Ada, Rust, or Go). Familiarity with scripting like Python and Perl is a plus. Solid understanding of offensive and defensive security principles, including common vulnerabilities (CWEs, CVEs) and OWASP guidelines. Experience with cybersecurity, risk management, and information assurance. Demonstrated ability to read, analyze, and understand code to identify vulnerabilities and explain functionality. Experience with static and dynamic code analysis More ❯
Adversary Simulation, risk and compliance frameworks ISO 27001, NIST, DORA, CREST. TIBER etc.) Willingness to travel to regular F2F end user meetings Familiarity with tools and standards such as OWASP, MITRE ATT&CK etc Self-starter with a results-oriented mindset and the ability to work independently Experience using CRM and sales analytics platforms Ability to thrive in a fast More ❯
London, England, United Kingdom Hybrid / WFH Options
M3EU
tools such as Jest, Cypress or similar. Proficient with source control tools like Git for collaborative development and versioning. Knowledge of secure coding practices and familiarity with standards like OWASP Top Ten and SANS CWE, with a commitment to adapting to evolving security threats through audits and ongoing education. Team-oriented with exceptional collaboration and communication skills, both verbal and More ❯
systems (e.g., Git) and continuous integration/deployment (CI/CD) practices. ·Solid understanding of websecurity practices, including JWT authentication, secure API design, rate limiting, and familiarity with OWASP vulnerabilities. ·Ability to troubleshoot and find solutions without needing hand-holding. Salary & Benefits? No two days are the same at Arcube. In a high-performing and tight-knit team, the More ❯
systems (e.g., Git) and continuous integration/deployment (CI/CD) practices. ·Solid understanding of websecurity practices, including JWT authentication, secure API design, rate limiting, and familiarity with OWASP vulnerabilities. ·Ability to troubleshoot and find solutions without needing hand-holding. Salary & Benefits? No two days are the same at Arcube. In a high-performing and tight-knit team, the More ❯
Hove, England, United Kingdom Hybrid / WFH Options
Tillo
you have experience with PHP testing frameworks and methodologies API testing Creating and executing performance load testing strategies Creating and executing security testing strategies Testing in a fintech business OWASP Top 10 and secure development principles AWS services Benefits We offer all our employees trust and empower our team to work with flexibility and autonomy. We’re a close-knit More ❯
. Key Responsibilities Perform static code analysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years … understanding of secure coding practices in web frameworks (e.g., JavaScript, Python, PHP, Node.js). Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development principles. Strong technical writing and communication skills. Preferred certifications: OSCP , CSSLP , GWAPT , CEH , or equivalent. Deliverables One formal written report including: Executive summary for More ❯
backend code to identify security flaws, misconfigurations, or vulnerabilities. Threat Modelling: Lead and contribute to threat modeling sessions - analyse how our products handle data, map potential attack vectors (especially OWASP Top 10), and design mitigation strategies. Secure Development Practices: Help the development team adopt secure coding practices, identify systematic security issues, and uplift the overall engineering team's security awareness. … improvement. Mandatory Experience: Solid experience as a developerhaving utilised (JavaScript/Python) Ability to read and understand code quickly, including unfamiliar codebases Familiarity with modern security tools (e.g., Snyk, OWASP ZAP, Burp Suite) Strong understanding of common web vulnerabilities (OWASP Top 10) Experience with threat modeling and secure design principles Comfortable translating technical findings into prioritised improvements for the engineering More ❯
testing. Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE. Hands-on experience with tools such as SAST/DAST/IAST, Snyk More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE. Hands-on experience with SAST/DAST/IAST tools such as Snyk More ❯
Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Qualifications: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools More ❯
containerized workloads in collaboration with engineering teams. Evaluate and implement security tools for code analysis and runtime protection. Candidate Requirements: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE. Hands-on experience with tools such as SAST/DAST/IAST, Snyk More ❯
Collaborate to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modeling methods like STRIDE and architectural risk analysis. Hands-on experience with SAST/DAST/ More ❯
teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for code analysis and runtime protection. Requirements: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Familiarity with threat modeling methodologies like STRIDE and risk analysis. Hands-on experience with SAST/DAST/IAST tools More ❯
on-prem). - Posséder une connaissance des réglementations telles que GDPR et HIPAA, et des normes industrielles telles que le NIST Secure Software Development Framework (SSDF) et les projets OWASP (Top 10s, Software Assurance Maturity Model, ApplicationSecurity Verification Standard) pour s'assurer que les applications répondent aux exigences de conformité. - Expérience des outils d'analyse de la vulnérabilité, des More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
testing, and fixing complex vulnerabilities A proven background in credit cards, payments, or financial transaction systems Understanding of modern application architectures (APIs, microservices, cloud platforms – likely Azure) Familiarity with OWASP Top 10, SAST/DAST, and a variety of pen testing techniques A desire to build and lead a team, while remaining technical and practical day to day Right to More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
testing, and fixing complex vulnerabilities A proven background in credit cards, payments, or financial transaction systems Understanding of modern application architectures (APIs, microservices, cloud platforms – likely Azure) Familiarity with OWASP Top 10, SAST/DAST, and a variety of pen testing techniques A desire to build and lead a team, while remaining technical and practical day to day Right to More ❯
Experience in designing and building scalable, responsive systems. Experience in NoSQL such as ElasticSearch. Knowledge of technologies such as WebRTC, AJAX and Web Sockets. Knowledge and experience working to OWASP ASVS or equivalent applicationsecurity standards. Proven experience of delivering applications with a high degree of usability. Experience of working in an Agile environment, preferably SCRUM. Framework experience such as More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
in different types of software and programming languages, including: How to test for/exploit them Real world mitigations that can be applied Familiarity with vulnerability classification frameworks (e.g. OWASP Top 10, CVSS, MITRE CVE) What We’ll Give You A team of very skilled and diverse personnel across the globe Ability to work in a hybrid work environment Exposure More ❯
will help you succeed Technical Skills: Experience with Governance, Risk, and Compliance (GRC) tools (preferred: OneTrust). Familiarity with AGILE methodologies, preferably Atlassian/Jira. Understanding of ApplicationSecurity (OWASP Top 10). Knowledge of web development technologies and programming languages. Proficiency with security assessment tools and techniques. Understanding of legal and regulatory obligations related to information security. Risk Management More ❯
years experience performing penetration testing (against web applications) Experience securing cloud-based infrastructures and solutions Previous experience working on an information security team Advanced knowledge of common security vulnerabilities (OWASP) and best practices Familiarity with SOC II controls and how to review them Experience in other technical roles (SysAdmin, Helpdesk, etc.) Strong understanding of Linux server environments Experience with Kanban More ❯
/negotiate technical outcomes with 3rd parties, including conflict resolution due to changing priorities. Experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. Actively represent the security organisation within More ❯
with our Legal and Privacy as well as the wider Technology team. Internally-facing, you will help train and upskill your fellow Two Circlers on topics such security awareness, OWASP Top 10 and Security by Design, as well as understanding and feeding into their processes and workflows, to keep good security practice on the agenda. Externally, this role will also More ❯
London, England, United Kingdom Hybrid / WFH Options
RSM UK
ago London, England, United Kingdom £40,000.00-£50,000.00 1 month ago London, England, United Kingdom 1 week ago London, England, United Kingdom 2 weeks ago Cybersecurity Consultant - CISSP, OWASP, Azure Operational Information Security Officer London, England, United Kingdom 2 weeks ago London, England, United Kingdom 3 weeks ago Business Information Security Officer, Europe London, England, United Kingdom 22 hours More ❯
security. Good Knowledge of information security principles and best practices and experience in managing information security risk. Familiar with information security frameworks such as NIST, SANS Top 20 CSC, OWASP, ISO27001, CyberEssentials or other similar frameworks. Good knowledge of industry IT compliance standards, particularly in design and implementation. Good Understanding of Operational Technology and the challenges involved in securing access. More ❯