data audits of deployed models, tracking model drift and identifying opportunities for optimisation to enhance performance and reliability. Security and Vulnerability Management: Participate in threatmodelling to identify and assess potential security risks throughout the ML lifecycle. Implement and maintain vulnerability management practices to proactively address security risks … Cloud and ML Infrastructure: Experience with cloud platforms (AWS, Azure, or GCP) and managing cloud-based ML workflows and resources at scale. Experience with ThreatModelling and Vulnerability Management: Proven ability to conduct threatmodelling exercises to identify security risks. Experience in Security and Compliance: Demonstrated More ❯
streamline model deployment. Monitor and Maintain Deployed Models: Conduct regular performance reviews and data audits of deployed models. Security and Vulnerability Management: Participate in threatmodelling to identify and assess potential security risks throughout the ML lifecycle. Troubleshoot and Resolve Issues: Proactively troubleshoot issues related to model performance … and managing CI/CD pipelines. Knowledge of Cloud and ML Infrastructure: Experience with cloud platforms and managing cloud-based ML workflows. Experience with ThreatModelling and Vulnerability Management: Proven ability to conduct threatmodelling exercises. Experience in Security and Compliance: Demonstrated experience working within secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
product team/squad and will support the implementation of secure solutions throughout the application and software development life-cycle. You will also facilitate threatmodelling workshops assisting product teams in identifying and mitigating threats. What you will be doing: Oversee security related issues across multiple product teams … Cloud serverless transformation projects. You will have the ability to work with infrastructure as code and understand complex architectures. You will Lead/facilitate threatmodelling workshops with SMEs. Engage with key stakeholders to identify threats and recommend countermeasures. Participate in architectural reviews of Product cloud implementations against … such as OWASP, NIST, and ISO. Awareness of security tools and technologies, such as SAST, DAST, IAST, SCA, WAF, IDS, IPS. Experience in conducting threatmodelling and risk assessments. Interview process The interview process for this role is two stages including a technical competency-based questions and a More ❯
to upper management Identify project risks and develop risk mitigation plans Ensure project deliverables meet quality standards Streamline governance and efficient risk mitigation processes Threat analysis/threatmodelling and vulnerabilities management The OT Project Manager will bring a combination of technical knowledge, project management expertise, industry … where OT is pivotal to operations. Risk Mapping Enhanced compliance management, ability to map to industry frameworks Control implementation, monitoring, testing, attestation per frameworks Threat analysis/threatmodelling and vulnerability management. This is a hybrid role, with an onsite expectation in Liverpool. The role is outside More ❯
activity, provide root cause insights, and drive remediation activity. Engineering & Integration - Maintain and improve SIEM/SOAR tools, integrate with core OT security platforms. ThreatModelling & Analytics - Build advanced alerting, analyse attack vectors, and enhance threat visibility. Vulnerability & Patch Strategy - Develop workarounds for unpatchable assets and mitigate … insight, and the ability to collaborate across functions. Proven OT Cyber Experience – in utilities, critical infrastructure, SCADA, ICS Hands-on Security Tooling – SIEM, SOAR, threat intelligence, vulnerability management ThreatModelling – familiar with MITRE ATT&CK for ICS, and developing detection use cases Incident Management – support cyber incident More ❯
activity, provide root cause insights, and drive remediation activity. Engineering & Integration - Maintain and improve SIEM/SOAR tools, integrate with core OT security platforms. ThreatModelling & Analytics - Build advanced alerting, analyse attack vectors, and enhance threat visibility. Vulnerability & Patch Strategy - Develop workarounds for unpatchable assets and mitigate … insight, and the ability to collaborate across functions. Proven OT Cyber Experience - in utilities, critical infrastructure, SCADA, ICS Hands-on Security Tooling - SIEM, SOAR, threat intelligence, vulnerability management ThreatModelling - familiar with MITRE ATT&CK for ICS, and developing detection use cases Incident Management - support cyber incident More ❯
engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threatmodelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in application security … will you contribute? Secure SDLC Integration: Embed security within the software development lifecycle, ensuring security is considered at every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threatmodelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely … tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best practices). Familiarity with attack surface management and threat intelligence. What do we offer? We value our people and offer a competitive salary along with company bonus. Strong maternity and paternity scheme. A More ❯
role in making .UK the safest ccTLD in the world. The ideal candidate will be an experienced cyber professional in the fields of cyber threat intelligence, good awareness of the complex cyber threat landscape, and a good understanding of DNS, to lead its team of Domain Abuse Analysts. … and will directly contribute to enhancing Nominet's reputation in the global internet community. This role is ideal for someone with a deep cyber threat intelligence background, but is not typical and offers unique challenges and opportunities. Responsibilities Oversee and direct the execution of Nominet's domain abuse strategy. … Domain Abuse Lead will work closely with the Nominet Security team on a range of different initiatives that are likely to span areas of threatmodelling, threat intelligence acquisition and dissemination, amongst others. About you and your experience Substantial experience in cyber threat intelligence, ideally with More ❯
Implement third-party security tools and assist in major incident response, working with the CSOC team on Cloud threats and events. Cloud Security Tooling & ThreatModelling: Build and enforce Cloud-native security tools, desired experience in conducting threatmodelling, and architectural reviews to enhance security practices. More ❯
