/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations … Strong background in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration More ❯
/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations … Strong background in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration More ❯
london (city of london), south east england, united kingdom
Damia Group
/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations … Strong background in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration More ❯
Rednal, Birmingham, United Kingdom Hybrid / WFH Options
Kerv
DevOps and GitHub Actions Develop and maintain YAML scripts for defining pipelines and PowerShell scripts for deployment tasks Ensure accessibility compliance through automation using Axe or similar tools Manage secrets and configurations using Azure Key Vault Participate in code reviews and contribute to continuous improvement of testing practices Participate in test planning, estimation, and risk analysis activities Report and … with colleagues and customers Test planning and estimation Ability to drive testing processes starting from planning phase to test execution, bug fixing and support Familiar with test and bug management tools and processes, ideally Azure Dev Ops (ADO) Hands-on experience with API testing Experience with test automation frameworks design, implementation and maintenance Familiarity with Scrum methodology and how More ❯
is at the heart of what we do. To be successful in this role you should have: Experience across configuration and integration with Hardware Security Module (HSM) and AWS Secrets Manager (ASM) tooling, certificate lifecycle management, e.g. rotation, revocation, and in automating security workflows Experience using GitLab CI/CD pipelines, AWS CLI or Chef. Strong experience with … Cloud Security expertise across the following areas: AWS security controls, policies and automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and … sensitive information. Accountabilities Provision of subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Management and protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in the banks infrastructure/software More ❯
highly valued skills may include: Proven ability to build and scale application security programs from the ground up. Cross-functional collaboration skills with development, operations, and product teams. Vendor management and security tool evaluation expertise. You may be assessed on key critical skills relevant for success in the role, such as risk and controls, change and transformation, business acumen … sensitive information. Accountabilities Provision of subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Management and protection of secrets, ensuring they are securely generated, stored, and used. Execution of audits to monitor, identify, and assess vulnerabilities in the bank's infrastructure/software … across the bank, including developers and security teams, to ensure cryptographic solutions align with business objectives, security policies, and regulatory requirements. Development, implementation, and maintenance of Identity and Access Management solutions and systems. Vice President Expectations Contribute to or set strategy, drive requirements, and make recommendations for change. Plan resources, budgets, and policies; manage and maintain policies/processes More ❯