and can apply them to real-world solutions. Strong background in web services, RESTful APIs, and event-driven architectures (MSMQ, RabbitMQ, Kafka). Security-first mindset with experience in threatmodelling and vulnerability management. This is a super technical role with very complex software so your problem solving skills will be challenged every day. The Perks Salary: Up More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
X4 Technology
chain management initiatives Drive compliance efforts across the wider organization Deliver a comprehensive Cybersecurity Risk Assessment (CRA) involving: Integration of Security Design (SD) elements Development and detailed analysis of threat models Ensuring strict adherence to critical industry standards including: IEC 62443-4-1 (Industrial Automation and Control Systems — Product Development Lifecycle) IEC 62443-4-2 (Industrial Automation and Control More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
to high-profile clients across all industries. The purpose of this role is to deliver offensive security services such as digital footprint reconnaissance, social engineering, vulnerability assessments, penetration testing, threat modeling, cyber-attack simulation exercises, and more. You'll benefit from ongoing coaching, career mentoring, and support through our career pathway. You will have opportunities to develop market-leading More ❯
Horley, Surrey, United Kingdom Hybrid / WFH Options
X4 Group Ltd
chain management initiatives Drive compliance efforts across the wider organization Deliver a comprehensive Cybersecurity Risk Assessment (CRA) involving: Integration of Security Design (SD) elements Development and detailed analysis of threat models Ensuring strict adherence to critical industry standards including: IEC (phone number removed)-1 (Industrial Automation and Control Systems Product Development Lifecycle) IEC (phone number removed)-2 (Industrial Automation More ❯
Gatwick, West Sussex, England, United Kingdom Hybrid / WFH Options
X4 Group
chain management initiatives Drive compliance efforts across the wider organization Deliver a comprehensive Cybersecurity Risk Assessment (CRA) involving: Integration of Security Design (SD) elements Development and detailed analysis of threat models Ensuring strict adherence to critical industry standards including: IEC 62443-4-1 (Industrial Automation and Control Systems — Product Development Lifecycle) IEC 62443-4-2 (Industrial Automation and Control More ❯
Gatwick, Horley, Surrey, United Kingdom Hybrid / WFH Options
X4 Group Ltd
chain management initiatives Drive compliance efforts across the wider organization Deliver a comprehensive Cybersecurity Risk Assessment (CRA) involving: Integration of Security Design (SD) elements Development and detailed analysis of threat models Ensuring strict adherence to critical industry standards including: IEC (phone number removed)-1 (Industrial Automation and Control Systems — Product Development Lifecycle) IEC (phone number removed)-2 (Industrial Automation More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
bet365
techniques. This role will challenge you to leverage your Android platform knowledge, reverse engineering and mobile security expertise to keep the Business one step ahead in today's dynamic threat landscape. This role is eligible for inclusion in the Company's hybrid working from home policy. Qualifications Experience in Android security, mobile threatmodelling and developing anti More ❯
SOC Security Specialist We are looking for a highly capable and technically skilled Security Analyst to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … at a team lead level. Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act … a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs). Conduct insider threat analysis and support investigations. Cloud & Identity Security: Use Microsoft More ❯
SOC Security Specialist We are looking for a highly capable and technically skilled Security Analyst to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … at a team lead level. Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act … a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs). Conduct insider threat analysis and support investigations. Cloud & Identity Security: Use Microsoft More ❯
St. Neots, Cambridgeshire, East Anglia, United Kingdom
MASS Consultants
to Type) providing a complete picture to the customer of system performance. This role will give you a unique opportunity to act as an end user/operator of threat models participating in scenarios, applying doctrine, reacting to events, and learning these systems in detail. This task will give unrivalled access to our customers, as well as international partners More ❯
Initial We are looking for a highly capable and technically skilled Security Analyst (Network & Endpoint) to join our cybersecurity team. This role focuses on network and endpoint security operations, threat intelligence, and incident response within a Security Operations Centre (SOC) environment. The successful candidate will have hands-on experience with leading security platforms and demonstrate the ability to operate … Network & Endpoint) Location: England/Remote Contract Type: Contract Duration: Contract till 31st Mar 26 Sector: Healthcare . Key Responsibilities: Network Detection & Response: Administer and optimise Darktrace for network threat detection, model tuning, and behavioural analysis. Investigate anomalies and escalate incidents based on network telemetry. Endpoint Protection: Deploy and manage CrowdStrike Falcon agents across enterprise endpoints. Maintain and update … detection rules, ensuring alignment with threat intelligence. Security Operations Centre (SOC): Act as a Level 2 SOC Analyst and Incident Handler. Triage, investigate, and respond to security alerts and incidents. Collaborate with other SOC team members to ensure timely resolution and documentation. Threat Intelligence & Insider Threat Monitoring: Monitor threat feeds and manage Indicators of Compromise (IOCs More ❯
cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM/PAM implementations and M365/Azure/Active Directory configurations. Conduct or oversee penetration testing, vulnerability assessments, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain an IT Security Assurance Framework. Lead internal and external … audits, accreditation, and certification activities (e.g. PSN, Cyber Essentials Plus, ISO 27001). Monitor compliance with standards and respond to audit findings. Analyse SIEM outputs, threat intelligence feeds, and monitoring tools. Performance Monitoring and Reporting Define and track key security KPIs and metrics. Produce security performance and risk reports for executive and board audiences. Maintain security risk registers and More ❯
and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance Framework. Lead or coordinate internal … regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, Cyber Essentials Plus, ISO 27001). Monitor and respond to findings from SIEM, threat intelligence feeds, or monitoring tools. Performance Monitoring and Reporting Define and monitor key security performance indicators (KPIs). Produce regular security reports for senior management and boards. Track risk More ❯