by the IS Security team. Support IS Security to achieve regulatory and statutory compliance requirements. Complete cyber risk assessments, including third party suppliers. Apply threatmodelling principles to complex system and solution designs to identify security risks and appropriate mitigations. Support, monitor and recommend improvements to cyber incident … governance requirements and identifying suitable controls (essential). Experience of delivering cloud focused security solutions with a solid understanding of modern cyber threats and threatmodelling techniques (preferred). Good understanding of security frameworks (NIST CSF, Mitre ATT&CK) (essential). What You'll Get in Return: We More ❯
sensor technology. Protecting these systems from security threats is vital to ensuring the safety of both vehicles and passengers. Key Responsibilities: Security SME for threatmodelling of cloud-powered vehicle connectivity platforms Ensuring the security of mobile integrations, over-the-air updates, and digital services Collaborating with developers … embed security thinking into every stage of development Requirements: Strong expertise in cloud security, particularly with AWS, authentication, PKI, and related areas Experience in threatmodelling, particularly identifying and addressing security risks in cloud-based products Excellent communication skills to collaborate effectively with developers and security teams A More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
ARM
If you strive for continuous improvement and are a hands-on team member this position would be of interest to you. Responsibilities: Conduct comprehensive threatmodelling, vulnerability analysis, and security risk assessments of Arm architecture specifications spanning CPU, Software, and System architectures. Collaborate with architecture development, implementation, and … in terms of planning, reviews, status updates and meetings, as well as delivery against expectation. Required Skills and Experience: Strong understanding of security principles, threatmodelling, vulnerability analysis, and security risk assessment. Demonstrated ability in computer security - Security risk analysis of hardware/software architecture/implementations, played More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
and technical operations, ensuring resilient and secure environments. Cloud Security Operations : Securely manage Azure, M365 & AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and … Architecture: Proven track record in designing and implementing security architectures in complex environments. Risk Management: Ability to identify and mitigate security risks; knowledge of threatmodelling and frameworks such as MITRE ATT&CK, CIS, and OWASP. Analytical Skills: Strong problem-solving abilities to translate business requirements into technical … security in cloud environments. Security tooling: experience in any of the following; (Wiz, CrowdStrike, Proofpoint, BitSight, Akamai, CATO) Experience with security engineering, incident response, threat hunting, or digital forensics. Preferred Qualifications: Relevant cybersecurity certifications such as CISSP, CISM, CEH, Microsoft Security Certifications, AWS Security Specialty. Knowledge of ITIL. What More ❯
are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance landscape. Information security strategy Create and maintain the Company's strategy, ensuring alignment to the Company's strategy and business goals Work … and propose remediation and mitigation plans and solutions. Responsible for the Company's information security capability, ensuring it remains secure against an ever-changing threat landscape Operational input Contribute to design and architectural decisions and improve approach to the Company's threatmodelling Lead on information security … incidents and work directly with internal teams and external parties on containment and mitigation activities Execute threat simulations Assess emerging and potential security threats and acting proactively to mitigate relevant threats End to end vulnerability management. Manage security toolset. Act as the security "face" of Sycurio to its customers More ❯
and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threatmodelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security … technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk More ❯
platforms. Key Responsibilities: Conduct comprehensive penetration testing on web applications, APIs, and mobile applications (both Android and iOS) to identify potential security vulnerabilities. Perform threat modeling and risk assessment to provide actionable recommendations for remediation. Collaborate with development and operations teams to enhance security measures across cloud environments and More ❯
communication skills with stakeholder management and interpersonal skills. Identifying the need for new, or changes to existing, security patterns for UI, API, and microservices. ThreatModelling and dynamic security testing experience. Development experience in .NET and/or Java. Experience with scripting (e.g. python, PowerShell, bash). Demonstrable … understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios. Knowledge of information security concepts and technologies. Click Apply now to be considered for the Application Security Architect – London/Remote role #J-18808-Ljbffr More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Bolton, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Leigh, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Altrincham, Greater Manchester, United Kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
Bury, east anglia, united kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯
london, south east england, united kingdom Hybrid / WFH Options
Atrium
well as at various levels of seniority. Identifying the need for new, or changes to existing, security patterns for UI, API, and micro services. ThreatModelling and dynamic security testing experience, to identify any security risks before live deployment Development experience in .NET and/or Java. Experience … of web application and API development (Typescript, React, HTTP, PHP). Demonstrable Understanding of cryptography concepts. Business analysis experience such as requirements gathering and modelling use cases and scenarios Knowledge of information security concepts and technologies such as IDS, email gateways and desktop security products, SIEM and SOAR platforms More ❯