Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
TieTalent
security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, ThreatModelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threatmodelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and implement mitigation measures. Integrate secure coding practices into the software development lifecycle. Perform security code reviews and ensure secure-by-design principles. Conduct threatmodelling exercises to identify and mitigate potential risks. Ensure compliance with security regulations such as ISO27001, NIST 800-30/37/ More ❯
london, south east england, United Kingdom Hybrid / WFH Options
psd group
/CD pipeline using agile DevSecOps practices, conduct application security scans, and work closely with development teams. Stay updated on emerging cyber threats, lead threatmodelling exercises, support managed security services, and assist in developing strategies to mitigate cyber risks. Foster strong team relationships, contribute to knowledge sharing More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
to ensure robust security solutions are in place. Responsibilities Planning and Design Activities • Define and maintain security architecture processes aligned with business, technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and … review and approval. • Establish a taxonomy of indicators of compromise (IOCs) and share insights with security teams. • Continuously monitor developments in digital business and threat environments to refine security strategies and artefacts. Assurance • Validate IT infrastructure and reference architectures for security best practices and recommend improvements. • Ensure proper security … configurations for infrastructure tools such as firewalls, IPSs, WAFs, and endpoint protection systems. • Facilitate threatmodelling for services and applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. More ❯
help shape and drive our security strategy and will develop architecture and designs to support NATS' overall business strategy. Duties: Lead the definition and modelling of security architecture for current and future capabilities to identify areas for improvement and guide Service Designs and comply with corporate, legislative, contractual or … on delivering outcomes. Demonstrable experience in cloud architectures and operational technology. Experience in systems delivery including analysis, design, implementation, testing and support. Experience of threatmodelling and how it can be applied effectively to designs. Good working knowledge of an Information Security Management System and the ISO2700x/ More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
security strategy and ensure security is embedded at every stage of development. Key Responsibilities: Perform in-depth security reviews, including secure code reviews and threat modelling. Develop and implement security controls to align with frameworks such as ISO 27001, NIST, and CIS benchmarks. Collaborate with development teams to enhance More ❯
security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, regulatory and threat drivers • Advise business stakeholders and support teams in their development of effective security strategies for their areas, providing proper advice and counselling on security … development, or cloud development • Previous experience developing architecture blueprints, strategies, and roadmaps. • Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services. • Practical knowledge of the information security standards domain. • Experience of working with external audit and certification More ❯
shiremoor, north east england, United Kingdom Hybrid / WFH Options
Northern Powergrid
security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, regulatory and threat drivers • Advise business stakeholders and support teams in their development of effective security strategies for their areas, providing proper advice and counselling on security … development, or cloud development • Previous experience developing architecture blueprints, strategies, and roadmaps. • Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services. • Practical knowledge of the information security standards domain. • Experience of working with external audit and certification More ❯
cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
DevOps and Engineering teams to implement DevSecOps practices, secure pipelines, and infrastructure-as-code standards. Promote Security by Design principles in product planning, including threat modeling, risk assessments, and secure feature development. Collaborate with Product and Customer teams to support customer-facing security, including responding to security questionnaires and More ❯
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … and network protocols (e.g., TCP/IP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
Newbury, south west england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
newbury, south east england, United Kingdom Hybrid / WFH Options
Hays
Security. Ability to scope penetration tests and guide projects on the remediation of identified vulnerabilities. Knowledge of current vulnerabilities and trends in vulnerabilities/threat landscapes. Good interpersonal and communication and self-organisation skills. Strong technical skills, with the ability to adapt in unfamiliar environments. Ability to quickly assimilate … network protocols (e.g., TCP/IP, HTTP, TLS, SSH, DNS). Converged Business services (e.g. VoIP services), SDWAN, SDN Experience of risk management frameworks, threatmodelling, and security awareness initiatives. Understanding of security standards such as NIST. Join us to be part of a team that values innovation More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
Security/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of information security standards Experience working with external audit and certification organizations Familiarity with More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Proactive Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯
in: Identify security requirements and ensure the integration of security controls during the product development lifecycle Develop and implement risk management strategies Perform security threatmodelling and risk assessments applying security controls to mitigate any threats identified Collaborate with the development teams to ensure the adoption of Secure More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Oscar
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threatmodelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
platforms. Familiar with compliance frameworks such as NIST, ISO 27001 and how they apply to cloud applications. The ability to run risk assessments and threatmodelling for cloud-native applications. Excellent communication skills with the ability to translate technical concepts to business stakeholders. Role: Security Analyst (Cloud) Location More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Matchtech
ll Be Doing: Performing product risk assessments and identifying vulnerabilities across platforms. Collaborating with developers to integrate secure coding practices from the start. Leading threatmodelling exercises and developing mitigation strategies. Conducting security code reviews and offering guidance to ensure a secure-by-design approach. Ensuring products meet More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Frontier Resourcing
drive remediation with development and operations teams. Secure Development Practices Partner with software and hardware engineers to integrate secure coding and design principles (e.g., threatmodelling, secure-by-design). Perform security code reviews, provide guidance on secure libraries and frameworks. Standards & Compliance Ensure products meet regulatory and More ❯