SDLC) that enables development teams to deliver high-quality applications quickly while implementing essential controls for software integrity, authenticity, and third-party library management. Risk Assessments: Conduct risk assessments, threat modeling, and architecture reviews alongside development teams, producing artifacts to drive the implementation of effective security controls. Standards Development: Own the creation and maintenance of tailored security standards and … strategies. Key Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java More ❯
years of experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerability management, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
Salary: £35,000 - £55,000 (Based on Experience) Hybrid (3 days in the office and 2 days from home) Key Tasks: Security assessments:?Create and perform security assessments and threat models Security standards:?Develop,implement&maintainsecurity standards and plans VulnerabilityManagement:?Research weaknesses and find ways to counter them Security incident response:?Respond to attack vectors and security incidents, and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oscar Technology
frameworks, taxonomies, and control libraries aligned with MRM, CRO, and CDO functions. Embed responsible AI principles into system design, control mechanisms, audit processes, and enterprise-wide AI strategies. Incorporate threat modeling, adversarial defense, data integrity, and continuity planning into AI architecture. Orchestrate the full AI lifecycle, including readiness evaluations, regulatory compliance reviews, and business adoption strategies. Focus on digital More ❯