Cybersecurity Consultant - Threat Modeling

Birmingham
3 months ago
Applications closed

Related Jobs

View all jobs

Cybersecurity Consultant

CyberSecurity – Operations Engineer – Graduates Considered

Operational Technology (OT) Security Consultant

Recruitment

Cyber Security Consultant | Security Assurance SME

Pre Sales Consultant

Cybersecurity Consultant - Threat modelling
Daily Rate: £500 - £600 (Inside IR35 via umbrella)
Contract Length: 3 months initially
Location: Birmingham (3 days onsite required pw)

Are you a Cybersecurity Consultant with a knack for threat modelling? Our client is on the lookout for a talented individual to join their dynamic team for a crucial 3-month engagement. This role is pivotal in identifying and mitigating risks across complex IT and telecommunications infrastructures.

Key Responsibilities:

Conduct comprehensive threat modelling and risk assessments on diverse IT and telecoms infrastructure.
Collaborate with architecture and engineering teams to identify vulnerabilities and recommend effective mitigations.
Develop threat models using a pre-defined methodology.
Produce clear, actionable reports and briefings tailored for both technical and non-technical stakeholders.

Essential Skills & Experience:

Proven experience in threat modelling and security assessment of complex infrastructures.
Strong knowledge of secure design principles and architecture reviews.
A solid background in cybersecurity, ideally with exposure to telecoms environments.
Experience in operational security (Intelligence, Threat Hunting, or Red Team).
Familiarity with threat modelling frameworks such as MITRE ATT&CK, STRIDE, or PASTA.
Ability to drive work to tight timescales and meet deadlines.
Demonstrated ability to work independently and manage priorities in a dynamic environment.

If you are ready to take on this exciting challenge and contribute to securing complex infrastructures, we want to hear from you! Apply now to be considered for this temporary contract opportunity.

Application Process:

Please submit your CV along with a brief cover letter highlighting your relevant experience and skills. We look forward to reviewing your application and potentially welcoming you to our client's team!

Note: This position is ideal for candidates who are immediately available and can commit to the contract length.

Take the next step in your cybersecurity career-apply today!

Cyber Security - Birmingham - Threat Modeling

Adecco is a disability-confident employer. It is important to us that we run an inclusive and accessible recruitment process to support candidates of all backgrounds and all abilities to apply. Adecco is committed to building a supportive environment for you to explore the next steps in your career. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .