forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
technologies of at least one of the major public Cloud Service Providers (GCP, AWS or Azure) and the security features they provide (Key & Secret management, IAM, Service Accounts, Workload/VM Identities, TLS/PKI, Load Balancing, storage encryption, data localization, etc.). Experience on developing & comprehending source code … in Web- and Cloud-relevant languages, such as Java, Ruby, Rust, Go, Python, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, access management, and secretsmanagement technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied … Experience in identifying and mitigating security vulnerabilities on software running on cloud platforms (OWASP Web Top10 vulnerabilities, data encryption, transport layer protections, insecure configurations, secretsmanagement, etc.). Experience with cloud confidential computing, virtualization, enclaves, containers, and workload attestation technologies. Problem solving skills, analytical thinking, and willingness to More ❯
Huntingdon, Cambridgeshire, United Kingdom Hybrid / WFH Options
慨正橡扯
products: Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25) Expertise in identity and access management (IAM), including RBAC, ABAC, JWT, and cookie-based authentication Incident detection and response in MOD environments Security compliance and regulatory frameworks (e.g., NIST, CIS … advocate for security best practices in a DevOps culture Desirable Skills Containerization Security Expertise in Kubernetes security (e.g., RBAC, network policies, pod security standards, secretsmanagement) Knowledge of container runtime security (e.g., container escapes, rootless containers, sandboxing) Image security best practices, including scanning, signing, and provenance verification Secure … CI/CD pipeline design with security testing using tools like Git and SonarQube Implementation of Infrastructure as Code (IaC) security (e.g., Terraform, Ansible) Secretsmanagement in CI/CD pipelines using Vault or Kubernetes Secrets Security automation and policy enforcement using tools like GitHub Actions, GitLab More ❯
Key Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secretsmanagement, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and … cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for vulnerability … scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate security into More ❯
Key Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secretsmanagement, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and … cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for vulnerability … scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate security into More ❯
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable … operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secretsmanagement (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when More ❯
explain technical concepts to technical and non-technical stakeholders. Hands on experience of some or all of the following: Experience with automation/configuration management, e.g. Terraform Experience with AWS or GCP Experience with at least one and associated certifications for at least one of the following: AWS (ideally … certified Solutions Architect Professional) GCP (ideally certified Professional Cloud Architect) Azure (ideally certified Solutions Architect Expert) Experience of enterprise secretsmanagement systems, e.g. HashiCorp Vault, AWS secrets manager Experience in supporting production systems for high profile, mission critical systems. Experience with hybrid cloud technologies including OpenShift, Google More ❯
explain technical concepts to technical and non-technical stakeholders. Hands on experience of some or all of the following: Experience with automation/configuration management, e.g. Terraform Experience with AWS or GCP Experience with at least one and associated certifications for at least one of the following: AWS (ideally … certified Solutions Architect Professional) GCP (ideally certified Professional Cloud Architect) Azure (ideally certified Solutions Architect Expert) Experience of enterprise secretsmanagement systems, e.g. HashiCorp Vault, AWS secrets manager Experience in supporting production systems for high profile, mission critical systems. Experience with hybrid cloud technologies including OpenShift, Google More ❯
Description Position Description: The IAM Senior Engineer will be responsible for supporting the development and delivery of Privileged Account Management (PAM) solutions for our on-prem and cloud infrastructure. This is a multifaceted role that involves engineering, hands-on support, and advanced troubleshooting responsibilities as well support of project … Position Responsibilities: Assist in the buildout of Hashicorp Vault enterprise in a highly available environment Streamline application onboarding and migration as it relates to secretsmanagement within Hashicorp Vault and CyberArk Work with IT teams across the company to ensure Hashicorp Vault and CyberArk are adopted consistently and … junior staff Qualifications: Hands-on PAM solution experience, SaaS/Cloud based vendors preferred Proven experience with automation, CI/CD, orchestration, and configuration management Experience with CI/CD tools such as Jenkins Experience with image lifecycle management using tools such as Packer Experience with Infrastructure as More ❯
applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerability management … implementing, securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secretsmanagement, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining … implementing relevant security checks. Solid experience with container security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerability management programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex More ❯
applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerability management … implementing, securing, and managing a wide range of AWS security services. Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secretsmanagement, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining … implementing relevant security checks. Solid experience with container security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerability management programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex More ❯
of Shell scripting experience. Familiarity with Linux containerization concepts. Willingness and ability to work to an Agile methodology. Experience with CI/CD, release management, and DevOps practices - working with GitLab CI/CD or similar. Experience working in a Linux environment. Experience working with microservices. Git source control … VFX industry. Experience in deploying to Kubernetes clusters. Understanding of the secure nature of our work and its impact on our workflows. Experience with secretsmanagement solutions e.g. Hashicorp Vault. In return we offer: 25 days holiday, plus bank holidays. 2 paid volunteering days per calendar year. Hybrid More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Peaple Talent
streamlined pipeline development. Strong experience working with cloud-based data services, especially within AWS environments, utilizing tools like Lambda, S3, Redshift, Glue, Athena and Secrets Manager. Skilled in building modern data warehouses on platforms like Amazon Redshift, Snowflake, or Databricks. If you are interested in this position please apply More ❯
concepts to colleagues of technical and non-technical backgrounds. We would be particularly excited if you have: Expertise Implementing and maintaining Hashicorp Vault for secretsmanagement and PKI Experience hardening containerised environments including Kubernetes clusters A blog, GitHub account and/or bug bounty findings that demonstrate your More ❯
Birmingham, Alabama, United States Hybrid / WFH Options
DEPLOY
leadership skills specific to data engineering, and strategic vision for data processing. Responsibilities The responsibilities for this position include the following: Provide general Leadership, Management, and Accountability (LMA) for ETL developers and data engineers, ensuring best practices in data processing. Develop and maintain ETL pipelines for structured and unstructured … driven automation, data integrity, and team productivity. Qualifications Competencies and Qualities Qualified candidates must have the following competencies and qualities: Excellent problem-solving, project management, and stakeholder communication skills Interest in AI/ML techniques for data processing, with a willingness to apply AI-driven automation over time Able … ML techniques for data transformation and anomaly detection Experience with DevOps practices, CI/CD pipelines, and containerization (Docker, Kubernetes) Experience with S3, EC2, Secrets Manager, CloudWatch, RDS Experience building complicated Regular Expressions Knowledge of data governance and regulatory compliance frameworks Supervisory Responsibility This position provides direct oversight and More ❯