team. In this fully remote UK-based role, you will conduct IT security audits and assessments for clients across the United Kingdom and the European region, ensuring compliance with PCIDSS, ISO 27001/2, GDPR, NIS2, DORA, and other relevant frameworks. This position offers the opportunity to become a PCI QSA (training and certification sponsored by … auditing or consulting experience. Bachelors degree in information security or related field. Deep knowledge of IT security controls, access management, logging, vulnerability assessment, and secure system configuration. Experience with PCIDSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. Strong understanding of cloud environments and network architectures. Excellent English communication skills; fluency in German strongly More ❯
Security . Vulnerability Management: Lead enterprise-wide vulnerability assessments, remediation programmes, and Breach and Attack Simulation (BAS) exercises for proactive threat mitigation. Compliance & Third-Party Security: Ensure adherence to PCIDSS, ISO 27001, SOC 2 , and perform rigorous third-party security risk assessments. Secure Software Development (SDLC): Embed secure coding practices into development lifecycles, enabling DevSecOps and automation More ❯
or Adyen/Stripe. Experience building event-driven architectures or integrating with message queues (Kafka, Pub/Sub). Knowledge of compliance frameworks relevant to billing systems (e.g., SOX, PCI-DSS, GDPR). Experience working in high-scale SaaS environments with complex pricing and packaging logic. Background in finance-oriented engineering, such as auditability, reconciliation, and ledger alignment. More ❯
from those teams (compute, networking, search, storage) Experience in a collaborative, agile development environment. Preferred Qualifications Experience and understanding of multi-AD/AZ and regional data centers FedRAMP, PCIDSS, or similar compliance and auditing experience Experience and detailed technical knowledge in PaaS engineering. Expertise in applying threat modeling or other risk identification techniques to develop securityMore ❯