National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Engineer (London Area)

ApTask
London
2 weeks ago
Create job alert

Threat Modelling Engineer - GCP (Senior Associate, Technology)

Job DescriptionAs a Senior Engineer - Threat Modelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and Threat Modelling, encompassing governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration and partnership with Engineering, Information Security, Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security opportunities, identify exploitable threats, and propose mitigation strategies.Your Impact

•Conduct thorough threat modeling exercises utilizing established methodologies and frameworks

•Maintain a rigorous standard of excellence in identifying potential threats and specifying effective mitigation controls.

•Manage the lifecycle of identified threats and associated controls, ensuring timely updates and adjustments as necessary.

•Deliver comprehensive threat models and related tasks within specified timeframes.

•Offer constructive feedback, support, and suggestions for enhancing the existing threat modeling process.

•Present findings and progress updates to senior leadership, team members, and relevant technical stakeholders.


QualificationsWe are seeking an ideal candidate with 8+ years of experience in a range of technologies and processes including:

•Proficiency in GCP - essential

•Strong knowledge of security architecture principles, frameworks, and best practices

•Experience working with threat modeling methodologies such as MITRE ATT&CK, STRIDE, PASTA etc.

•Overall experience in Cybersecurity: 5+ years

•Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and network/segmentation

•Knowledge of cloud security frameworks

•knowledge of Rest API

•Knowledge in scripting languages and Infrastructure as Code (Terraform, CloudFormation)

•Familiarity with Jira or other ticketing systems – essential

•Technical architecture design and review skills – essential

•Ability to identify vulnerabilities using CWE or OWASP

•Knowledge of operating systems and their hardening techniques

•Understanding of development concepts such as CICD, Pipelines, and SDLC

•Penetration testing knowledge is also super useful

•Familiarity with Cloud Development Kit (CDK) and GitOps

•Experience operating in a DevOps/agile team environment

•Understanding of docker, Kubernetes, serverless architecture, and Helm

•Exposure to platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, and Databricks

•Strong analytical skills, diligence, and attention to detail

•Willingness to conduct research using vendor documentation

•Capability to create and maintain high-quality documentation

•Possession of an adversary mindset

•Continuous learning attitude towards new technologies and methodologies

•Strong problem-solving skills

•Excellent communication and collaboration abilities

•Ability to build and nurture relationships across cross-functional teams

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Network Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.

Top 10 Mistakes Candidates Make When Applying for Cyber Security Jobs—And How to Avoid Them

Avoid the most common pitfalls when applying for cyber security jobs in the UK. Discover the top 10 mistakes candidates make—plus practical fixes, insider tips and curated resources that will help you secure your next infosec role. Introduction Whether it’s a Security-Operations Centre (SOC) in Canary Wharf or a fast-growing threat-intelligence start-up in Manchester, demand for cyber security talent continues to surge. Yet hiring managers on CyberSecurityJobs.tech still reject the majority of applications long before interview—usually for mistakes that can be fixed in minutes. We analysed recent vacancies, spoke with in-house recruiters and combed through the most-read guides on our site. Below is a definitive list of the ten most expensive mistakes we see, each paired with an actionable tip and a trusted resource for deeper reading. Bookmark this page before you press Apply.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.