following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
london (city of london), south east england, united kingdom
Ncounter Technology Recruitment
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, CREST. Identity management and federation, public key infrastructure, SIEM, cryptography, firewalls, vulnerability scanning. A varied background, diverse programme exposure and a security-based master’s degree or alternatively STEM degree are needed with an ability to demonstrate your capability as a More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
enhance mobile security throughout the development lifecycle shaping tooling strategy, driving automation and promoting a 'Secure by Design' culture. Key Responsibilities Design and implement automated mobile security testing and vulnerabilityscanning within the mobile SDLC. Define and deliver the mobile app security tooling and technology strategy. Run proof of concepts for new tools and integrate them into CI … a Mobile Application Security Testing platform for manual testing. Skills & Experience Proven experience with mobile SAST/SCA and security testing tools (e.g. mobSF, Corellium). Strong grasp of vulnerability frameworks such as CVSS and EPSS. Development experience in at least one mobile programming language (Objective-C, Swift, Java, Kotlin). Scripting skills in Python or JavaScript. Familiar with More ❯
Nx monorepo , ensuring consistent cross-layer contracts and type safety (tRPC/GraphQL). Establish CI/CD and GitOps practices with GitHub Actions and ArgoCD, including automated testing, vulnerabilityscanning, and environment promotion workflows. Drive the definition and implementation of observability standards - Prometheus, Grafana, Loki/ELK, Jaeger, Sentry - enabling end-to-end visibility and SLA tracking. More ❯
decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
london (city of london), south east england, united kingdom
Damia Group
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯
and production environments. Operate key Azure services including App Services, AKS, Azure Functions, Virtual Networks, and Azure SQL. Implement security controls using Azure Active Directory, Key Vault, RBAC, and vulnerabilityscanning tools. Set up monitoring and alerting with Azure Monitor and Application Insights for high availability. On-Premises Infrastructure Aspects Maintain integration and support for hybrid cloud scenarios More ❯
and production environments. Operate key Azure services including App Services, AKS, Azure Functions, Virtual Networks, and Azure SQL. Implement security controls using Azure Active Directory, Key Vault, RBAC, and vulnerabilityscanning tools. Set up monitoring and alerting with Azure Monitor and Application Insights for high availability. On-Premises Infrastructure Aspects Maintain integration and support for hybrid cloud scenarios More ❯
and senior stakeholders. Qualifications Strong background in network infrastructure design and review , with a focus on security. Proven experience designing and documenting security architectures and solutions . Expertise in vulnerabilityscanning design and implementation . Ability to evaluate and integrate new technologies and innovations under tight delivery schedules. Excellent communication and presentation skills when engaging at all levels. More ❯
Basingstoke, Hampshire, South East, United Kingdom
Experis
Technical Security Architect role Strong background in network infrastructure design and review , with a focus on security. Proven experience designing and documenting security architectures and solutions . Expertise in vulnerabilityscanning design and implementation . Ability to evaluate and integrate new technologies and innovations under tight delivery schedules. Excellent communication and presentation skills when engaging at all levels. More ❯
technologies with a view to improving, streamlining or cost saving Assist and educate other teams Work with the EUC provider and Security teams to resolve security vulnerabilities identified by vulnerabilityscanningMore ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle >selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
london (city of london), south east england, united kingdom
Intelix.AI
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯
experience building & enforcing technology standards, risk frameworks, & software asset policies. Control the adoption, contribution, and distribution of OSS across all engineering teams. Full OSS lifecycle selection, license review, onboarding, vulnerabilityscanning, and decommissioning. Comfortable working alongside Legal, Risk, Security, and Procurement. Translating license terms into enforceable technical and legal policies. Managing obligations that can lead to OSS license More ❯