following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
london (city of london), south east england, united kingdom
Ncounter Technology Recruitment
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
Nx monorepo , ensuring consistent cross-layer contracts and type safety (tRPC/GraphQL). Establish CI/CD and GitOps practices with GitHub Actions and ArgoCD, including automated testing, vulnerabilityscanning, and environment promotion workflows. Drive the definition and implementation of observability standards - Prometheus, Grafana, Loki/ELK, Jaeger, Sentry - enabling end-to-end visibility and SLA tracking. More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
london (city of london), south east england, united kingdom
Damia Group
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and production environments. Operate key Azure services including App Services, AKS, Azure Functions, Virtual Networks, and Azure SQL. Implement security controls using Azure Active Directory, Key Vault, RBAC, and vulnerabilityscanning tools. Set up monitoring and alerting with Azure Monitor and Application Insights for high availability. On-Premises Infrastructure Aspects Maintain integration and support for hybrid cloud scenarios More ❯
and production environments. Operate key Azure services including App Services, AKS, Azure Functions, Virtual Networks, and Azure SQL. Implement security controls using Azure Active Directory, Key Vault, RBAC, and vulnerabilityscanning tools. Set up monitoring and alerting with Azure Monitor and Application Insights for high availability. On-Premises Infrastructure Aspects Maintain integration and support for hybrid cloud scenarios More ❯
and senior stakeholders. Qualifications Strong background in network infrastructure design and review , with a focus on security. Proven experience designing and documenting security architectures and solutions . Expertise in vulnerabilityscanning design and implementation . Ability to evaluate and integrate new technologies and innovations under tight delivery schedules. Excellent communication and presentation skills when engaging at all levels. More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle >selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
london (city of london), south east england, united kingdom
Intelix.AI
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
certifications (Required no exceptions)57 years of experience with:Layer 2/3 routing & troubleshootingRouters, switches, and network infrastructureAWS, Azure, or hybrid cloud environmentsUnix (RedHat), Windows, VMware23 years with vulnerabilityscanning tools (Rapid7 Nexpose preferred)Nice to Have:CCDA or CCIEState government experienceOnly local candidates to Ocoee, FL will be considered.No relocation. No remote. No exceptions without required More ❯
to business operations and detrimental service to MUFG clients leading to a deterioration client trust. Own and oversee the cyber risk management framework, including implementation and continuous improvement of vulnerabilityscanning, penetration testing, and crisis response protocols, ensuring alignment with regulatory expectations and internal risk appetite. Accountable for managing, maintaining and improve the necessary controls, processes and facilities More ❯