and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance Framework. Lead or coordinate internal … regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, Cyber Essentials Plus, ISO 27001). Monitor and respond to findings from SIEM, threat intelligence feeds, or monitoring tools. Performance Monitoring and Reporting Define and monitor key security performance indicators (KPIs). Produce regular security reports for senior management and boards. Track risk More ❯
URGENT! Are you an experienced Threat Intelligence professional with a deep understanding of global cyber threats? Do you have a proven track record of analyzing, reporting, and presenting critical intelligence to both technical and non-technical stakeholders? If so, we want to hear from you! About the Role: As a Threat Intelligence Manager, you will play a crucial … actionable intelligence to senior leadership, security teams, and other key stakeholders. Your expertise will help drive proactive risk mitigation strategies and ensure the firm remains resilient in an evolving threat landscape. Key Responsibilities: Monitor and assess global cyber threats, geopolitical risks, and emerging attack trends. Develop and deliver comprehensive intelligence reports tailored for technical teams and executive leadership. Collaborate … informs defensive strategies. Present findings in clear, non-technical language to senior management, enabling informed decision-making. Work with external intelligence-sharing communities to enhance situational awareness. Continuously improve threat intelligence capabilities, tools, and methodologies. What We're Looking For: Strong experience in Cyber Threat Intelligence (CTI), preferably in financial services Proven ability to analyze, interpret, and report More ❯
URGENT! Are you an experienced Threat Intelligence professional with a deep understanding of global cyber threats? Do you have a proven track record of analyzing, reporting, and presenting critical intelligence to both technical and non-technical stakeholders? If so, we want to hear from you! About the Role: As a Threat Intelligence Manager, you will play a crucial … actionable intelligence to senior leadership, security teams, and other key stakeholders. Your expertise will help drive proactive risk mitigation strategies and ensure the firm remains resilient in an evolving threat landscape. Key Responsibilities: Monitor and assess global cyber threats, geopolitical risks, and emerging attack trends. Develop and deliver comprehensive intelligence reports tailored for technical teams and executive leadership. Collaborate … informs defensive strategies. Present findings in clear, non-technical language to senior management, enabling informed decision-making. Work with external intelligence-sharing communities to enhance situational awareness. Continuously improve threat intelligence capabilities, tools, and methodologies. What We're Looking For: Strong experience in Cyber Threat Intelligence (CTI), preferably in financial services Proven ability to analyze, interpret, and report More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
projects that protect sensitive data and digital assets. Key Responsibilities Develop and maintain security architecture for service mesh and containerised environments. Conduct risk assessments and implement mitigation strategies. Create threat models aligned with MITRE ATTACK & STRIDE frameworks. Recommend controls and enforce best practices for APIs, microservices, and data flows. Design and review secure API gateways using IBM DataPower. Implement … large, complex organisations, ideally in financial services (PCI compliance). Hands-on experience with IBM DataPower, OAuth 2.0, JWT, TLS, WS-Security, and encryption standards. Previous experience developing bespoke threat models using MITRE ATTACK & STRIDE. Ability to design secure architectures for hybrid/multi-cloud environments. Knowledge of zero-trust security models and microservices security. Ability to assess security More ❯
URGENT! Read all the information about this opportunity carefully, then use the application button below to send your CV and application. Are you an experienced Threat Intelligence professional with a deep understanding of global cyber threats? Do you have a proven track record of analyzing, reporting, and presenting critical intelligence to both technical and non-technical stakeholders? If so … we want to hear from you! About the Role: As a Threat Intelligence Manager, you will play a crucial role in monitoring, analyzing, and reporting on global cyber threats that could impact the firm. You will be responsible for delivering clear, concise, and actionable intelligence to senior leadership, security teams, and other key stakeholders. Your expertise will help drive … proactive risk mitigation strategies and ensure the firm remains resilient in an evolving threat landscape. Key Responsibilities: Monitor and assess global cyber threats, geopolitical risks, and emerging attack trends. Develop and deliver comprehensive intelligence reports tailored for technical teams and executive leadership. Collaborate with cybersecurity, risk, and compliance teams to ensure intelligence informs defensive strategies. Present findings in clear More ❯
Wiltshire, England, United Kingdom Hybrid / WFH Options
Focus on SAP
initiative. Key Responsibilities: Define and maintain security architecture for service mesh deployments across Kubernetes and containerised platforms. Conduct risk assessments and develop mitigation strategies for identified vulnerabilities. Create detailed threat models aligned to MITRE ATT&CK and STRIDE frameworks. Design and review secure API gateway patterns using IBM DataPower. Lead implementation of Zero-Trust , mTLS, RBAC and policy enforcement … cryptography and secure communication protocols. Experience designing secure architectures for hybrid/multi-cloud environments. Strong background in Zero-Trust , microservices security, and containerised platforms. Experienced in building bespoke threat models using MITRE ATT&CK & STRIDE . Ability to assess security elements of solution designs, constructively challenge, and drive secure outcomes. If you are interested or would like to More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
Focus on SAP
initiative. Key Responsibilities: Define and maintain security architecture for service mesh deployments across Kubernetes and containerised platforms. Conduct risk assessments and develop mitigation strategies for identified vulnerabilities. Create detailed threat models aligned to MITRE ATT&CK and STRIDE frameworks. Design and review secure API gateway patterns using IBM DataPower. Lead implementation of Zero-Trust , mTLS, RBAC and policy enforcement … cryptography and secure communication protocols. Experience designing secure architectures for hybrid/multi-cloud environments. Strong background in Zero-Trust , microservices security, and containerised platforms. Experienced in building bespoke threat models using MITRE ATT&CK & STRIDE . Ability to assess security elements of solution designs, constructively challenge, and drive secure outcomes. If you are interested or would like to More ❯