Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence … based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party dependencies for known … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. Virtual job fairs You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver … a detailed, evidence-based security audit report . Key Responsibilities Perform staticcodeanalysis and security audit of a web application. Identify potential vulnerabilities in logic, data handling, authentication, and access control. Assess the application against OWASP Top 10 and other secure coding standards. Review third-party … issues. Produce a professional security report with risk ratings, findings, and recommendations. Required Skills & Experience 4+ years in Application Security , AppSec consulting , or Secure Code Review roles. Familiarity with tools like Snyk , Checkmarx , Veracode , or Burp Suite (passive scanning) . Knowledge of OWASP , CWE , and general secure software development More ❯
following concepts should be assessed, with 70-80% knowledge required: Lambda expressions Method references Functional interfaces Stream API Default methods Base64 Encode/Decode Static methods in interface Optional class Collectors class forEach() method Nashorn JavaScript Engine Parallel Array Sorting Type and Repeating Annotations I/O Enhancements Concurrency … is essential. Entry/mid-level knowledge of PL/SQL (Stored Procedures, SQL Queries, Joins, Indexing) is necessary. Proficiency with IntelliJ IDE and staticcodeanalysis tools like SonarQube is required. Knowledge of versioning tools such as jFrog or Nexus is mandatory. Experience with NoSQL databases More ❯
this role will provide assistance to more senior sales professionals and contribute to resolving sales-related challenges. Responsibilities: Target new accounts for the Perfecto, StaticCodeAnalysis and BlazeMeter brands Manage and grow a portfolio of accounts Meet established sales objectives and quotas Develop and maintain strong More ❯
this role will provide assistance to more senior sales professionals and contribute to resolving sales-related challenges. Responsibilities: Target new accounts for the Perfecto, StaticCodeAnalysis and BlazeMeter brands Manage and grow a portfolio of accounts Meet established sales objectives and quotas Develop and maintain strong More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Kineton
with higher-level applications. Contribute to the development and maintenance of technical documentation, including design specifications, test plans, and security architecture documents. Participate in code reviews to ensure code quality, security, and adherence to coding standards. Troubleshoot and resolve complex firmware and security-related issues. Qualifications: Bachelor's … to embedded systems (e.g., Common Criteria, FIPS 140-2). Knowledge of hardware security modules (HSMs) and trusted execution environments (TEEs). Familiarity with static and dynamic codeanalysis tools for security vulnerability detection. Experience with secure coding practices and threat modeling. Contributions to open-source security More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
practices, and providing direct input to project teams and business stakeholders is essential. Experience working with security issues in software architecture, software development, e.g. static and/or dynamic codeanalysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in … an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous integration and delivery tools (e.g. GitHub, Jenkins, Bamboo). Good expertise in taking security policy statements and translating them into actual, implementable, security controls and techniques that can make our software … Senior Software Security Architect, Senior Application Security Architect, SDLC, Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application Threat Modelling, Security Policy, Security Controls, ISO 27001, NIST, GDPR, Cloud More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Bowerford Associates
practices, and providing direct input to project teams and business stakeholders is essential. Experience working with security issues in software architecture, software development, e.g. static and/or dynamic codeanalysis and tools, software dependency check, OWASP Top10 testing, application threat modelling. In-depth experience working in … an Agile software development environment, with classic applications as well as microservices, using modern code processing and continuous integration and delivery tools (e.g. GitHub, Jenkins, Bamboo). Good expertise in taking security policy statements and translating them into actual, implementable, security controls and techniques that can make our software More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
WARACLE
tools and monitor system performance, identify bottlenecks, and implement optimisations for improved resource utilisation . Implement security tools and practices, including vulnerability scanning and staticcode analysis. Communicate effectively with development teams to understand their requirements and align DevOps processes. Configure and maintain monitoring systems for log aggregation … and procedures. Requirements Demonstrated experience in designing, deploying, and managing infrastructure and applications on both AWS and Azure cloud platforms. Familiarity with Infrastructure as Code (IaC) tools such as Terraform, Bicep, CloudFormation, etc Experience with CI/CD tools for building and managing automated continuous integration and continuous delivery More ❯
Dundee, Scotland, United Kingdom Hybrid / WFH Options
WARACLE
tools and monitor system performance, identify bottlenecks, and implement optimisations for improved resource utilisation . Implement security tools and practices, including vulnerability scanning and staticcode analysis. Communicate effectively with development teams to understand their requirements and align DevOps processes. Configure and maintain monitoring systems for log aggregation … and procedures. Requirements Demonstrated experience in designing, deploying, and managing infrastructure and applications on both AWS and Azure cloud platforms. Familiarity with Infrastructure as Code (IaC) tools such as Terraform, Bicep, CloudFormation, etc Experience with CI/CD tools for building and managing automated continuous integration and continuous delivery More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Waracle
manage infrastructure components using automation tools and monitor system performance, identify bottlenecks, and implement optimisations. Implement security tools and practices, including vulnerability scanning and staticcode analysis. Communicate with development teams to understand their requirements and align DevOps processes. Configure and maintain monitoring systems for log aggregation and … procedures. Job Requirements Demonstrated experience in designing, deploying, and managing infrastructure and applications on both AWS and Azure cloud platforms. Familiarity with Infrastructure as Code (IaC) tools such as Terraform, Bicep, CloudFormation, etc Experience with CI/CD tools for building and managing automated continuous integration and continuous delivery More ❯
managing infrastructure components using automation tools, monitoring system performance, identifying bottlenecks, and optimizing resource utilization. Implementing security tools and practices, including vulnerability scanning and staticcode analysis. Communicating effectively with development teams to align DevOps processes with requirements. Configuring and maintaining monitoring systems for log aggregation and leading … detailed documentation for system configurations and procedures. Requirements Experience designing, deploying, and managing infrastructure and applications on AWS and Azure. Familiarity with Infrastructure as Code (IaC) tools such as Terraform, Bicep, CloudFormation, etc. Experience with CI/CD tools for automated build and deployment pipelines. Hands-on experience with More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
Diffblue
better results are obtained. Job purpose We are looking for skilled Java developers to work as part of a team with experts in AI, static and dynamic program analysis, and software verification. This is a great opportunity for a Java developer to learn new AI and program synthesis … software in an Agile environment Provide architectural guidance and review on Java development techniques such as the use of the Spring Framework, classloading, bytecode analysis and manipulation, smart mocking, isolation and algorithmic development Pro-actively contribute to the team’s objectives of delivering incremental value every sprint and partner … parsers and syntax trees You’ll get to work in one of the hottest tech startups in the world of deep tech AI for code, applying state-of-the-art program analysis and synthesis technology to tough problems faced by development teams at the world’s leading companies. More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
DiffBlue Ltd
better results are obtained. Job purpose We are looking for skilled Java developers to work as part of a team with experts in AI, static and dynamic program analysis, and software verification. This is a great opportunity for a Java developer to learn new AI and program synthesis … software in an Agile environment Provide architectural guidance and review on Java development techniques such as the use of the Spring Framework, classloading, bytecode analysis and manipulation, smart mocking, isolation and algorithmic development Pro-actively contribute to the team's objectives of delivering incremental value every sprint and partner … and syntax trees Benefits You'll get to work in one of the hottest tech startups in the world of deep tech AI for code, applying state-of-the-art program analysis and synthesis technology to tough problems faced by development teams at the world's leading companies. More ❯