years experience performing penetration testing (against web applications) Experience securing cloud-based infrastructures and solutions Previous experience working on an information security team Advanced knowledge of common security vulnerabilities (OWASP) and best practices Familiarity with SOC II controls and how to review them Experience in other technical roles (SysAdmin, Helpdesk, etc.) Strong understanding of Linux server environments Experience with Kanban More ❯
ll come with hands-on experience with AWS and Cloudflare and be comfortable working with Infrastructure as Code tools like Terraform. A strong understanding of common vulnerabilities and the OWASP Top 10 is essential, as is the ability to write and review code in Python, Scala or Go. Working on mobile-first platforms will also be a big plus. This More ❯
technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of More ❯
Soft ITIL experience and qualifications Visual Studio 2019 or higher CI/CD Version control and branching methodologies using GIT Application integration using SOAP web services and REST APIs OWASP Top 10 security framework Agile and SCRUM Experience in 3rd line support across CRM applications More ❯
CE customization and configuration Power Platform (Power Apps, Power Automate, Dataverse, Power BI) Azure integration (Logic Apps, API Management) Visual Studio, GIT, CI/CD REST/SOAP APIs, OWASP Top 10, Agile/SCRUM Desirable: Copilot and AI experience Performance tuning ITIL knowledge/certification More ❯
Skills and Experience Key qualifications for this position include: Strong understanding of RESTful design and secure authentication. Demonstrated knowledge of API security and OWASP Top 10 vulnerabilities. Experience with Docker, Linux, Git, and container-based environments. Working familiarity with PCI DSS, payment systems, or other regulated environments. Requirements We are looking for candidates with the following: Strong hands-on experience More ❯
experience securing enterprise applications and infrastructure, preferably in the Crypto and FinTech space. Experience with the application of threat modeling and other risk identification techniques. Strong understanding of the OWASP top 10, including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Bloc Recruitment
Playwright. Solid grasp of CSS, UI design, accessibility, and cross-browser compatibility. Collaborative mindset and a focus on delivering real business impact. Bonus: Experience with GCP, FastAPI, MySQL, Docker, OWASPsecurity practices. Why join? High-trust, inclusive engineering culture Autonomy, ownership, and impact from day one Friendly, smart team that genuinely supports growth and balance Hybrid working: 3 days/ More ❯
City Of Westminster, London, United Kingdom Hybrid / WFH Options
Ex-Mill Recruitment Ltd
architecture, AOSP, and app sandboxing • Experience with tools like Frida, Burp Suite, jadx, MobSF, and Android Debug Bridge (ADB) • Knowledge of malware analysis and mobile threat defense • Familiarity with OWASP Mobile Top 10 • (Bonus) Experience with securing custom ROMs or working with rooted devices Mindset We're After: • Thinks like an attacker, acts like a defender • Curious, investigative, and never More ❯
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile platforms Develop abuse cases … and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific Security Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input validation) Cross-platform session management and secure data storage Security Tooling & Automation More ❯
mentor and advocate, fostering a culture of security awareness across engineering and business teams. Compliance and Standards : Ensure product security practices align with relevant security frameworks and standards (e.g., OWASP, NIST, ISO 27001, GDPR, PCI DSS). Support regulatory compliance efforts and maintain evidence to meet audit requirements. Collaboration and Communication : Function as the primary interface between security, development, and … modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as OWASP, BSIMM, PCI DSS, ISO 27001, and GDPR. Security Integration experience: Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC workflows. Skilled in implementing technical security controls and More ❯
Senior Cyber Security Analyst (6 months contract) Save job Join a leading global investment bank as a Senior Cyber Security Analyst, where you'll play a critical role in safeguarding a world-class financial institution. What You'll Do: Responsible More ❯
experience with Infrastructure-as-Code tools such as Terraform, SST, CDK or CloudFormation. Strong understanding of API development, RESTful design, and secure authentication. Demonstrated knowledge of API security and OWASP Top 10 vulnerabilities. Experience with Docker, Linux, Git, and container-based environments. Working familiarity with PCI DSS, payment systems, or other regulated environments is highly desirable. Excellent communicator with a … autonomously. Demonstrable expertise and understanding of API development/design and experience interfacing with disparate systems. Applicable understanding of software security, common exploits and secure development practices, including the OWASP Top 10. Proven and demonstrable understanding of testing methodologies and frameworks. Commercial experience with AWS and IaC (Terraform/CDK/CloudFormation) Commercial experience with Linux, Docker, Docker Compose, Git More ❯
experience with Infrastructure-as-Code tools such as Terraform, SST, CDK or CloudFormation. Strong understanding of API development, RESTful design, and secure authentication. Demonstrated knowledge of API security and OWASP Top 10 vulnerabilities. Experience with Docker, Linux, Git, and container-based environments. Working familiarity with PCI DSS, payment systems, or other regulated environments is highly desirable. Excellent communicator with a … autonomously. Demonstrable expertise and understanding of API development/design and experience interfacing with disparate systems. Applicable understanding of software security, common exploits and secure development practices, including the OWASP Top 10. Proven and demonstrable understanding of testing methodologies and frameworks. Commercial experience with AWS and IaC (Terraform/CDK/CloudFormation) Commercial experience with Linux, Docker, Docker Compose, Git More ❯
determining the materiality of AI initiatives. Material projects undergo in-depth risk analysis, with high-risk items escalated to governance committees. Analysts will use frameworks such as the AI OWASP Top 10 to identify and assess security risks beyond standard assessments. Key Responsibilities: Perform AI-specific risk assessments to ensure regulatory compliance. Evaluate AI solutions for prohibited use cases and … with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (e.g., OWASP AI Top 10). Must be based in the UK to meet regulatory and operational requirements. More ❯