business teams. Preferred Qualifications Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Relevant certifications such as CISSP, CSSLP, or cloud-specific security certifications. Experience mentoring junior engineers and contributing to thought leadership initiatives. A Day in the Life of an Engineer at More ❯
business teams. Preferred Qualifications Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Relevant certifications such as CISSP, CSSLP, or cloud-specific security certifications. Experience mentoring junior engineers and contributing to thought leadership initiatives. A Day in the Life of an Engineer at More ❯
business teams. Preferred Qualifications Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Relevant certifications such as CISSP, CSSLP, or cloud-specific security certifications. Experience mentoring junior engineers and contributing to thought leadership initiatives. We'd Also Like To See Contribution to the More ❯
certifications in cybersecurity or application security (CompTIA, ISC2, GIAC, ISACA, or CREST). Highly desirable are certifications related to secure development and cloud security (CSSLP, AZ-500, SC-100/SC-200, AWS Security, GCSA, GCLD, or similar). Familiarity with secure coding standards (OWASP, SEI CERT) and SSDLC More ❯
staff and non-technical stakeholders. To be considered for this role, you must have at least two of the following: Recognized industry certifications (CISSP, CSSLP, CISM, etc.). Participation in recognized industry working groups focused on information security. Experience with governance and security certifications (SOC2, ISO27001, FIPS). Bsc More ❯
to engage with developers, executives and clients. Experience in consulting and working with multiple clients on application security projects. Certifications: CISSP, OSCP, GWAPT, CEH, CSSLP, or other relevant security certifications. Seniority level Mid-Senior level Employment type Full-time Job function Information Technology Industries Computer and Network Security, IT More ❯
able to justify and communicate design decisions Develop vision, principles and strategy for security architecture Knowledge, Skills and Abilities: CPSA or equivalent highly appreciated CSSLP or equivalent highly appreciated CISSP or equivalent is appreciated Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit More ❯
Jira for issue tracking and Notion for documentation . Experience working in cross-functional teams in a fast-paced environment. Security certifications such as CSSLP, CISSP, OSCP, CEH, or GWEB are a plus. How to Apply Submit your CV or contact Ash Ali directly for immediate consideration. More ❯
and how to build security into them. A strong grasp of secure coding practices, vulnerability management, and secure architecture principles. Relevant certifications (such as CSSLP, OSWE, CISSP, or CREST) are a strong plus. Bonus Points If You Have: AWS security certifications Experience with infrastructure as code (Terraform, CloudFormation) and More ❯
especially AWS environments. Experience with API security standards (e.g., OWASP API Top 10). Familiarity with DevSecOps practices and tools. One or more certifications: CSSLP, CISSP, OSWE, CREST CRT/CCT App, GIAC GWAPT. Apply Today: If you're a proactive security expert with a passion for securesoftwareMore ❯
Application Security Consultant – Remote CSSLP, CISSP, OSWE, GWAPT, CREST CRT/CCT App A leading Technology consultancy is looking for an Application Security Consultant to play a key role in embedding security into the heart of modern software development practices. The role: You’ll work closely with engineering teams More ❯
Application Security Consultant – Remote CSSLP, CISSP, OSWE, GWAPT, CREST CRT/CCT App A leading Technology consultancy is looking for an Application Security Consultant to play a key role in embedding security into the heart of modern software development practices. The role: You’ll work closely with engineering teams More ❯
Who are we? Smarsh empowers its customers to manage risk and unleash intelligence in their digital communications. Our growing community of over 6500 organizations in regulated industries counts on Smarsh every day to help them spot compliance, legal or reputational More ❯
computing/edge processing, multi-physics, Masters in computer science, custom Artificial Intelligence, data engineering, Bachelors in computer science. CertifiedSecureSoftwareLifecycleProfessional (CSSLP) is essential. Critical modeling experience with a focused processing of converting pieces of unstructured data into structured data. Extensive experience in AI powered softwareMore ❯
computing/edge processing, multi-physics, Masters in computer science, custom Artificial Intelligence, data engineering, Bachelors in computer science. CertifiedSecureSoftwareLifecycleProfessional (CSSLP) is essential. Critical modeling experience with a focused processing of converting pieces of unstructured data into structured data. Extensive experience in AI powered softwareMore ❯
transparency, and excellence in all aspects of work. CERTIFICATIONS (preferred but not required): Certified Information Systems Security Professional (CISSP) CertifiedSecureSoftwareLifecycleProfessional (CSSLP) Certified Ethical Hacker (CEH) Offensive Security CertifiedProfessional (OSCP) AWS Certified Security – Specialty or similar cloud security certifications COMPENSATION & PERKS Amazing and accessible office More ❯