Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
technical knowledge of applicationsecurity architecture, cloud platforms (AWS, Azure, GCP), microservices, APIs, and identity/access management. Strong familiarity with modern programming languages, frameworks, and security vulnerabilities (e.g., OWASP Top Ten, SANS 25). Proven experience driving digital transformation initiatives, including migration of legacy applications to cloud-native platforms and adoption of SaaS/PaaS solutions. Understanding of UK More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown PLC
technical knowledge of applicationsecurity architecture, cloud platforms (AWS, Azure, GCP), microservices, APIs, and identity/access management. Strong familiarity with modern programming languages, frameworks, and security vulnerabilities (e.g., OWASP Top Ten, SANS 25). Proven experience driving digital transformation initiatives, including migration of legacy applications to cloud-native platforms and adoption of SaaS/PaaS solutions. Understanding of UK More ❯
Newton Abbot, Devon, England, United Kingdom Hybrid / WFH Options
Reed
Excellent problem-solving skills and attention to detail Commercial experience in professional PHP development Strong understanding of object-oriented programming and SOLID principles Knowledge of secure coding practices (e.g., OWASP) Strong experience with modern PHP frameworks (preferably Laravel or Symfony) Familiarity with relational databases (MySQL) and writing performant queries Comfortable working with Git, Composer, and modern development workflows Strong verbal More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
with technologies such as Java, Spring Boot, React, and Node. Familiarity with infrastructure-as-code and cloud platforms like AWS is also important. A strong working knowledge of the OWASP Top Ten, common applicationsecurity frameworks and best practices, and threat modelling techniques is critical. Hands-on Minimum Criteria Experience in a hands-on Cyber Security focused role, primarily in More ❯
Employment Type: Permanent, Part Time, Work From Home
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST 800-30/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST 800-30/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. More ❯
Newton Abbot, Devon, England, United Kingdom Hybrid / WFH Options
Reed
skills and attention to detail Commercial experience in professional PHP development Good commercial level of understanding of object-oriented programming and SOLID principles Knowledge of secure coding practices (e.g., OWASP) Commercial experience with modern PHP frameworks (preferably Laravel or Symfony) Familiarity with relational databases (MySQL) and writing performant queries Comfortable working with Git, Composer, and modern development workflows Strong verbal More ❯
knowledge of embedded software principles , memory management, and device-level constraints. Solid experience in secure coding practices – writing code that protects against vulnerabilities and adheres to security standards (e.g., OWASP, MISRA, or equivalent). Experience with debugging, performance tuning, and hardware/software integration. Desirable Skills Familiarity with real-time operating systems (RTOS) or embedded Linux. Experience in cross-platform More ❯
An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested More ❯
An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯
techniques to except Ideally some AppSec/DevSecOps or Ethical Hacking experience - need a good understanding of WebApplication attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning experience with F5. Custom rule creation , OWASP rule tuning (especially for F5), false positive reduction. Log analysis and data-driven tuning based More ❯