Cambridge, Cambridgeshire, England, United Kingdom
Opus Recruitment Solutions Ltd
built solutions. Hands-on experience with Azure DevOps , CI/CD pipelines , and containerized environments ( Docker , Kubernetes ). Strong knowledge of API testing , performance profiling, and security practices including OWASP Top 10 and penetration testing . Familiarity with AI/ML systems , including LLM evaluation techniques, output scoring, and validation frameworks. Understanding of prompt engineering , RAG , model orchestration , and hallucination More ❯
through training, documentation, and direct engagement. DevSecOps Engineer - Requirements: 3-5+ years of experience in applicationsecurity or secure software development. Strong understanding of vulnerabilities and prevention techniques (OWASP Top 10). Experience with CI/CD pipelines and integrating AppSec tooling. Strong understanding of modern programming languages (JavaScript, Java, Python). Strong communication skills and ability to collaborate More ❯
Core Experience of using observability systems such as Elastic APM or DataDog to track and diagnose issues in production A solid understanding of security principles and secure coding including OWASP Top 10 Nice to haves: o Experience in VOIP, (SIP and RTP advantageous) o Experience of TDD/BDD/DDD o Knowledge of PCI compliance and associated standards such More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
La Fosse
designs, and ensure integration with SIEM and monitoring systems. Demonstrated proficiency in network/system security (firewalls, IDS/IPS, micro-segmentation), IAM (RBAC, ABAC, JWT), secure coding practices (OWASP, SANS), and hands-on experience with tools like Trellix, Ivanti, ClearSwift. Deep knowledge of Kubernetes and container security (RBAC, network policies, runtime protection), CI/CD pipeline hardening (Git, SonarQube More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