Information Security Specialist Jobs in Stoke-on-Trent

2 Information Security Specialist Jobs in Stoke-on-Trent

Information Security Specialist

City Of Stoke-On-Trent, England, United Kingdom
Hybrid / WFH Options
bet365
Who we are looking for An Information Security Specialist who will focus on the technical side of IT Security, specifically looking at application security and code analysis to ensure applications are built securely. The Information Security team deal with the security of … closed-sourced, open-source and in-house written applications. The objective is to ensure that systems and services are built with privacy and security by design. You will be working closely with the Software Development team, to confirm that application based vulnerabilities are understood and mitigated. This is done … from a security assessment point of view rather than code QA, therefore code reading skills are desirable. The team comprises of a variety of individuals, ranging from graduates to time served engineers with backgrounds as sys-admin, networks, service operation as well as security. We use first-class, enterprise more »
Posted:

Senior Information Security Specialist

City Of Stoke-On-Trent, England, United Kingdom
Hybrid / WFH Options
bet365
Who we are looking for A Senior Information Security Specialist to focus on the technical side of IT Security, specifically looking at application security and code analysis to ensure applications are built securely. The Information Security team deal with the security of … closed sourced, open source and in house written applications. The objective is to ensure that systems and services are built with privacy and security by design. You will work closely with the Software Development team to confirm that application based vulnerabilities are understood and mitigated. This is done from … a security assessment point of view rather than code QA, therefore code reading skills are desirable. The team comprises of graduates to time served engineers with backgrounds as sys-admin, networks, service operation as well as security. We use first-class, enterprise-level tools to identify threats to the more »
Posted: