Central London, London, United Kingdom Hybrid / WFH Options
Hireful
that an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secureCode Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hireful
that an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secureCode Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Hireful
that an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secureCode Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
tools (CloudTrail, Guardduty), Qualys tools and SIEM experience, to detect and respond to security events/incidents. -Demonstrable experience of managing security solutions (secureCode Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. -Proven track record of ensuring more »
JavaScript development experience Good knowledge of MySQL Knowledge working with AWS Services Experience with Github and Github actions Good awareness of securecoding practices If this sounds of interest, please apply for more details more »
JavaScript development experience Good knowledge of MySQL Knowledge working with AWS Services Experience with Github and Github actions Good awareness of securecoding practices If this sounds of interest, please apply for more details more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
that an experienced individual will know what the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secureCode Scanning, SIEM, IPS, IDS, Vulnerability Scanning, Penetration Testing,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards more »
CD) Maintain a dashboard of security enhancements and work closely with the Product Managers to ensure this work is scheduled Improve and maintain securedevelopment standards Support the incident response and architecture review processes whenever application security expertise is required Manage application framework and perimeter security improvement projects … in a Product or Application Security role Industry certifications such as CISSP, CISM, and CISA, are highly advantageous Solid understanding of securecoding principles Experience working with cloud-based applications and services Familiarity with a variety of software development & automation tools Strong critical thinking and problem-solving more »
familiar with PLC programming (CoDeSys, Rockwell, Siemens) Demonstrating proficient skills in Embedded C Programming, including adherence to standards like MISRA and securecoding practices Experience with C# programming for development of support and test tools Familiarity with V-Cycle and Agile Development methodologies Experience with Industrial Communication more »
to staff on security best practices Skills & Experience Required: - Proven experience in application security or a related field - Strong understanding of securecoding practices and security protocols - Proficiency with security testing tools and methodologies - Familiarity with programming languages such as Java, C++, or Python - Excellent problem-solving more »
their own code. Collaborate with engineering teams to help them triage and fix security issues, identifying systemic security weaknesses to create securecoding guidance that will educate all engineering teams within Oracle. Produce documentation, presentations and supporting material to deliver your findings to senior figures within the more »
so that it is easy to understand, test and evolve. Build solutions that avoid single points of failure, using scalable architectural patterns. Develop securecode so that our customers and ourselves are protected from malicious actors. Promptly investigate and fix issues and ensure they do not resurface in more »
basis. Owns the completion of any action plans. Ensures the Solution Delivery Center adheres to Information Security policies and standards for securecoding and manages risk acceptances. In collaboration with Procurement, manages RFI/RFPs, contract negotiations and delivery of contract terms. Also manages clean termiSolution Delivery more »
Greater London, England, United Kingdom Hybrid / WFH Options
Oliver Bernard
strategies. Master the art of penetration testing with tools like Burp Suite, OWASP ZAP, and/or Kali Linux. Experience with securecoding practices, threat modeling, and API security is highly desirable. Are a skilled communicator and collaborator, able to bridge the gap between technical and non more »
champion security within your current role, my client will be very interested in speaking with you. You will be training developers on writing securecode, perform threat modelling and security testing of applications, run SAST, DAST, SCA and secret scanning tools, manage the bug bounty program and lead more »
and information systems hardware and software. Authoritative understanding of principles, theories, techniques, and methods of information system analysis and programming, particularly securecoding practices. Thorough knowledge of data processing and data communications concepts and services. Thorough knowledge of computer monitoring systems, vendor-supplied packaged programs, macros, utilities more »
Industry (Insurance or Exchange highly desirable) Hands on experience Operating application tools Must have subject matter expertise in application threat modelling, securecoding practices in Java and C++, and DevSecOps practices. Must have current experience of operating SAST, SCA, DAST, IAST, MAST. Logistics: 6 Month Rolling Contract more »
quality software design and architecture. Accountable for the delivery of reliable, scalable, securecode within the production environment that adheres to their coding standards and quality expectations. Define engineering, technical and team strategy, including onboarding of new hires, defining objectives, training programs, personal development matrix, and identification more »
Greater London, England, United Kingdom Hybrid / WFH Options
TrueNorth®
that span both .Net Standard and .Net Core and utilise several frontend technologies such as Angular and Vue. • Designing and developing scalable and securecode to implement features across our applications What we need from you: • Experience in a wide range of technologies • Extensive full stack development experience … a proven ability to work across the codebase of a product. • Experience of Azure resource design, configuration and maintenance • Knowledge of how to secure a web application • Passion for continuous improvement through learning and developmentmore »
and scale. You're a security expert with a strong mix of technical and communication skills and are passionate about enabling safe and secure innovation. You will work with some of the best and brightest cybersecurity and technology engineers to solve complex problems which will both challenge you … that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes.? Embed threat modelling, solutions architecture, securecode review into product and application teams so they adopt our control products and create products that are secure from the start. … Demonstrated experience/understanding with product technologies including but not limited to: Understanding of Public Cloud computing, especially how controls are applied to secure data, ensure resiliency and availability. APIs micro-services Ability to collaborate on, and/or lead, ad hoc teams for control architecture and design more »