Atherstone, England, United Kingdom Hybrid / WFH Options
ADECCO
technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threatmodelling and risk assessments Establish security standards, best practices, and design patterns to support cloud, physical and operational technologies Collaborate with development teams to integrate security controls into … application design Lead security architecture reviews and provide expert technical guidance on complex security challenges Keep up-to date with the latest security threat assessment frameworks such as OWASP, MITRE ATT&CK Assess security posture against industry regulations and compliance requirements Identify and mitigate security risks associated with new technologies and initiatives Perform security assessments to identify vulnerabilities Communicate More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threatmodelling and risk assessments Establish security standards, best practices, and design patterns to support cloud, physical and operational technologies Collaborate with development teams to integrate security controls into … application design Lead security architecture reviews and provide expert technical guidance on complex security challenges Keep up-to date with the latest security threat assessment frameworks such as OWASP, MITRE ATT&CK Assess security posture against industry regulations and compliance requirements Identify and mitigate security risks associated with new technologies and initiatives Perform security assessments to identify vulnerabilities Communicate More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threatmodelling and risk assessments Establish security standards, best practices, and design patterns to support cloud, physical and operational technologies Collaborate with development teams to integrate security controls into … application design Lead security architecture reviews and provide expert technical guidance on complex security challenges Keep up-to date with the latest security threat assessment frameworks such as OWASP, MITRE ATT&CK Assess security posture against industry regulations and compliance requirements Identify and mitigate security risks associated with new technologies and initiatives Perform security assessments to identify vulnerabilities Communicate More ❯
our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you … a dynamic and impactful role that offers technical depth, cross-functional collaboration, and the chance to shape Cadent’s cyber resilience. Technical Challenge – Work With Advanced SIEM, SOAR, And Threat Detection Tools Across IT And OT Environments. Strategic Contribution – Influence The Development Of New Controls And Support The Delivery Of Cadent’s Cyber Security Strategy. Cross-Team Collaboration – Partner … With Threat Intelligence, Vulnerability Analysts, And Incident Responders To Enhance Our Defences. Continuous Improvement – Engineer Solutions For Unpatchable Vulnerabilities And Automate Detection And Response Processes. National Impact – Help Protect The Systems That Keep Gas Flowing To Millions Of Homes And Businesses. What You'll Bring You are a technically skilled and security-focused professional with a strong understanding of More ❯
security cases ️ Leading risk assessments, managing mitigation controls, and contributing to DPIAs ? Supporting HMG Secure-by-Design assurance across the entire delivery lifecycle ?️ Feeding into control design activities—DevSecOps, threatmodelling, workshops, and design reviews ? Managing and coordinating penetration testing and remediation efforts ? Leading security incident response for the programme, from detection to resolution ? Running tailored security awareness More ❯
our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you … a dynamic and impactful role that offers technical depth, cross-functional collaboration, and the chance to shape Cadent’s cyber resilience. Technical Challenge – Work with advanced SIEM, SOAR, and threat detection tools across IT and OT environments. Strategic Contribution – Influence the development of new controls and support the delivery of Cadent’s cyber security strategy. Cross-Team Collaboration – Partner … with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement – Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact – Help protect the systems that keep gas flowing to millions of homes and businesses. What you'll bring: You are a technically skilled and security-focused professional with a strong understanding of More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Cadent Gas
our IT and Operational Technology (OT) environments. This is a hands-on, technically rich role where you will work with a wide range of security tools and collaborate with threat intelligence, vulnerability management, and incident response teams. You will engineer solutions to mitigate threats, automate detection and response, and ensure our systems remain secure, resilient, and compliant. Why you … a dynamic and impactful role that offers technical depth, cross-functional collaboration, and the chance to shape Cadent's cyber resilience. Technical Challenge - Work with advanced SIEM, SOAR, and threat detection tools across IT and OT environments. Strategic Contribution - Influence the development of new controls and support the delivery of Cadent's cyber security strategy. Cross-Team Collaboration - Partner … with threat intelligence, vulnerability analysts, and incident responders to enhance our defences. Continuous Improvement - Engineer solutions for unpatchable vulnerabilities and automate detection and response processes. National Impact - Help protect the systems that keep gas flowing to millions of homes and businesses. What you'll bring: You are a technically skilled and security-focused professional with a strong understanding of More ❯
domains as required across the business to continually improve the quality and potential of security solutions Demonstrable level of expertise of service management that may include compliance, standards, risk, threatmodelling, metric implementation, and maturity model management Collaborates with both enterprise and solution architects, bringing managed security services to life, sharing knowledge and bringing specific expertise into decision More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes ?
