London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
and Azure DevOps (CI/CD) Familiar with scripting languages like PowerShell, YAML, JSON Expertise in applicationsecurity tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threat modelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to engage More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
/CD pipelines, plus scripting languages such as PowerShell, YAML, or JSON Knowledge of applicationsecurity tools, threat modelling, and risk assessments Familiarity with standards/frameworks such as OWASP, NIST SSDF, ISO27001, NCSC Experience guiding engineering teams and influencing security culture Excellent communication skills, able to engage confidently with developers and senior leadership Why join them? You'll be More ❯
london, south east england, united kingdom Hybrid / WFH Options
mkodo
at mkodo ✨ 📝 What You'll Be Doing... Technical Leadership Define and evolve backend architecture to ensure scalability, maintainability, and performance. Set coding standards and champion secure development practices (e.g. OWASP). Influence technology choices, frameworks, and tools to support engineering excellence. Oversee improvements to CI/CD pipelines, build processes, and operational workflows. Can clearly and confidently articulate risk of More ❯
slough, south east england, united kingdom Hybrid / WFH Options
mkodo
at mkodo ✨ 📝 What You'll Be Doing... Technical Leadership Define and evolve backend architecture to ensure scalability, maintainability, and performance. Set coding standards and champion secure development practices (e.g. OWASP). Influence technology choices, frameworks, and tools to support engineering excellence. Oversee improvements to CI/CD pipelines, build processes, and operational workflows. Can clearly and confidently articulate risk of More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
mkodo
at mkodo ✨ 📝 What You'll Be Doing... Technical Leadership Define and evolve backend architecture to ensure scalability, maintainability, and performance. Set coding standards and champion secure development practices (e.g. OWASP). Influence technology choices, frameworks, and tools to support engineering excellence. Oversee improvements to CI/CD pipelines, build processes, and operational workflows. Can clearly and confidently articulate risk of More ❯
Redhill, England, United Kingdom Hybrid / WFH Options
WeDo
AZ-104, AZ-400, AZ-500 Excellent communication and documentation skills Nice to Have: Experience with Puppet, Wiz, GitHub, Jitterbit Exposure to AWS Familiarity with ISO 27001, NIST, CIS, OWASP, SOC 2 AI-102 certification Recruitment Process: Stage 1: Interview via Teams (theoretical knowledge) Stage 2: Onsite interview in Reigate, including a presentation This is a fantastic opportunity to join More ❯
guildford, south east england, united kingdom Hybrid / WFH Options
WeDo
AZ-104, AZ-400, AZ-500 Excellent communication and documentation skills Nice to Have: Experience with Puppet, Wiz, GitHub, Jitterbit Exposure to AWS Familiarity with ISO 27001, NIST, CIS, OWASP, SOC 2 AI-102 certification Recruitment Process: Stage 1: Interview via Teams (theoretical knowledge) Stage 2: Onsite interview in Reigate, including a presentation This is a fantastic opportunity to join More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Nextech
the business. Actively contribute to incident response, security training, supplier reviews, and client security assurance Stay ahead of evolving threats, and help shape our strategy using frameworks such as OWASP, SASE, and Zero Trust. What We're Looking For Essential: Proven experience in cyber security engineering, including vulnerability management, SIEM, WAFs, and secure infrastructure design. Strong knowledge of TCP/ More ❯
South East London, London, United Kingdom Hybrid / WFH Options
4SQUARE RECRUITMENT LTD
Proven commercial experience in a penetration testing role. Deep technical knowledge of networking protocols, operating systems (Windows, Linux), and common infrastructure vulnerabilities. Strong experience in webapplication penetration testing (OWASP Top 10). Proficiency with common penetration testing tools (e.g., Burp Suite Pro, Metasploit, Nmap, Cobalt Strike, etc.). Excellent written and verbal communication skills, with a proven ability to More ❯
london, south east england, united kingdom Hybrid / WFH Options
InfoSec People Ltd
evolving threat landscape What we’re looking for Strong understanding of risk, and how security interacts with different platforms and projects. Experience with frameworks like ISO, NIST, CIS, PCI, OWASP, OSINT Technical know-how (cloud, apps, networks, or systems) Excellent communicator who can bridge the gap between tech and business Why join us? Salary up to £80,000 Hybrid working More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
InfoSec People Ltd
evolving threat landscape What we’re looking for Strong understanding of risk, and how security interacts with different platforms and projects. Experience with frameworks like ISO, NIST, CIS, PCI, OWASP, OSINT Technical know-how (cloud, apps, networks, or systems) Excellent communicator who can bridge the gap between tech and business Why join us? Salary up to £80,000 Hybrid working More ❯
slough, south east england, united kingdom Hybrid / WFH Options
InfoSec People Ltd
evolving threat landscape What we’re looking for Strong understanding of risk, and how security interacts with different platforms and projects. Experience with frameworks like ISO, NIST, CIS, PCI, OWASP, OSINT Technical know-how (cloud, apps, networks, or systems) Excellent communicator who can bridge the gap between tech and business Why join us? Salary up to £80,000 Hybrid working More ❯
london, south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯
slough, south east england, united kingdom Hybrid / WFH Options
intro
implement secure software development practices Integrate security gates into CI/CD pipelines following DevSecOps principles Establish security quality gates and acceptance criteria Develop secure coding standards based on OWASP guidelines Create security architecture patterns and reference implementations Security Code Reviews & Testing Conduct in-depth security code reviews for critical features Implement automated security testing (SAST, DAST, IAST, SCA) Configure … and tune security scanning tools (Aquasec, Trivy, Dependabot, etc) Review cryptographic implementations against industry standards Validate authentication and authorization implementations Ensure compliance with OWASP ASVS (ApplicationSecurity Verification Standard) Threat Modeling & Risk Assessment Lead threat modeling sessions using STRIDE, PASTA, or similar frameworks Create threat models for new products and architectural changes Identify attack vectors specific to web and mobile … Develop abuse cases and security test scenarios Maintain threat intelligence for fintech-specific risks Document security requirements derived from threat models Platform-Specific SecurityWeb Applications: Implement defenses against OWASP Top 10 vulnerabilities Mobile Applications: Apply OWASP MASVS and platform-specific guidelines (iOS App Transport Security, Android Network Security Config) APIs: Implement API security best practices (rate limiting, authentication, input More ❯