Secure Coding Jobs

66 Secure Coding Jobs

Senior Linux DevOps Engineer

Dallas, Texas, United States
Request Technology - Craig Johnson
Servers. Create and Patch AMIs, perform pull requests, write Automation code using tools such as Ansible, Terraform, etc. Cloud Experience - Strong knowledge of secure cloud infrastructure design and components, such as: Servers, operating systems, networks, IAM, and storage. Cloud Certifications, specifically AWS Cloud certification would be preferred. Infra … automation development toolchain including Terraform, Ansible, Jenkins, Git, Harness. CICD Experience - Mastery of CICD best practices in a large organization. (GitOps/DevOps, secure builds, secure code promotion, deployments (Harness/Argo), automated testing (app and infra), integration of policy frameworks, cost-optimization, SLSA best practices more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Linux DevOps Engineer

Chicago, Illinois, United States
Request Technology - Craig Johnson
Servers. Create and Patch AMIs, perform pull requests, write Automation code using tools such as Ansible, Terraform, etc. Cloud Experience - Strong knowledge of secure cloud infrastructure design and components, such as: Servers, operating systems, networks, IAM, and storage. Cloud Certifications, specifically AWS Cloud certification would be preferred. Infra … automation development toolchain including Terraform, Ansible, Jenkins, Git, Harness. CICD Experience - Mastery of CICD best practices in a large organization. (GitOps/DevOps, secure builds, secure code promotion, deployments (Harness/Argo), automated testing (app and infra), integration of policy frameworks, cost-optimization, SLSA best practices more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux Engineer

Chicago, Illinois, United States
Request Technology
and physical Servers. Create and Patch AMIs, perform pull requests, write Automation code using tools such as Ansible, Terraform, etc. Strong knowledge of secure cloud infrastructure design and components, such as: Servers, operating systems, networks, IAM, and storage. Cloud Certifications, specifically AWS Cloud certification would be preferred. Expert … in core automation development toolchain including Terraform, Ansible, Jenkins, Git, Harness. Mastery of CICD best practices in a large organization. (GitOps/DevOps, secure builds, secure code promotion, deployments (Harness/Argo), automated testing (app and infra), integration of policy frameworks, cost-optimization, SLSA best practices more »
Employment Type: Permanent
Salary: USD 160,000 Annual
Posted:

Linux Engineer

Dallas, Texas, United States
Request Technology
and physical Servers. Create and Patch AMIs, perform pull requests, write Automation code using tools such as Ansible, Terraform, etc. Strong knowledge of secure cloud infrastructure design and components, such as: Servers, operating systems, networks, IAM, and storage. Cloud Certifications, specifically AWS Cloud certification would be preferred. Expert … in core automation development toolchain including Terraform, Ansible, Jenkins, Git, Harness. Mastery of CICD best practices in a large organization. (GitOps/DevOps, secure builds, secure code promotion, deployments (Harness/Argo), automated testing (app and infra), integration of policy frameworks, cost-optimization, SLSA best practices more »
Employment Type: Permanent
Salary: USD 160,000 Annual
Posted:

Senior PHp Developer

Dudley, West Midlands, West Midlands (County), United Kingdom
Tank Recruitment
ensuring it meets the operational needs of the organization. Contribute to the design, development, and implementation of new features and functionalities. Write clean, secure, and efficient code adhering to best practices. Conduct thorough testing and debugging to ensure the reliability and stability of the software. Stay updated with … Minimum 3 years of PHP and MVC experience in Laravel. Proficiency in HTML, JavaScript, and jQuery with demonstrable experience. Strong understanding of writing secure code and best practices. Excellent MySQL knowledge. Experience with GIT for version control. Educated to A-level or equivalent recognized developer qualifications. Excellent verbal more »
Employment Type: Permanent
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file … certification in either AWS or Azure, with a Security specialization. • Experience in working within regulated environments, such as PCI-DSS • Experience in defining secure development lifecycles. Qualifications • Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. • CISSP, Certified Information Systems Security Professional more »
Posted:

Security Architect - Telecom

Reading, England, United Kingdom
Vallum Associates
to authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security includes but is not limited to, network security, host security, database security, device security, VPNs and SSLs, secure … certification in either AWS or Azure, with a Security specialisation. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development lifecycles. Qualifications Bachelor's Degree in Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, or Physics. CISSP, Certified Information Systems Security Professional more »
Posted:

Cybersecurity Architecture - Technical

Springfield, Virginia, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Arlington, Virginia, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Washington, Washington DC, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Idaho Falls, Idaho, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Chandler, Arizona, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Pensacola, Florida, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Architecture - Technical

Stennis Space Center, Mississippi, United States
Department of Homeland Security
to budget for, architect, and design enterprise cybersecurity solutions. Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications. Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses … depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks. Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual … environments incorporating secure controls. Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures. Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Product Security Lead

London, Barking
Chase
and scale. You're a security expert with a strong mix of technical and communication skills and are passionate about enabling safe and secure innovation. You will work with some of the best and brightest cybersecurity and technology engineers to solve complex problems which will both challenge you … that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes.? Embed threat modelling, solutions architecture, secure code review into product and application teams so they adopt our control products and create products that are secure from the start. … Demonstrated experience/understanding with product technologies including but not limited to: Understanding of Public Cloud computing, especially how controls are applied to secure data, ensure resiliency and availability. APIs micro-services Ability to collaborate on, and/or lead, ad hoc teams for control architecture and design more »
Employment Type: Permanent
Posted:

Systems Architect

London, England, United Kingdom
Hybrid / WFH Options
Jisc
will include: • Application of in-depth technical knowledge and expertise in systems and enterprise architecture principles, methodologies, and best practices, to design scalable, secure, and high-performance systems. • Works with our "Technical Design Authority" crafting technology and design choices, to create and input into our technical design strategy. … consult with multiple teams with multiple design requirements. • Extensive understanding of building highly scalable applications on the AWS serverless architecture. • Ability to write secure code to the highest standard. Please refer to the job description for full details. Don't meet every single requirement? We know that sometimes more »
Posted:
Secure Coding
10th Percentile
£52,250
25th Percentile
£61,250
Median
£70,000
75th Percentile
£84,919
90th Percentile
£95,000