Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Bournemouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
High Wycombe, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Watford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Hemel Hempstead, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
authorization practices, audit logging, encryption at rest/in transit, and other applicationsecurity standards. Ensure software and infrastructure meet organizational security and compliance requirements (e.g., GDPR, ISO 27001, OWASP Top 10). Team Management & Culture Build and scale high-performance engineering teams, including backend, frontend, full-stack, data, and security engineers. Define and track KPIs for engineering productivity, quality More ❯
the Data migration cycle output to the customer + Identify Data quality issues and have the fixes in place. Technical Skills: Experience and understanding of secure development practices include OWASP guidelines/top 10, SOC 2, and NCSC cloud security principles. Experience in data and orchestration tools including some of dbt, Apache Airflow, Azure Data Factory. Experience in programming languages More ❯
able to function in a dynamic environment subject to impromptu changes in schedules and priorities Demonstrate well-developed organizational, written communication, and analytical skills. Knowledge of NIST Cybersecurity Framework, OWASP SAMM, OWASP Top10, and others. Programming Experience preferred CISSP and other security certifications preferred YOU'LL LOVE WORKING HERE BECAUSE YOU CAN Deliver at epic scale. We deliver real user More ❯
security incidents and work on root cause analysis and hardening. Stay updated on current and emerging security threats, tools, and techniques. Requirements: Strong understanding of common applicationsecurity vulnerabilities (OWASP Top 10, CWE) and how to remediate them. Experience performing secure code reviews in languages like Java, Python, C++ etc.. Familiarity with CI/CD pipelines and how to embed More ❯
applicationsecurity Experience working with large-scale multi-cloud, multi-account architecture CISSP, CISM, AWS Solutions Architect Professional, Azure Solutions Architect, or equivalent certification, is preferred Thorough understanding of OWASP Top 10 and Secure Development Expertise in automating security tools and integrations, including simple scripting Experience with applicationsecurity tools (SAST, DAST, IAST and SCA) Strong technical knowledge of development More ❯
pure product or applicationsecurity Strong expertise in offensive security techniques and methodologies, including ethical security testing Deep understanding of secure coding practices, common vulnerabilities and risk scoring methodologies (OWASP Top 10, CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools such as Burp Suite More ❯
SSO, Cloud IAM, HashiCorp Vault). Proficiency in applied cryptography (e.g., mTLS, E2EE, AEAD, key derivation, key wrapping, remote attestation). Ability to identify security vulnerabilities across platforms (e.g., OWASP Top 10, misconfigurations, transport security gaps). Excellent documentation and communication skills, able to articulate technical risks and findings to diverse audiences. Experience in collaborative proposal development and interfacing with More ❯
firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. ApplicationSecurity: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. More ❯
firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. ApplicationSecurity: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. ApplicationSecurity: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
The MRJ Group
Competitive salary available upon request Hybrid working from a Manchester office (must be based in the UK without visa/sponsorship requirements) Permanent We are awaze, the largest managed vacation rentals and holiday resorts business in Europe, which brings together More ❯
of REST APIs Scripting skills and Infrastructure as Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Ability to identify vulnerabilities using CWE or OWASP Knowledge of operating system hardening Understanding of CICD, Pipelines, SDLC Penetration testing knowledge Familiarity with Cloud Development Kit (CDK), GitOps Experience working in DevOps/agile teams Understanding of Docker More ❯
languages and Infrastructure as Code (Terraform, CloudFormation) •Familiarity with Jira or other ticketing systems – essential •Technical architecture design and review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetration testing knowledge is also super useful •Familiarity with Cloud Development Kit More ❯
languages and Infrastructure as Code (Terraform, CloudFormation) •Familiarity with Jira or other ticketing systems – essential •Technical architecture design and review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetration testing knowledge is also super useful •Familiarity with Cloud Development Kit More ❯
languages and Infrastructure as Code (Terraform, CloudFormation) •Familiarity with Jira or other ticketing systems – essential •Technical architecture design and review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetration testing knowledge is also super useful •Familiarity with Cloud Development Kit More ❯
Kubernetes). Experience : 5+ years of experience in penetration testing, ethical hacking, or red teaming. Proven track record of identifying and exploiting critical vulnerabilities. Experience with webapplicationsecurity (OWASP Top 10, API security, etc.). Hands-on experience with malware analysis and forensic tools is a plus. Certifications (Preferred) : OSCP (Offensive Security Certified Professional) OSCE (Offensive Security Certified Expert More ❯