Proven experience working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITRE ATTACK & STRIDE. Proficiency in assessing the Identity & Access Management functions & associated risks during Acquisition process. Be able to understand More ❯
About the role Do you want to be at the forefront of cyber security, protecting people, data and systems from the evolving digital threat landscape? Are you looking to apply your technical expertise in a collaborative and forward-thinking environment? As a Technical Security Analyst, you'll be part … appropriately and remediated according to agreed timescales. Assisting in the creation, testing, and implementation of response and recovery plans in support of incident management threat modelling. Researching and investigating attack techniques and recommending ways to defend against them. Supporting the Security function in all aspects of Security operations and More ❯
directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secrets management Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design principles to cloud environments … web apps, and mobile apps Proficiency in understanding authentication, authorization, and cryptography, with familiarity around modern security standards and best practices. Proficiency in data modelling of roles, permissions, and capabilities Experience with OAuth 2.0 nuances, best practices, and shortcomings Experience securely running and operating web applications, web services, and More ❯
low-latency systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors … C++, Rust, Go, or Kotlin/Java Solid understanding of cloud and hybrid infrastructure security Experience securing both Windows and Linux environments Expertise in threat modeling, risk analysis, and security tooling Excellent communication and leadership skills More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports … clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including More ❯
designing secure systems. Experience implementing and integrating with secure RESTful Web Services. Experience with AWS security services such as KMS and ACM. Experience with threat modeling and an awareness of the Internet threat model. Experience with DevOps environments that support security at speed, i.e., SecDevOps. Ability to accurately More ❯
System Security Assessment (Hardware + Firmware): Lead architecture-level security assessments and risk analyses across SoC and low-level firmware components. Conduct in-depth threat modeling of boot flows, firmware, memory protection mechanisms, and secure execution environments. Detailed attack-modelling and review security features across firmware interfaces. Firmware … the intersection of hardware and firmware. Deep experience in areas such as secure boot, key provisioning, firmware mitigations, and hardware-enforced isolation. Understanding of threat models including firmware exploitation, privilege-escalation, code injection, and side-channel attacks. Solid grasp of Arm TrustZone, secure world monitor designs, memory and IO More ❯
Join Our Team as a Product Support Engineer at Iriusrisk! IriusRisk is the world's leading automated threat modeling tool. Born out of a desire to advance threat modeling as an activity and ensure that software is secure from the design stage. IriusRisk helps the largest banks and … excellent service. Collaboration: Work with Engineering and Customer Success to provide timely solutions and workarounds. Technical Knowledge: Gain deep technical understanding of IriusRisk and threat modeling concepts. Knowledge Base Contributions: Create and maintain technical documentation, troubleshooting guides, and knowledge base articles. Documentation: Keep thorough records of customer interactions, troubleshooting … improvement suggestions. What we offer 100% remote working. Excellent working environment. Work in a highly qualified professional team with world-class references in the Threat modeling sector. Real career development opportunities within the company. We focus on the 'Do it well' culture and are not afraid to invest in More ❯
Mandatory Skills : Working experience with driving design decisions using Threat Modeling (STRIDE/MITRE ATT&CK) Practical experience in hardening GCP Services Practical experience with a CNAPP/CSPM tool Experience with formal documentation of cloud controls (Threat Model Reports, Policy Summary Pages More ❯