priorities by working closely with your team to identify the most critical focus areas. These include improving incident response times, reducing false positives and other extraneous alerts, and enhancing threat detection capabilities. In this role, you will analyze incident reports to understand the organization's security posture by reviewing incident reports and identifying patterns and trends that may indicate … protocols and conveying them to the team. Responsibilities: Manage service and process improvements of SOC, auditing SOC incidents, identifying new use cases and automations. POC for SOC engineering team, threat intelligence analyst, and threat exposure management. Act as a point of escalation for Level-2 SOC security analysts in support of information security investigations to provide guidance and … response, SIEM monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Security Operations Centre. Document incidents from initial detection through final resolution. Ensure threat management, threat modeling, identify threat vectors, and develop use cases for security monitoring. Make informed decisions about security investments and strategies that align with the company's More ❯
Stoke-on-Trent, Staffordshire, United Kingdom Hybrid / WFH Options
and static application security testing tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation within threat modelling. Experience of software development and languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for conducting and reporting on Web … to ensure that security is considered throughout the lifecycle. Identifying and managing any security flaws within our software through appropriately liaising with external bodies where necessary. Performing risk assessments, threatmodelling and design reviews to ensure effective security controls. Identifying opportunities for converting manual tasks into automated processes and identify tooling to support such automation. By applying to More ❯
that security and resilience are integrated into business unit plans and delivery frameworks. Guide product teams on how to deliver change effectively while maintaining security and compliance standards. Apply threatmodelling, data protection principles, and risk frameworks to business solutions. Promote the use of enterprise standards, guardrails, and architectural patterns where appropriate. Share knowledge with peers and wider … teams to strengthen overall security capability. About You Proven experience in a similar role within cyber security, IT risk, or resilience engineering. Strong understanding of security frameworks, risk management, threatmodelling, and data protection regulations. Excellent stakeholder engagement and influencing skills at all levels of the organisation. Passionate about emerging trends in technology and operating models, including Lean More ❯
that security and resilience are integrated into business unit plans and delivery frameworks. Guide product teams on how to deliver change effectively while maintaining security and compliance standards. Apply threatmodelling, data protection principles, and risk frameworks to business solutions. Promote the use of enterprise standards, guardrails, and architectural patterns where appropriate. Share knowledge with peers and wider … teams to strengthen overall security capability. About You Proven experience in a similar role within cyber security, IT risk, or resilience engineering. Strong understanding of security frameworks, risk management, threatmodelling, and data protection regulations. Excellent stakeholder engagement and influencing skills at all levels of the organisation. Passionate about emerging trends in technology and operating models, including Lean More ❯
that security and resilience are integrated into business unit plans and delivery frameworks. Guide product teams on how to deliver change effectively while maintaining security and compliance standards. Apply threatmodelling, data protection principles, and risk frameworks to business solutions. Promote the use of enterprise standards, guardrails, and architectural patterns where appropriate. Share knowledge with peers and wider … teams to strengthen overall security capability. About You Proven experience in a similar role within cyber security, IT risk, or resilience engineering. Strong understanding of security frameworks, risk management, threatmodelling, and data protection regulations. Excellent stakeholder engagement and influencing skills at all levels of the organisation. Passionate about emerging trends in technology and operating models, including Lean More ❯
that security and resilience are integrated into business unit plans and delivery frameworks. Guide product teams on how to deliver change effectively while maintaining security and compliance standards. Apply threatmodelling, data protection principles, and risk frameworks to business solutions. Promote the use of enterprise standards, guardrails, and architectural patterns where appropriate. Share knowledge with peers and wider … teams to strengthen overall security capability. About You Proven experience in a similar role within cyber security, IT risk, or resilience engineering. Strong understanding of security frameworks, risk management, threatmodelling, and data protection regulations. Excellent stakeholder engagement and influencing skills at all levels of the organisation. Passionate about emerging trends in technology and operating models, including Lean More ❯
that security and resilience are integrated into business unit plans and delivery frameworks. Guide product teams on how to deliver change effectively while maintaining security and compliance standards. Apply threatmodelling, data protection principles, and risk frameworks to business solutions. Promote the use of enterprise standards, guardrails, and architectural patterns where appropriate. Share knowledge with peers and wider … teams to strengthen overall security capability. About You Proven experience in a similar role within cyber security, IT risk, or resilience engineering. Strong understanding of security frameworks, risk management, threatmodelling, and data protection regulations. Excellent stakeholder engagement and influencing skills at all levels of the organisation. Passionate about emerging trends in technology and operating models, including Lean More ❯
CACS, CSSLP, or equivalents Knowledge of IEC 61508, ISO 26262, or other functional safety standards Experience with software failure modes and effects analysis Hardware development experience Experience creating security threat models for products and/or systems Extensive knowledge of security concepts such as identification and authentication, encryption, secure boot, and PKI What we offer: A dynamic, flexible culture More ❯
of emerging threats, exploits, and attack methodologies to improve testing capabilities. To be considered: Extensive experience in penetration testing, red teaming, and security consulting. Strong knowledge of attack techniques, threatmodelling, and exploit development. Certifications such as CREST CRT/CCS, OSCP, OSEP, or CISSP are highly desirable. Proven ability to lead and deliver high-impact security engagements. More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
for cloud infrastructure (primarily AWS), including automation for configuration scanning and remediation. Act as a subject matter expert on cloud security within engineering, providing guidance during design reviews and threatmodelling sessions. Harden Kubernetes environments and enforce secure cluster configurations. Secure and manage infrastructure using Infrastructure-as-Code, with a focus on Terraform. Requirements: 5+ years of hands More ❯
feasibility analyses for future projects. Resolve software issues and suggest improvements. Lead and review work of other developers. Assist in developing user manuals. Translate security requirements into design, conduct threat modeling, and address security in software acceptance. Collaborate effectively with team members. YSI is an Equal Opportunity Employer. All qualified applicants will receive consideration without regard to race, color More ❯