application monitoring platforms such as Dynatrace and Catchpoint. Understanding of .NET applications and experience making small code changes when required. Knowledge of Akamai or similar CDNs, perimeter security, and OWASPsecurity guidelines. Strong networking experience across DNS, routing, load balancers, and firewalls. Skilled with enterprise‐level deployments across microservices and multi‐server environments. Experience with MLOps platforms (ideally Azure), database More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Stott and May
application monitoring platforms such as Dynatrace and Catchpoint. Understanding of .NET applications and experience making small code changes when required. Knowledge of Akamai or similar CDNs, perimeter security, and OWASPsecurity guidelines. Strong networking experience across DNS, routing, load balancers, and firewalls. Skilled with enterprise‐level deployments across microservices and multi‐server environments. Experience with MLOps platforms (ideally Azure), database More ❯
application monitoring platforms such as Dynatrace and Catchpoint. Understanding of .NET applications and experience making small code changes when required. Knowledge of Akamai or similar CDNs, perimeter security, and OWASPsecurity guidelines. Strong networking experience across DNS, routing, load balancers, and firewalls. Skilled with enterprise‐level deployments across microservices and multi‐server environments. Experience with MLOps platforms (ideally Azure), database More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Stott and May
application monitoring platforms such as Dynatrace and Catchpoint. Understanding of .NET applications and experience making small code changes when required. Knowledge of Akamai or similar CDNs, perimeter security, and OWASPsecurity guidelines. Strong networking experience across DNS, routing, load balancers, and firewalls. Skilled with enterprise‐level deployments across microservices and multi‐server environments. Experience with MLOps platforms (ideally Azure), database More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
security: Kubernetes (K8s) Security & Compliance Cloud and applicationsecurity: Cloud posture management tools (e.g. Azure Dender, GCP SCCE), WAFs (e.g. Azure WAF, Cloud Armor AWS WAF), and protection against OWASP Top 10 and emerging threats. Network & infrastructure security: Network security principles (e.g. segmentation, monitoring, intrusion detection/prevention). Any experience in Zero Trust architecture in cloud environments would be More ❯
security engineers and business stakeholders to integrate security into the software development lifecycle (SDLC), mitigate risks and ensure compliance with security standards. Skills Strong knowledge of applicationsecurity vulnerabilities (OWASP Top 10, CWE, SANS 25). Hands-on remediation support and vulnerability management expertise. Hands-on experience with threat modelling and secure code reviews. Experience with Mobile ApplicationSecurity and More ❯
the Data migration cycle output to the customer + Identify Data quality issues and have the fixes in place. Technical Skills: Experience and understanding of secure development practices include OWASP guidelines/top 10, SOC 2, and NCSC cloud security principles. Experience in data and orchestration tools including some of dbt, Apache Airflow, Azure Data Factory. Experience in programming languages More ❯
Bracknell, England, United Kingdom Hybrid / WFH Options
Ivanti
Experience with Azure Managed Services, Docker, Kubernetes, Terraform, Helm Experience building modern web apps using Angular and Typescript Experience working in Azure DevOps managing backlogs etc Working knowledge of OWASPsecurity best practices Knowledge of working with FedRamp compliance Our Employer Commitment This job posting will remain active until a qualified candidate is identified. At Ivanti, we are committed to More ❯
dashboards. Experience using GitHub and GitHub Actions. Experience with Behavior Driven Development (BDD), Gherkin, and SpecFlow. Familiarity with Atlassian Jira, Confluence, & JFrog Artifactory. Knowledge of software security implementation (e.g., OWASP, PKI, X509 Certificates, TLS). Experience developing software for regulated environments (e.g., IVD/Medical devices). In addition to salary, we offer flexible working arrangements, 25 days of holidays More ❯
implemented in Kubernetes, Docker Experience using GitHub and GitHub Actions Behaviour Driven Development (BDD), with Gherkin & SpecFlow Atlassian Jira, Confluence & JFrog Artifactory Software security best practices and implementation (e.g. OWASP, PKI, X509 Certificates, TLS) Software development for regulated environments (e.g. IVD/Medical devices) In addition to salary, we work flexibly, and provide 25 days holidays, excellent family friendly benefits More ❯
a team. Nice to Haves: Knowledge of performance profiling tools. Experience setting up CI/CD pipelines Solid understanding of writing secure code in compliance with international standards (PCI, OWASP) Previous experience in financial domain BS/MS degree in Computer Science, Engineering or a related subject. Location- United Kingdom More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
and implement security tools for secure code analysis and runtime protection. To be considered for this role, you should have: Proven experience in applicationsecurity architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as More ❯
vulnerability scanning to evaluate the effectiveness of security controls and identify weaknesses. Security Compliance: Ensure that applications comply with relevant security standards, regulations, and industry best practices, such as OWASP Top 10, OWASP ASVS, MAVS, PCI DSS, and GDPR. Security Architecture: Assist in designing and implementing secure application architectures, including authentication mechanisms, access controls, encryption, and secure communication protocols. Incident More ❯
