An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested More ❯
capabilities are able to be fully utilized and grow to meet the needs of the team Understanding and knowledge of common industry cyber security frameworks, standards and methodologies, including; OWASP, ISO2700x series, PCI DSS, GLBA, GDPR, Global data security and privacy acts, FFIEC guidelines, CIS and NIST standards. Windows and Linux Servers administration Strong Documentation skills More details available on More ❯
Essex, England, United Kingdom Hybrid / WFH Options
IT Talent Solutions Ltd
Develop backend services with C#, ASP.NET Core, and MVC. Collaborate closely with product and design teams to refine user experiences. Contribute to code quality, performance, and secure development practices (OWASP). Mentor junior developers and help shape frontend standards. What We’re Looking For Strong experience with React, JavaScript, and CSS, with an eye for UI/UX detail. Proven More ❯
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
City of London, Greater London, UK Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
london, south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
slough, south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
reports. Security Recommendations: Provide actionable guidance to mitigate risks and improve the organization's security posture. Compliance and Standards: Ensure testing aligns with industry regulations and security standards (e.g., OWASP, PCI-DSS). Continuous Research: Stay updated on emerging threats, tools, and techniques to enhance testing methodologies. Skills and Experience Required: Must have graduated/currently studying at a Russell More ❯
reports. Security Recommendations: Provide actionable guidance to mitigate risks and improve the organization's security posture. Compliance and Standards: Ensure testing aligns with industry regulations and security standards (e.g., OWASP, PCI-DSS). Continuous Research: Stay updated on emerging threats, tools, and techniques to enhance testing methodologies. Skills and Experience Required: Must have graduated/currently studying at a Russell More ❯
reports. Security Recommendations: Provide actionable guidance to mitigate risks and improve the organization's security posture. Compliance and Standards: Ensure testing aligns with industry regulations and security standards (e.g., OWASP, PCI-DSS). Continuous Research: Stay updated on emerging threats, tools, and techniques to enhance testing methodologies. Skills and Experience Required: Must have graduated/currently studying at a Russell More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
FPSG
maturity frameworks such as DSOMM, including hands-on delivery (code, configuration, documentation, tooling) Designing, building, operate, monitoring secure solutions across complex platforms Ensuring internal and industry security standards (e.g. OWASP CI/CD, SAMM) are adhered to across systems Managing and improving cloud security posture (Azure Defender, Prisma Cloud etc) Implementing and optimising observability platforms for holistic system monitoring Supporting … software estates, including deployment pipelines, rollback strategies, and uptime monitoring Practical experience building automated security test suites into CI/CD workflows Familiarity with security frameworks such as DSOMM, OWASP, and SAMM Suitability: This role is a technical hands-on security engineering role, it is NOT GRC focused. It would be well-suited to experienced Security Engineers or Developers with … sell options + Private healthcare + Extensive Wellbeing services and employee discounts Key Technical Terms Security Engineering, Cybersecurity Engineer, Security Developer, Information Security Specialist, Salesforce, Salesforce Industries, Vlocity, Azure, OWASP CI/CD, DSOMM, SAMM, Cloud Security Posture Management, Prisma Cloud, Azure Defender, Snyk, Checkmarx, OpenZAP, Qualys, DAST, SAST, CI/CD, Infrastructure Security, Auth0, Secure APIs, Networking Protocols, DevSecOps More ❯
compliant with internal and industry regulations. You will analyze new feature code to identify security risks and work with engineers to mitigate them, applying modern security standards such as OWASP CI/CD, DSOMM, SAMM, and Cloud Security Posture management systems like Azure Defender and Prisma Cloud. What you will be doing: Analyze new feature code to identify security risks … Copado for CI/CD is a plus. Exposure to Cloud Native software development, including cloud infrastructure and API design (Azure preferred). Experience with modern standards such as OWASP CI/CD, DSOMM, SAMM, and cloud security posture management systems like Azure Defender and Prisma Cloud. Expertise with SAST & SCA systems such as Snyk and Checkmarx, including policy management. More ❯
Ludlow, Shropshire, United Kingdom Hybrid / WFH Options
RedTech Recruitment Ltd
Skilled in SQL Server – database design, development, and optimisation Experience with Angular, HTML, CSS, and TypeScript Ability to work with Web API web services Awareness of security best practices (OWASP) Appetite to learn, improve, and stay up-to-date with new technologies Excellent communication and problem-solving skills Beneficial experience: Leading small development teams to deliver functionality on time Migrating … Engineer/C#/.NET/SQL Server/Angular/HTML/CSS/TypeScript/Web API/Azure/ASP.NET MVC/WinForms/WPF/OWASP/Computer Science/Software Engineering/Information Technology/Mathematics/Physics/Engineering More ❯
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (eg, OWASP AI Top 10). Must be based in London More ❯
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (eg, OWASP AI Top 10). Must be based in London More ❯
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (eg, OWASP AI Top 10). Must be based in London More ❯
london (city of london), south east england, united kingdom
Barclay Simpson
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (eg, OWASP AI Top 10). Must be based in London More ❯
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (eg, OWASP AI Top 10). Must be based in London More ❯