Remote Secure Coding Jobs in Bradford

4 of 4 Remote Secure Coding Jobs in Bradford

E-Commerce DevOps Engineer

Bradford, Yorkshire, United Kingdom
Hybrid / WFH Options
Freemans Grattan Holdings (fgh)
automation. Knowledge of scripting and automation languages such as Powershell, Bash. Familiarity with networking and security best practices. Knowledge of application secure coding principles (e.g., OWASP) for protection against vulnerabilities and the ability to implement secure coding and deployment best practices. Experience in Agile … balancer cache to enhance website performance. Desirable 3+ years in a B2C E-Commerce with a proven track record of implementing scalable and secure E-Commerce infrastructures. Knowledge of programming languages such as C#, Java, .NET. Knowledge of relational databases (e.g., MS SQL Server) and document-oriented databases More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technology Manager - Security Architecture (Bradford)

Bradford, UK
Hybrid / WFH Options
Morrisons
applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least More ❯
Posted:

Technology Manager - Security Architecture

Bradford, England, United Kingdom
Hybrid / WFH Options
Morrisons
applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least More ❯
Posted:

Technology Manager - Security Architecture

Bradford, south west england, United Kingdom
Hybrid / WFH Options
Morrisons
applications tied to organisational risks. • Maintain accurate inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least More ❯
Posted: