Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
teams and business stakeholders is essential. Experience working with security issues in software architecture, software development, e.g. static and/or dynamic code analysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous integration and … Security Architect, SDLC, Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application Threat Modelling, Security Policy, Security Controls, ISO 27001, NIST, GDPR, Cloud, Azure. Please note that due to a high level of applications, we can only respond to applicants More ❯
languages and Infrastructure as Code (Terraform, CloudFormation) •Familiarity with Jira or other ticketing systems – essential •Technical architecture design and review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetration testing knowledge is also super useful •Familiarity with Cloud Development Kit More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
Ivanti
Experience with Azure Managed Services, Docker, Kubernetes, Terraform, Helm Experience building modern web apps using Angular and Typescript Experience working in Azure DevOps managing backlogs etc Working knowledge of OWASPsecurity best practices Knowledge of working with FedRamp compliance Our Employer Commitment This job posting will remain active until a qualified candidate is identified. At Ivanti, we are committed to More ❯
Minimum 5 years of practical penetration testing experience (web, infrastructure, external/internal). Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, Kali Linux). Excellent written and verbal communication skills. OSCP is essential. Experience with red teaming or threat More ❯
Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from … a secure coding perspective. Ensure compliance with secure development standards (OWASP Top 10, etc.). Test Management Oversee testing across multiple teams and or products. Handle stakeholder communication, budget, vendor selection, and process compliance. Test Architectecture Design testing frameworks, strategies, and toolchains. Advise on choosing tools (e.g., UFT vs Selenium) and scaling automation. API Testing Validate REST/SOAP APIs More ❯
Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from … a secure coding perspective. Ensure compliance with secure development standards (OWASP Top 10, etc.). Test Management Oversee testing across multiple teams and or products. Handle stakeholder communication, budget, vendor selection, and process compliance. Test Architectecture Design testing frameworks, strategies, and toolchains. Advise on choosing tools (e.g., UFT vs Selenium) and scaling automation. API Testing Validate REST/SOAP APIs More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
in different types of software and programming languages, including: How to test for/exploit them, real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) Ability to threat model systems/applications/platforms to assess design and find flaws that can be exploited What We’ll Give You A More ❯
will help you succeed Technical Skills: Experience with Governance, Risk, and Compliance (GRC) tools (preferred: OneTrust). Familiarity with AGILE methodologies, preferably Atlassian/Jira. Understanding of ApplicationSecurity (OWASP Top 10). Knowledge of web development technologies and programming languages. Proficiency with security assessment tools and techniques. Understanding of legal and regulatory obligations related to information security. Risk Management More ❯
/negotiate technical outcomes with 3rd parties, including conflict resolution due to changing priorities. Experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. Actively represent the security organisation within More ❯
and database design (Oracle, PL/SQL, Mongo) Performance & load test improvements via memory and thread dump analysis; knowledge of development testing (JUNIT, Cucumber, Selenium); understanding of Security aspects, OWASP guidelines. experience in Performance Analysis and applications tuning understanding of Kubernetes Identity and access management such as Forgerock different integration technologies, data streaming technologies and Kafka understanding of Kafka architecture More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
in different types of software and programming languages, including: How to test for/exploit them Real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) What We’ll Give You A team of very skilled and diverse personnel across the globe Ability to work in a hybrid work environment Exposure More ❯