National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Sr. Application Security Engineer (United Kingdom)

Intermedia
11 months ago
Applications closed

Related Jobs

View all jobs

Sr. Security Engineer, AppSec - Amazon Stores Security

Sr. Cybersecurity Engineer

Sr. Information Security Engineer

Are you ready to make your mark?

About The Role:

Intermedia has a wide portfolio of internally developed application software, ranging from web and desktop apps to lower-level PBX solutions. Due to the growing demand for integrating security activities into diverse development processes, Intermedia is looking for an experienced and self-motivated Application Security Engineer to help us deliver security built-in to our products.

As part of the Information Security global team, you will help lead our company wide application security program, helping the company build secure products. You will be the voice of security for all things related to application security to our spectrum of engineering teams. This is a chance to make your mark, leading the architecture and execution of our SDLC throughout the enterprise. This position is an individual contributor role, reporting directly to the SVP of Security.

What you will be doing:

Perform design and architecture review of new features, suggest security requirements Collaborate with DevOps and engineering teams, advising on security features and best practices in SDLC Utilize static security scanning tools, review findings and coordinate remediation actions Perform ongoing manual security assessments Review the results of external penetration tests and communicate suggested fixes to development teams Provide on-demand support on application security topics Drive process improvement ideas Assist with vetting and intake of defects from 3rd party security researchers via our Bug Bounty program

What you will bring to the role:

4+ years of experience in the application security field Knowledge of secure coding best practices and industry standards (such as OWASP) and the ability to apply them to different programming languages Knowledge of SDLC and DevSecOps concepts and hands-on experience in implementing them Experience in using static and dynamic security scanning tools (such as Burp, ZAP, Snyk, SonarQube, Checkmarx and others) Knowledge of secure design principles and ability to architect and design secure software systems, considering security requirements and constraints 1+ years of experience in securing applications within cloud platforms (AWS, Azure, GCP) and containerized environments (Docker, Kubernetes) Ability to explain application security threats and mitigation options to both developers and project managers Good communication skills in written and verbal English Proactiveness and self-drive to move things forward with little or no supervision Strong sense of ownership, responsibility and drive Hands-on experience in integrating security testing tools within CI/CD pipelines

Bonus:

Participation in CTF challenges and bug-bounty programs

Additional Information:

We offer an attractive salary and benefit package, flexible schedule, professional team, and friendly atmosphere.
National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.