Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Lawrence Harvey
Requirements Significant demonstrable expertise in Front-end development of large-scale systems dealing with high numbers of users, transactions and business processes. Detailed working knowledge and extensive experience of open-source technologies including HTML, CSS, client and server-side JavaScript, TypeScript, Node.js and other front-end frameworks. Experience in building accessible compliant user interfaces (WCAG). Proven ability More ❯
of Kotlin/Java Strong knowledge of Android SDK, Android UI design principles, patterns, and best practices Experience with offline storage, threading, and performance tuning Awesome knowledge of the open-source Android ecosystem and the libraries available for common tasks and benchmarking and optimisation Proficient in Google's Android design principles, interface guidelines and code versioning tools, such More ❯
and Java. Deep understanding of the Android SDK, UI design principles, and best practices. Strong experience with performance tuning, offline data storage, and multi-threading. Familiarity with the wider open-source Android ecosystem, including commonly used libraries and optimisation tools. Proficiency in Android design guidelines, Git-based version control, and the application of SOLID principles. Hands-on experience More ❯
and Java. Deep understanding of the Android SDK, UI design principles, and best practices. Strong experience with performance tuning, offline data storage, and multi-threading. Familiarity with the wider open-source Android ecosystem, including commonly used libraries and optimisation tools. Proficiency in Android design guidelines, Git-based version control, and the application of SOLID principles. Hands-on experience More ❯
causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary behaviour and recommending follow-up actions when threats are confirmed. • Threat More ❯
causes using MITRE ATT&CK. o Recommend and coordinate response actions to mitigate impact during active incidents. • IOC and Threat Analysis o Investigate indicators of compromise using commercial and open-source threat intelligence. o Validate alerts and determine their relevance to customer environments, providing context on adversary behaviour and recommending follow-up actions when threats are confirmed. • Threat More ❯