overseeing application security testing, prioritising the resolution of security vulnerabilities, and increasing automation Show experience identifying potential threats and attacks to applications systems through threatmodelling (PASTA and STRIDE) Demonstrate experience with threatmodelling theories and application architecture reviews Have experience of monitoring security systems for more »
Security Consultant with extensive experience in providing end-to-end security assurance for business projects. The ideal candidate will have a strong background in threat assessments, architectural design reviews, third-party risk assessments, RFP security requirements, network security, IDAM projects, ransomware remediation, pen test scoping, and HLD/LLD … reviews. Responsibilities: Perform threatmodelling to identify potential security vulnerabilities and risks. Assess high and low-level architectural designs to identify security risks and provide recommendations for mitigation. Provide security requirements for RFPs and score RFPs based on security criteria. Conduct assessments of third-party security posture to … role with a focus on end-to-end security assurance for business projects. Strong understanding of security principles, standards, and best practices. Experience with threatmodelling, architectural design reviews, RFP security requirements, third-party risk assessments, network security, IDAM projects, ransomware remediation, pen test scoping, and HLD/ more »
Develop and implement security design standards and frameworks Collaborate with engineering and product teams to incorporate security considerations into product design and development Conduct threatmodelling, vulnerability assessments, and security code reviews to identify potential security issues Develop and maintain a secure software development lifecycle (SDLC) to ensure … security is integrated at every stage Educate and train engineering and product teams on security awareness and best practices Experience with threatmodelling, risk assessment, and the development of mitigation strategies The Senior Product Security Engineer is a high-profile role with significant business and technology engagement. This more »
risks. Act as a subject matter expert on security-related matters, collaborating with stakeholders to address security concerns and implement effective solutions. Participate in threat hunting and threatmodelling activities. To be considered for this role, you should have: Must have a strong background in a security more »
We are seeking a strong Cybersecurity Architect with a robust understanding of Identity and Access Management (IAM) and Privileged Access Management (PAM), experienced in threat modeling, and implementing/enforcing security controls and guardrails. While in-depth SAP knowledge is a plus, the primary requirement is to have a … solid grasp of the architecture and vulnerabilities associated with migrating legacy systems to SAP. Key Responsibilities: Produce detailed threat models after reviewing technical design documents. Review and input security into solution architecture and high-level designs. Advise and consult with development teams on security matters. Ensure compliance with internal …/Experience: Relevant professional qualifications such as Security+, Network+, CISM, CISSP, or working towards certification. Strong concepts of IAM and PAM. Extensive experience in threat modeling and implementing/enforcing security controls and guardrails. Experience working with developers, understanding their challenges, and providing support. Ability to assess and constructively more »
required projects Manage security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threatmodelling, and vulnerability management and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security more »
ability to design and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred more »
doing: Identify security vulnerabilities from a wide pool of technological solutions Perform risk analysis to triage and manage the remediation or mitigation activity Perform threat modeling activities across a variety of applications and environments Perform security assessments of existing architecture and make security recommendations for new deployments or changes more »
controls and NIST Guidelines Experience in implementing security automation using scripting languages e.g. Python and infrastructure-as-code (IaC) tools Ability to perform security threatmodelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding more »
the Governance, Risk, and Compliance (GRC) team to inform on risk, compliance, and assurance matters related to the portfolio of change initiatives. Ensure that Threat Modeling is implemented for identified programs, projects, and engineering initiatives within the portfolio. Work closely with the Security Culture team to ensure alignment and more »
level executives. Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and social engineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
Consultant (Pen Tester) Complementary Technical Skills: Hands-on experience with programming languages, databases, and IoT Knowledge of containerization technologies (e.g., Docker) Experience with Attack & Threat Modeling Red Team testing and social engineering methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies Security Testing Consultant more »
securely and efficiently. Perform thorough security assessments on GCP environments, utilizing GCP-specific security tools and technologies, to identify and address potential vulnerabilities. Conduct threat modeling and risk assessments for GCP deployments, designing effective security solutions tailored to GCP services. Collaborate with cross-functional teams to respond to GCP more »
Ideally this person would have Vulnerability management experience. System Admin background desired but not essential, this includes experience across Unix, Windows, Cisco, Networking, etc. ThreatModelling exposure flexible This is a permanent position that operates on a hybrid work setup of 2 days in the office, 3 days more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
ideal candidate for the Security Architect will have the following skills and experience: Extensive experience designing security solutions, primarily for on-prem Experience with ThreatModelling frameworks Thorough knowledge of Information Security controls Excellent communication skills, with the ability to translate complex engineering terms into language that business more »
side encryption for data stored in Amazon S3 buckets. Ensure data at rest and data in transit are encrypted using appropriate mechanisms. Produce Detailed Threat models after reviewing technical design documents. Design and implement authentication mechanisms (e.g., OAuth, JWT) for APIs and services. Key skills: Should have proven experience more »
deployment (CI/CD) practices. Security Practices: In-depth understanding of security best practices and standards (e.g., OWASP, NIST). Experience with security assessments, threat modeling, and proactive security mitigation. Problem Solving: Excellent analytical and problem-solving skills, capable of troubleshooting complex security issues. Communication and Collaboration: Strong communication more »
working withing the Financial Services Industry (Insurance or Exchange highly desirable) Hands on experience Operating application tools Must have subject matter expertise in application threatmodelling, secure coding practices in Java and C++, and DevSecOps practices. Must have current experience of operating SAST, SCA, DAST, IAST, MAST. Logistics more »
compliance in ISO 27001, GDPR, PCI DSS Have a strong understanding of network security principles and practices Be experienced in conducting risk assessments and threatmodelling Be generally proficient in Linux operating systems (e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection more »
role, you will be instrumental in providing Cyber Security services globally, focusing on driving the Cyber Assurance programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process … and cryptography. Security Solutions: Experience in architecting and engineering complex security solutions, implementing global policies and standards. Methodologies: Familiar with "Attack and Defensive" methods, Threat Hunting, Threat modeling, Reverse engineering, Vulnerability Management, Data modeling, and security metrics. Automation and Scripting: Skilled in Python, Shell, Ansible, Jenkins. Cloud Technologies more »
and champion security within your current role, you're very likely to be successful. You will be training developers on writing secure code, perform threatmodelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead incident response more »
ll do Provide security guidance to engineering teams on new products and technologies Taking ownership and driving the application security and privacy initiatives Perform threat modeling and architecture review on upcoming features and products Perform regular security assessments through penetration testing and code reviews of products Encourage and train … C#, Go) i.e you can code and perform security code reviews You’re experienced in working with highly technical engineering teams You have performed threat modeling and architectural review for years You like bug hunting and penetration testing (bonus points if you share your Bugcrowd/HackerOne profiles) Experience more »