Threat Modelling Jobs in the UK excluding London

1 to 25 of 101 Threat Modelling Jobs in the UK excluding London

MLOps Engineer

Worcester, Worcestershire, UK
Methods Analytics
data audits of deployed models, tracking model drift and identifying opportunities for optimisation to enhance performance and reliability. Security and Vulnerability Management: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Implement and maintain vulnerability management practices to proactively address security risks … Cloud and ML Infrastructure: Experience with cloud platforms (AWS, Azure, or GCP) and managing cloud-based ML workflows and resources at scale. Experience with Threat Modelling and Vulnerability Management: Proven ability to conduct threat modelling exercises to identify security risks. Experience in Security and Compliance: Demonstrated More ❯
Posted:

MLOps Engineer

Worcester, Worcestershire, UK
Methods
streamline model deployment. Monitor and Maintain Deployed Models: Conduct regular performance reviews and data audits of deployed models. Security and Vulnerability Management: Participate in threat modelling to identify and assess potential security risks throughout the ML lifecycle. Troubleshoot and Resolve Issues: Proactively troubleshoot issues related to model performance … and managing CI/CD pipelines. Knowledge of Cloud and ML Infrastructure: Experience with cloud platforms and managing cloud-based ML workflows. Experience with Threat Modelling and Vulnerability Management: Proven ability to conduct threat modelling exercises. Experience in Security and Compliance: Demonstrated experience working within secure More ❯
Posted:

Product Security Specialist

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
product team/squad and will support the implementation of secure solutions throughout the application and software development life-cycle. You will also facilitate threat modelling workshops assisting product teams in identifying and mitigating threats. What you will be doing: Oversee security related issues across multiple product teams … Cloud serverless transformation projects. You will have the ability to work with infrastructure as code and understand complex architectures. You will Lead/facilitate threat modelling workshops with SMEs. Engage with key stakeholders to identify threats and recommend countermeasures. Participate in architectural reviews of Product cloud implementations against … such as OWASP, NIST, and ISO. Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threat modelling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based questions and a More ❯
Employment Type: Permanent, Part Time
Posted:

OT Project Manager

City, Liverpool, United Kingdom
Hays Technology
to upper management Identify project risks and develop risk mitigation plans Ensure project deliverables meet quality standards Streamline governance and efficient risk mitigation processes Threat analysis/threat modelling and vulnerabilities management The OT Project Manager will bring a combination of technical knowledge, project management expertise, industry … where OT is pivotal to operations. Risk Mapping Enhanced compliance management, ability to map to industry frameworks Control implementation, monitoring, testing, attestation per frameworks Threat analysis/threat modelling and vulnerability management. This is a hybrid role, with an onsite expectation in Liverpool. The role is outside More ❯
Employment Type: Temporary
Salary: GBP Annual
Posted:

Cyber Security Engineer

Coventry, UK
Cadent Gas
activity, provide root cause insights, and drive remediation activity. Engineering & Integration - Maintain and improve SIEM/SOAR tools, integrate with core OT security platforms. Threat Modelling & Analytics - Build advanced alerting, analyse attack vectors, and enhance threat visibility. Vulnerability & Patch Strategy - Develop workarounds for unpatchable assets and mitigate … insight, and the ability to collaborate across functions. Proven OT Cyber Experience – in utilities, critical infrastructure, SCADA, ICS Hands-on Security Tooling – SIEM, SOAR, threat intelligence, vulnerability management Threat Modelling – familiar with MITRE ATT&CK for ICS, and developing detection use cases Incident Management – support cyber incident More ❯
Posted:

Cyber Security Engineer

Coventry, Warwickshire, United Kingdom
Cadent Gas
activity, provide root cause insights, and drive remediation activity. Engineering & Integration - Maintain and improve SIEM/SOAR tools, integrate with core OT security platforms. Threat Modelling & Analytics - Build advanced alerting, analyse attack vectors, and enhance threat visibility. Vulnerability & Patch Strategy - Develop workarounds for unpatchable assets and mitigate … insight, and the ability to collaborate across functions. Proven OT Cyber Experience - in utilities, critical infrastructure, SCADA, ICS Hands-on Security Tooling - SIEM, SOAR, threat intelligence, vulnerability management Threat Modelling - familiar with MITRE ATT&CK for ICS, and developing detection use cases Incident Management - support cyber incident More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Product Security Engineer

Belfast, United Kingdom
Smarsh, Inc
engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in application security … will you contribute? Secure SDLC Integration: Embed security within the software development lifecycle, ensuring security is considered at every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely … tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best practices). Familiarity with attack surface management and threat intelligence. What do we offer? We value our people and offer a competitive salary along with company bonus. Strong maternity and paternity scheme. A More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Domain Abuse Lead - Threat Intelligence

