with engineering, maintenance and central teams, you’ll ensure robust protection of our electrical, automation, and industrial network systems. You’ll also drive key initiatives like cyber hygiene programmes, vulnerability assessments, and network monitoring – keeping us ahead of threats and ready to respond. KEY RESPONSIBILITIES Ensure OT assets and industrial control systems are protected against cyber threats. Implement and … support cyber security tools and practices defined in our global OT Cyber Strategy. Lead cyber hygiene and vulnerability management programmes, coordinating remediation where needed. Monitor OT network activity, detect insecure configurations or malicious activity, and take appropriate action. Own the site-level cyber incident response plan – coordinating with stakeholders and ensuring timely resolution. Support compliance efforts related to OT … and SCADA, and have strong knowledge of industrial networks. You have solid grounding in cyber security principles – TCP/IP, common protocols, OSI model, and cyber tooling such as vulnerabilityscanning, antivirus and endpoint protection. You can lead, influence and guide others – from site technicians to external contractors. You’re confident working independently and as part of a More ❯
infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerabilityscanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up … infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerabilityscanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up More ❯
infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerabilityscanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up … infrastructure: Dockerized services, Kubernetes or AWS Fargate/ECS, managed PostgreSQL, Redis, and S3. Implement robust ESLint/Prettier (JS/TS) in CI, automated tests (Jest, Hardhat), and vulnerabilityscanning (Snyk or GitHub CodeQL). Ensure all API keys and secrets live in AWS Secrets Manager or GCP Secret Manager, with least-privilege IAM roles. Set up More ❯
knowledge: Banking, Financial Services, Lending (Very nice to have – understanding the wholesale lending lifecycle) Monitoring & Observability: Experience in managing Tools like APPD, ELK stack, Grafana Security Practices: DevSecOps principles, vulnerabilityscanning, compliance automation, Certificate/vault/user role management. Strong attention to detail a passion for technology and a desire to keep learning excellent communication and stakeholder More ❯
while gaining hands-on experience across multiple teams and technologies. What You’ll Be Working On World-class web security software – work on innovative products that keep businesses safe Vulnerability scanner and penetration testing tools – develop tools to find and fix security threats DAST Enterprise solution – help build scalable, high-impact security solutions New AI-powered features – get hands More ❯
working on, you must be a Sole British National with an active MOD DV Clearance to be eligible. The ideal candidate will have demonstrated expertise in the following areas: VulnerabilityScanning & Reporting Endpoint Security Incident Management & Tickets System Hardening Change Work Participation in Regular Meetings Documentation If you are ready to take your career to the next level More ❯
systems Desktop and server OS Deployment of desktops, physical and virtual servers Network services, firewall, switches, wireless and network access control. Network storage and backup. System and network analysis, vulnerabilityscanning, health monitoring and logging services. To act as higher-tier support to the team of IT Technicians, however excellent customer service skills are required as you will More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Revolent Group
Financial Services knowledge — especially around wholesale lending and Loan IQ . Experience with monitoring and observability tools such as APPD, ELK Stack, or Grafana. Understanding of DevSecOps principles , including vulnerabilityscanning, secrets management, and compliance automation. Further experience with CI/CD integration and pipeline automation across enterprise tools. 🌟 What’s In It for You: 8–10 weeks More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
Salford, England, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
for internal clients (e.g., product, platform, application owners). Create secure and high-quality production code and maintain algorithms that run synchronously with appropriate systems. Apply specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data, identifying, interpreting, and summarizing the probability and impact of threats when determining specific vulnerabilities. Lead delivery of continuity-related awareness, training, educational More ❯
This is a dynamic and varied role, which includes things like: Build, deployment and maintenance of new and existing environments Designing and maintaining highly available architectures Security (patch management, vulnerabilityscanning & monitoring) Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. Evaluation of new, cutting-edge technologies to help improve business processes and More ❯
Total Addressable Market' (TAM) of over 1.5 million heat pump installs happening every month making our proposition leading edge with significant growth potential. Our SaaS platform utilises cutting edge scanning technology that is operating system agnostic, using these methods heatly is redefining how technology is used to survey and create building digital twins. We require talented people to join … into the CI/CD process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand-ups, and retrospectives to ensure effective and efficient development cycles. Collaborate with More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the role you’ll master the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security More ❯
into the CI/CD process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand- ups, and retrospectives to ensure effective and efficient development cycles. Collaborate with More ❯
managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusion detection technologies, vulnerability scanners and SIEMs and the technical knowledge to integrate them to enhance our p... More ❯
managing and enhancing the technology underpinning N Browns cyber security services. Youll have a good understanding of a range of security tools like web application firewalls, intrusion detection technologies, vulnerability scanners and SIEMs; and the technical knowledge to integrate them to enhance our p click apply for full job details More ❯
leveraging test automation, TDD, BDD, trunk-based development, security testing, and modern ways of working. This role requires deep technical expertise in automation frameworks, system design for testing, and vulnerability assessment to build reliable, scalable, and secure applications. Key Responsibilities Quality Engineering & Automation Design and implement automated test strategies for functional, integration, performance, and security testing. Drive test-first … Champion trunk-based development, ensuring testing is embedded throughout the development lifecycle. Collaborate closely with developers to conduct code reviews with a focus on testability, security, and performance. Perform vulnerability assessments and implement security testing best practices. Enhance observability by integrating real-time monitoring, logging, and reporting into the QA process. Technical Leadership & Collaboration Partner with software engineers, architects … TDD, BDD, and test automation best practices. Experience in trunk-based development and continuous testing within CI/CD pipelines. Strong knowledge of code review practices, security testing, and vulnerability scanning. Familiarity with performance, load, and stress testing tools like JMeter. Experience with cloud-based testing environments (AWS, Kubernetes). Good-to-Have Skills: Experience with contract testing (PACT More ❯