Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

DevSecOps Engineer

Brightbox GRP Ltd
Newcastle upon Tyne
5 days ago
Create job alert

DevSecOps Engineer
Initially 3 Months
Remote
£450-£550pd (Outside IR35)

Position Overview:
We are seeking a knowledgeable and dedicated DevSecOps Engineer to join our team. In this role, you will be responsible for ensuring the proven identity of transactions and implementing traceability throughout the development journey. You will conduct regular audits to maintain compliance and security standards, ensuring that our systems are robust and reliable.

Key Responsibilities:
Ensure proven identity of transactions and implement traceability throughout the development lifecycle.
Conduct regular security audits and assessments to maintain compliance with relevant standards.
Collaborate with cross-functional teams to set up and manage CI/CD pipelines using tools like GitHub for repository management.
Design and implement development environments that enhance productivity and efficiency.
Build and deploy applications in containers across various environments while ensuring data sovereignty.
Identify and resolve any security vulnerabilities in the development process.
Develop and maintain scripts to automate processes and improve operational efficiency.

Qualifications:
Strong understanding of end-to-end DevSecOps processes and best practises.
Proven experience with CI/CD tools and practises.
Proficiency in Azure cloud services, with a focus on maintaining data sovereignty.
Experience in containerization technologies such as Docker and Kubernetes.
Excellent problem-solving skills and a proactive approach to securing software development.
Strong communication skills and the ability to work effectively in a collaborative environment.

TPBN1_UKTJ

Related Jobs

View all jobs

DevSecOps Engineer

DevSecOps Engineer

DevSecOps Engineer

DevSecOps Engineer

Senior DevSecOps Engineer (Identity Access Management))

Cyber Security Engineer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Future of Cybersecurity Jobs: Careers That Don’t Exist Yet

Cybersecurity has moved from a specialist concern to a national and global priority. Once seen as an IT issue, it is now a boardroom subject, a government responsibility, and a daily reality for individuals. With the increasing reliance on digital infrastructure, cloud platforms, and artificial intelligence, the risks posed by cyber threats have never been higher. The UK’s cybersecurity sector is thriving. It is home to thousands of companies offering defence services, penetration testing, encryption solutions, and critical infrastructure protection. Demand for cybersecurity skills continues to rise, with both the public and private sector investing heavily to defend against ransomware, nation-state cyber operations, and new forms of digital crime. Yet the industry is still at the beginning of its journey. The technologies that will define the next two decades—artificial intelligence, quantum computing, extended reality, and the Internet of Things—are only just starting to reshape cybersecurity. This means that many of the most important cybersecurity jobs of the future don’t even exist today. This article explores why new roles will emerge, what they might look like, how today’s jobs will evolve, why the UK is well-positioned to lead, and how professionals can prepare.

Seasonal Hiring Peaks for Cybersecurity Jobs: The Best Months to Apply & Why

The UK's cybersecurity sector has emerged as one of the most critical and lucrative technology markets, with roles spanning from security analysts to penetration testers and chief information security officers. With cybersecurity positions commanding salaries from £28,000 for junior security analysts to £140,000+ for senior security architects, understanding when organisations actively recruit can dramatically impact your career trajectory in this essential field. Unlike traditional IT sectors, cybersecurity hiring follows distinct patterns influenced by threat landscapes, regulatory compliance cycles, and incident response requirements. The sector's unique combination of perpetual threat evolution, regulatory pressures, and skills shortages creates predictable hiring windows that strategic professionals can leverage to advance their careers in protecting Britain's digital infrastructure. This comprehensive guide explores the optimal timing for cybersecurity job applications in the UK, examining how cyber threat cycles, compliance deadlines, and government initiatives influence recruitment patterns, and why strategic timing can determine whether you join a cutting-edge security consultancy or miss the opportunity to defend against tomorrow's cyber threats.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.