pure product or applicationsecurity Strong expertise in offensive security techniques and methodologies, including ethical security testing Deep understanding of secure coding practices, common vulnerabilities and risk scoring methodologies (OWASP Top 10, CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools such as Burp Suite More ❯
and developer engagement ApplicationSecurity Engineer - Requirements: 3–5+ years of experience in applicationsecurity or secure software development Strong understanding of common vulnerabilities and how to prevent them (OWASP Top 10) Experience with CI/CD pipelines and integrating AppSec tooling Familiarity with modern programming languages (JavaScript, Java, Python) Excellent communication skills and a collaborative mindset when working with More ❯
team environment with a positive attitude and strong work ethic Knowledge of security standards and regulations such as ISO 27001, GDPR and NIST/SOC 2 reporting Knowledge of OWASP, CVSS and threat intelligence and modelling Demonstrated experience of incident management processes and procedures Excellent verbal and written communication skills Willingness to travel, we are a global business, and some More ❯
with their opinions. Desirable qualifications, capabilities, and skills: Experience in a software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetration testing (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth 2, FIDO 2, etc) Don More ❯
and self-starter Deep understanding of common as well as emerging vulnerabilities and how they manifest in different types of applications (web applications, thick clients, APIs, etc) Familiarity with OWASP Top 10, SANS Top 25, NIST/CSC, CIS etc. Applied understanding of topics such as authentication, access control, encryption, cloud security, operating system security, network security, database security. Familiarity More ❯
testing and ethical hacking. Strong understanding of cloud security (AWS, Azure, GCP). Familiarity with Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have More ❯
mentor and advocate, fostering a culture of security awareness across engineering and business teams. Compliance And Standards Ensure product security practices align with relevant security frameworks and standards (e.g., OWASP, NIST, ISO 27001, GDPR, PCI DSS). Support regulatory compliance efforts and maintain evidence to meet audit requirements. Collaboration And Communication Function as the primary interface between security, development, and … modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as OWASP, BSIMM, PCI DSS, ISO 27001, and GDPR. Security Integration Experience Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC workflows. Skilled in implementing technical security controls and More ❯
distributed teams across multiple regions and time zones. Ability to do research autonomously to always be ahead of any security threat. SSDLC practices in DevOps, CI/CD environment. OWASP Top 10, SANS CWE, OpenSAMM, BSIMM, etc. Penetration testing, vulnerability scanning. Design security monitoring tools. Designing pipelines that make use of SCA, SAST, DAST, IAST and RASP solutions. Qualifications: SANS More ❯
Bournemouth, England, United Kingdom Hybrid / WFH Options
FPSG
maturity frameworks such as DSOMM, including hands-on delivery (code, configuration, documentation, tooling) Designing, building, operate, monitoring secure solutions across complex platforms Ensuring internal and industry security standards (e.g. OWASP CI/CD, SAMM) are adhered to across systems Managing and improving cloud security posture (Azure Defender, Prisma Cloud etc) Implementing and optimising observability platforms for holistic system monitoring Supporting … software estates, including deployment pipelines, rollback strategies, and uptime monitoring Practical experience building automated security test suites into CI/CD workflows Familiarity with security frameworks such as DSOMM, OWASP, and SAMM Suitability: This role is a technical hands-on security engineering role, it is NOT GRC focused. It would be well-suited to experienced Security Engineers or Developers with … annual leave with buy/sell options + Private healthcare + Extensive Wellbeing services and employee discounts Key Technical Terms Security Engineering, Cybersecurity Engineer, Information Security Specialist, Salesforce, Azure, OWASP CI/CD, DSOMM, SAMM, Cloud Security Posture Management, Prisma Cloud, Azure Defender, Snyk, Checkmarx, OpenZAP, Qualys, DAST, SAST, CI/CD, Infrastructure Security, Auth0, Secure APIs, Networking Protocols, DevSecOps More ❯
London, England, United Kingdom Hybrid / WFH Options
Oliver James
and an understanding of infrastructure-as-code, networking, and API design. Salesforce Exposure: Familiarity with complex Salesforce environments and their associated security considerations. Modern Security Frameworks: Deep familiarity with OWASP CI/CD, DSOMM, SAMM, and Cloud Security Posture Management tools (e.g. Azure Defender, Prisma Cloud). Security Tooling Expertise: Strong hands-on experience with security scanning tools, including SAST More ❯
application monitoring platforms such as Dynatrace and Catchpoint. Understanding of .NET applications and experience making small code changes when required. Knowledge of Akamai or similar CDNs, perimeter security, and OWASPsecurity guidelines. Strong networking experience across DNS, routing, load balancers, and firewalls. Skilled with enterprise‐level deployments across microservices and multi‐server environments. Experience with MLOps platforms (ideally Azure), database More ❯