to upper management Identify project risks and develop risk mitigation plans Ensure project deliverables meet quality standards Streamline governance and efficient risk mitigation processes Threat analysis/threatmodelling and vulnerabilities management The OT Project Manager will bring a combination of technical knowledge, project management expertise, industry … where OT is pivotal to operations. Risk Mapping Enhanced compliance management, ability to map to industry frameworks Control implementation, monitoring, testing, attestation per frameworks Threat analysis/threatmodelling and vulnerability management. This is a hybrid role, with an onsite expectation in Liverpool. The role is outside More ❯
Implement third-party security tools and assist in major incident response, working with the CSOC team on Cloud threats and events. Cloud Security Tooling & ThreatModelling: Build and enforce Cloud-native security tools, desired experience in conducting threatmodelling, and architectural reviews to enhance security practices. More ❯
sensor technology. Protecting these systems from security threats is vital to ensuring the safety of both vehicles and passengers. Key Responsibilities: Security SME for threatmodelling of cloud-powered vehicle connectivity platforms Ensuring the security of mobile integrations, over-the-air updates, and digital services Collaborating with developers … embed security thinking into every stage of development Requirements: Strong expertise in cloud security, particularly with AWS, authentication, PKI, and related areas Experience in threatmodelling, particularly identifying and addressing security risks in cloud-based products Excellent communication skills to collaborate effectively with developers and security teams A More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
Leigh, Greater Manchester, UK Hybrid / WFH Options
Atrium
as well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and microservices. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment. Development experience in .NET and/or Java. Experience … Experience in web application and API development (Typescript, React, PHP). Demonstrable understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios. Knowledge of information security concepts and technologies such as IDS, email gateways, desktop security products, SIEM and SOAR platforms, web More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Bury, east anglia, united kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Ashton-Under-Lyne, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Bolton, Greater Manchester, UK Hybrid / WFH Options
JR United Kingdom
as well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and microservices. ThreatModelling and dynamic security testing experience to identify any security risks before live deployment. Development experience in .NET and/or Java. Experience More ❯
Altrincham, Greater Manchester, UK Hybrid / WFH Options
JR United Kingdom
skills at both technical and non-technical levels. Identifying the need for new or changes to existing security patterns for UI, API, and microservices. Threat modeling and dynamic security testing experience to identify security risks before live deployment. Development experience in .NET and/or Java. Experience with scripting More ❯
Ashton-Under-Lyne, Greater Manchester, UK Hybrid / WFH Options
JR United Kingdom
as well as at various levels of seniority. Identifying the need for new or changes to existing security patterns for UI, API, and microservices. Threat modeling and dynamic security testing experience to identify any security risks before live deployment. Development experience in .NET and/or Java. Experience with More ❯
communication skills with stakeholder management and interpersonal skills. Identify the need for new or changes to existing security patterns for UI, API, and microservices. Threat Modeling and dynamic security testing experience. Development experience in .NET and/or Java, and scripting (e.g., Python, PowerShell, Bash). Demonstrable understanding of More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Senitor Associates
application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, ThreatModelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
solutions, integrating security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threatmodelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance More ❯
powered solutions, integrating security measures throughout the lifecycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modeling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge More ❯
in enterprise security architecture and hands-on InfoSec roles. Proven ability to design and implement security solutions across complex environments. Strong knowledge of risk, threatmodelling, and regulatory standards (e.g. NIST, ISO 27001, GDPR, PCI-DSS). Familiarity with tools like Sparx EA, Archi, JIRA, Confluence, GitLab, and More ❯
and existing products meet the highest security standards. Develop architectural solutions that prioritize security, working closely with the Solution Architecture team. Create and maintain threat models in collaboration with engineering teams, identifying risks and ensuring secure system deployment. Support engineering teams with security assurance, helping to align testing regimes … What You Will Bring: A strong background in software engineering or cyber security, with a keen understanding of DevSecOps. Experience in application security and threatmodelling, with the ability to translate technical vulnerabilities into business risks. Proficiency in implementing SDLC processes, technology, and automation within a DevOps environment. More ❯
of modern technology practices such as test-driven development (TDD), continuous integration, continuous delivery and DevOps a good knowledge of cloud security architecture, including threatmodelling, analysis and operations experience developing and implementing technical strategy and standards experience defining and refining technical governance in multidisciplinary agile environments If More ❯
conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … conjunction with solution architects, product owners, technical leads and embedded security champions to identify the security risks associated with our products using application security threat modelling. You will collaborate with stakeholders to identify secure architectures, best practices and requirements that enable us to deploy secure systems at scale. You … aligned with our products. Candidates will have a background in software engineering or cyber security, with knowledge of DevSecOps, familiarity of application security and threatmodelling, experience implementing SDLC process, technology, and automation in a DevOps environment; ideally making use of OWASP best practice, experience within agile delivery More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Proactive.IT Appointments Limited
/Cyber Security background Previous experience developing architecture blueprints, strategies, and roadmaps Documented experience and a strong working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services Practical knowledge of the information security standards domain Experience of working with external audit and certification More ❯