EKS, AKS, OpenShift), CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/ More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies like STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies like STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools like SAST More ❯
to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools More ❯
using IIS. Full understanding of the MVC pattern, REST APIs and asp.net controllers are a must. Web developers should be aware of security vulnerabilities, such as those identified in OWASP, and their code should mitigate these threats. Knowledge Required: You will need experience in the design, creation and maintenance of websites across multiple platforms. The most important duties and responsibilities More ❯
using IIS. Full understanding of the MVC pattern, REST APIs and asp.net controllers are a must. Web developers should be aware of security vulnerabilities, such as those identified in OWASP, and their code should mitigate these threats. Knowledge Required: Web Developers will need experience in the design, creation and maintenance of websites across multiple platforms as follows: Writing efficient code More ❯
Southend-on-Sea, Essex, United Kingdom Hybrid / WFH Options
Avanti Recruitment
Core (essential) JavaScript, HTML, CSS (essential) MVC pattern and ASP.NET controllers (essential) JSON, Bootstrap IIS REST APIs Beneficial experience: UI binding frameworks (Vue.js, AngularJS, React, Knockout) Basic SEO knowledge OWASPsecurity awareness Mobile applications development We're looking for: 1+ years of web development experience Degree in Computer Science or related field (preferable) Experience in debugging and profiling applications Full More ❯
Core (essential) JavaScript, HTML, CSS (essential) MVC pattern and ASP.NET controllers (essential) JSON, Bootstrap IIS REST APIs Beneficial experience: UI binding frameworks (Vue.js, AngularJS, React, Knockout) Basic SEO knowledge OWASPsecurity awareness Mobile applications development We're looking for: 1+ years of web development experience Degree in Computer Science or related field (preferable) Experience in debugging and profiling applications Full More ❯
. Key Responsibilities Perform static code analysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years … in ApplicationSecurity , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development principles. Strong technical writing and communication skills. Preferred certifications: OSCP , CSSLP , GWAPT , CEH , or equivalent. Executive summary for non-technical stakeholders. Technical breakdown of findings with severity and More ❯
. Key Responsibilities Perform static code analysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years … in ApplicationSecurity , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development principles. Strong technical writing and communication skills. Preferred certifications: OSCP , CSSLP , GWAPT , CEH , or equivalent. Executive summary for non-technical stakeholders. Technical breakdown of findings with severity and More ❯
. Key Responsibilities Perform static code analysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years … in ApplicationSecurity , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development principles. Strong technical writing and communication skills. Preferred certifications: OSCP , CSSLP , GWAPT , CEH , or equivalent. Executive summary for non-technical stakeholders. Technical breakdown of findings with severity and More ❯