Oxford, Oxfordshire, United Kingdom
Nominet
role in making .UK the safest ccTLD in the world. The ideal candidate will be an experienced cyber professional in the fields of cyber threat intelligence, good awareness of the complex cyber threat landscape, and a good understanding of DNS, to lead its team of Domain Abuse Analysts. … and will directly contribute to enhancing Nominet's reputation in the global internet community. This role is ideal for someone with a deep cyber threat intelligence background, but is not typical and offers unique challenges and opportunities. Responsibilities Oversee and direct the execution of Nominet's domain abuse strategy. … Domain Abuse Lead will work closely with the Nominet Security team on a range of different initiatives that are likely to span areas of threat modelling, threat intelligence acquisition and dissemination, amongst others. About you and your experience Substantial experience in cyber threat intelligence, ideally with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cloud Security Engineer

Hart, County Durham, UK
Takeaway.com
Implement third-party security tools and assist in major incident response, working with the CSOC team on Cloud threats and events. Cloud Security Tooling & Threat Modelling: Build and enforce Cloud-native security tools, desired experience in conducting threat modelling, and architectural reviews to enhance security practices. More ❯
Posted:

2571 - Cyber Security Analyst UK Aberdeen

City, Aberdeen, United Kingdom
Prosource
by the IS Security team. Support IS Security to achieve regulatory and statutory compliance requirements. Complete cyber risk assessments, including third party suppliers. Apply threat modelling principles to complex system and solution designs to identify security risks and appropriate mitigations. Support, monitor and recommend improvements to cyber incident … governance requirements and identifying suitable controls (essential). Experience of delivering cloud focused security solutions with a solid understanding of modern cyber threats and threat modelling techniques (preferred). Good understanding of security frameworks (NIST CSF, Mitre ATT&CK) (essential). What You'll Get in Return: We More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Software engineer

Manchester, Lancashire, United Kingdom
TieTalent
sensor technology. Protecting these systems from security threats is vital to ensuring the safety of both vehicles and passengers. Key Responsibilities: Security SME for threat modelling of cloud-powered vehicle connectivity platforms Ensuring the security of mobile integrations, over-the-air updates, and digital services Collaborating with developers … embed security thinking into every stage of development Requirements: Strong expertise in cloud security, particularly with AWS, authentication, PKI, and related areas Experience in threat modelling, particularly identifying and addressing security risks in cloud-based products Excellent communication skills to collaborate effectively with developers and security teams A More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer (Research)

Cambridge, Cambridgeshire, UK
Hybrid / WFH Options
ARM
If you strive for continuous improvement and are a hands-on team member this position would be of interest to you. Responsibilities: Conduct comprehensive threat modelling, vulnerability analysis, and security risk assessments of Arm architecture specifications spanning CPU, Software, and System architectures. Collaborate with architecture development, implementation, and … in terms of planning, reviews, status updates and meetings, as well as delivery against expectation. Required Skills and Experience: Strong understanding of security principles, threat modelling, vulnerability analysis, and security risk assessment. Demonstrated ability in computer security - Security risk analysis of hardware/software architecture/implementations, played More ❯
Posted:

Security Engineer

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threat modelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Greater Manchester, UK
Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threat modelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
Posted:

Information Security Director

Guildford, Surrey, United Kingdom
Sycurio
are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance landscape. Information security strategy Create and maintain the Company's strategy, ensuring alignment to the Company's strategy and business goals Work … and propose remediation and mitigation plans and solutions. Responsible for the Company's information security capability, ensuring it remains secure against an ever-changing threat landscape Operational input Contribute to design and architectural decisions and improve approach to the Company's threat modelling Lead on information security … incidents and work directly with internal teams and external parties on containment and mitigation activities Execute threat simulations Assess emerging and potential security threats and acting proactively to mitigate relevant threats End to end vulnerability management. Manage security toolset. Act as the security "face" of Sycurio to its customers More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Consultant

Dartford, Kent, United Kingdom
Goaco Ltd
and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security … technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Penetration Tester

Edinburgh, UK
Stefanini North America and APAC
platforms. Key Responsibilities: Conduct comprehensive penetration testing on web applications, APIs, and mobile applications (both Android and iOS) to identify potential security vulnerabilities. Perform threat modeling and risk assessment to provide actionable recommendations for remediation. Collaborate with development and operations teams to enhance security measures across cloud environments and More ❯
Posted:

Application Security Architect - London/Remote

Co. West Midlands, UK
Hybrid / WFH Options
JR United Kingdom
communication skills with stakeholder management and interpersonal skills. Identifying the need for new, or changes to existing, security patterns for UI, API, and microservices. Threat Modelling and dynamic security testing experience. Development experience in .NET and/or Java. Experience with scripting (e.g. python, PowerShell, bash). Demonstrable … understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios. Knowledge of information security concepts and technologies. Click Apply now to be considered for the Application Security Architect – London/Remote role #J-18808-Ljbffr More ❯
Posted:

Application Security Architect – London/Remote

Bury, Greater Manchester, United Kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

Bolton, Greater Manchester, United Kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

Leeds, West Yorkshire, United Kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

Leigh, Greater Manchester, United Kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

Altrincham, Greater Manchester, United Kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

Bury, east anglia, united kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:

Application Security Architect – London/Remote

london, south east england, united kingdom
Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. Threat Modelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Posted:
Threat Modelling
the UK excluding London
10th Percentile
£45,000
25th Percentile
£60,000
Median
£80,000
75th Percentile
£95,000