Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
testing Required Experience: Previous experience with manual testing (systems, APIs, and applications) Languages: JavaScript and Python Tools: Confluence, Jenkins, Jira, Splunk Desired Industry and Competencies Knowledge of authentication mechanisms (OAuth, SAML, JWT, etc.). Experience working in healthcare If you are interested in this role or wish to apply, please feel free to reply to this advert or call me More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Damia Group Ltd
Industry and Competencies Previous experience with manual testing (systems, APIs, and applications) Languages: JavaScript and Python Tools: Confluence, Jenkins, Jira, Splunk Desired Industry and Competencies Knowledge of authentication mechanisms (OAuth, SAML, JWT, etc.). Experience working in healthcare Security Tester - Onsite in Leeds on Tuesday & Thursday and home based on the other days £350-£400 per day (inside IR35 More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
on across different organisations or domains. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Platform & Technology More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
on across different organisations or domains. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Platform & Technology More ❯