solutions for containerised environments, DevSecOps pipelines, and multi-cloud environments. Engineer cloud security solutions for containerised environments and microservices, including Kubernetes and Docker. Conduct threatmodelling, assess third-party solutions, and recommend security improvements. Monitor cloud security compliance throughout project lifecycles, ensuring adherence to company standards and security … Experience with security tools for container technology (eg, Kubernetes, ECS, Docker) and cloud posture management (eg, Prisma Cloud, Rapid7). Strong skills in cloud threatmodelling and architectural assessment using tools such as IriusRisk. Benefits: View to Extension Salary: Up to £550 Per Day More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Kingfisher plc
and our offices, located in London & Southampton. Talk to us about how we can best support you! Cyber security attacks are increasing and the threat landscape is changing. The role of the Head of Security Operations will lead Kingfisher's Security Operations Centre (SOC) in performing security monitoring, threat … Banners, ensuring cyber security risks are mitigated and also respond to and support cyber security incidents. Responsibilities Lead and direct SOC in running, monitoring, threat analysis, vulnerability management, security testing and intelligence whilst also leading Cyber security incident response and ensuring processes, procedures and playbooks are efficient, effective and … management of the SOC team to ensure an effective and proactive approach to security monitoring, responding to incidents when needed. Drive the development of threat management, threatmodelling and identification of new threat vectors by keeping up to date with industry activity and methodology, to help More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
can best support you! The role of the Head of Security Operations will lead Kingfisher's Security Operations Centre (SOC) in performing security monitoring, threat analysis, and vulnerability management. You will develop Kingfisher's strategy and plans for incident response, containment, and lessons learned, collaborating with Technology teams and … security risks are mitigated and also respond to and support cyber security incidents. What's the job Lead and direct SOC in running, monitoring, threat analysis, vulnerability management, security testing and intelligence whilst also leading Cyber security incident response and ensuring processes, procedures and playbooks are efficient, effective and … management of the SOC team to ensure an effective and proactive approach to security monitoring, responding to incidents when needed. Drive the development of threat management, threatmodelling and identification of new threat vectors by keeping up to date with industry activity and methodology, to help More ❯
and vulnerability management to protect critical systems. Design, implement, and maintain security architectures and frameworks aligned with government standards. Lead and support risk assessments, threatmodelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security … technical expertise in areas such as network security, endpoint security, cloud security, and secure system architecture. Experience in penetration testing, vulnerability management, and cyber threat intelligence. Solid knowledge of security technologies such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR). Strong understanding of risk More ❯
designing and implementing IAM solutions using industry-standard protocols (e.g., OAuth, SAML, LDAP). Strong understanding of data management principles, including data governance, data modelling, and data analytics. Extensive experience in developing and implementing cybersecurity strategies, including threatmodelling, vulnerability management, and security incident response. Excellent communication More ❯
are built securely Oversee vulnerability management and remediation efforts, including leading responses to pen test findings and security assessments Experience conducting risk assessments and threatmodelling for software development and advise where necessary Experience in software security design review Strong knowledge of Agile, DevSecOps, System Engineer and or More ❯
london, south east england, united kingdom Hybrid / WFH Options
Starling Bank
penetration testing qualification A good understanding of applied cryptographic techniques. Reverse engineering and exploit development capabilities. Experience of security testing in an agile SDLC. Threatmodelling experience. Experience performing code reviews, particularly in Java and Go. Experience of fulfilling a client facing security consulting role. Excellent verbal and More ❯
or corresponding AWS certifications). Comprehensive experience with databases (in the cloud and on-premises) and practical programming skills. Experience in master data modelling and classification of data. Knowledge of SAP Business Warehouse and Master Data Management. Experience with integration patterns and methods like REST, JSON, XML or SOAP … Knowledge of SSO, RBAC, MFA in Azure AD and other modern authentication concepts. Up-to-date knowledge of cybersecurity threats, current best security practices, threatmodelling and risk mitigation techniques. Ability to define Minimum Viable Products (MVPs) and experience delivering them rapidly and with a high rate of More ❯
relationships with peers with a strong sense of accountability and ownership. Knowledge of ISO27001, CE, CE+ Key Tasks Create and perform security assessments and threat models Develop, implement & maintain security standards and plans Research weaknesses and find ways to counter them Respond to attack vectors and security incidents, and More ❯
yet with a strong sense of accountability and ownership. Knowledge of ISO27001, CE, CE+. Key Tasks Security assessments: Create and perform security assessments and threat models. Security standards: Develop, implement & maintain security standards and plans. Vulnerability Management: Research weaknesses and find ways to counter them. Security incident response: Respond More ❯
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO 27001 #J-18808-Ljbffr More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
security needs, and provide actionable recommendations. This role offers a hybrid working model on a 6-month contract with potential extensions. Key Responsibilities: Perform threatmodelling, vulnerability assessments, and ethical hacking on networks, operating systems, and web applications to evaluate security defenses. Develop and execute innovative penetration testing More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Hamilton Barnes Associates Limited
hybrid working arrangement. Want to be part of a team that thrives in excellence? Feel free to reach out and apply today! Responsibilities: Perform threatmodelling, vulnerability assessments, and ethical hacking on networks, operating systems, and web applications to evaluate security defenses. Develop and execute innovative penetration testing More ❯
product managers, development engineers) to address security issues related to architecture design (cloud and on-prem), development practices, application vulnerabilities, with a focus on Threat Modeling. The application security architect will participate in cyber security projects or initiatives aimed at improving the security culture among development teams or delivering … will conduct security reviews of ADP solution designs and architectures to identify potential threats and the security controls to implement. This includes using the Threat Modeling methodology, which you will explain to R&D teams. You will make decisions and take initiatives regarding security risks and influence the technical … principles (Shift-Left, Security by Design). Continuous Learning: Your thirst for learning will help you keep up with the constantly evolving technologies and threat landscape, maintaining your ability to assess new technologies and newly developed products. You are comfortable and thrive in an autonomous role, as this will More ❯
for a Security Engineer to join our Information Security team at our inclusive and beautiful Oxford headquarters. You will be working across software engineering, modelling, and data science bringing your full self, including your security knowledge and expertise to the business. As a Security Engineer at Aurora Energy Research … Ensure security is considered throughout the product and software development life cycle. Provide security best practice, build security design patterns, complete security architecture reviews, threat models and risk assessments. Help solve engineering problems by implementing technical controls to mitigate risk. Ensure we are deploying solutions into a secure environment. More ❯