Junior Developer in Test (Security Solutions / Virtualization Platforms) – 12 month FTC

UKC01 - Cambridge, United Kingdom (UKC01)

Applications have closed

HP

Informieren Sie sich über HP Drucker, Laptops, Desktopsysteme und mehr – auf der offiziellen HP® Website

View company page

Junior Developer in Test (Security Solutions / Virtualization Platforms) – 12 month FTC

Description -

We are looking for a Junior Developer in Test for 12 months to join the HP Wolf Security R&D team in Cambridge, UK.. You'll be performing software test activities for a complex enterprise class security product based on micro-virtualization. The position will largely involve automated testing, scripting and some manual testing as and when required.  You’ll be helping assure the quality of our product as well as identifying any risks in our SDLC. 

Our ideal candidate will have excellent problem investigation and technical communication skills. You’ll be detailed oriented, collaborative and, as you’ll be working alongside our Virtualization Platforms group, knowledge of hypervisors and VMs would be a bonus. 

This is a fantastic opportunity to join a ground-breaking team, perfect for someone who is ready to prove their professional capabilities in a test role and has an enthusiasm for testing complex software. 

Responsibilities for the Junior Developer in Test:

Plan, design and write automated tests for new and existing features and bug fixes 

Monitor and help maintain automated tests systems, cooperating with DevOps and Developers 

On occasion, write, maintain and execute manual test cases for areas where automated testing isn’t appropriate 

Debug and troubleshoot issues uncovered during testing 

Investigate defects and submit defect reports 

Requirements for the Junior Developer in Test:

Prior experience of working in a professional software QA team 

Solid experience of Python based automation 

Experience of automating Windows applications  

Knowledge of a source control system such as Git 

Working knowledge of software testing methodologies 

 A great Junior Developer in Test will have-

Technical experience of continuous integration tools such as Jenkins 

Understanding of web browsers and cross-browser testing 

Experience of enterprise-level test automation frameworks 

Understanding and experience of virtualization   

An interest in software security and the techniques used by malware and hackers 

Bachelor’s degree in Computer Science or a related technical subject or equivalent 

****This 12 month Fixed Term Contract opportunity would be ideal for a Science or Mathematics postgraduate that also has commercial Internship and /or placement experience in software testing / QA***

#LI-Post

About you:

You’re out to reimagine and reinvent what’s possible- in your career as well as the world around you. So are we. We love taking on tough challenges, disrupting the status quo, and creating what’s next. We’re in search of talented people who are inspired by big challenges, driven to learn and grow, and dedicated to making a meaningful difference.

About HP Wolf Security

The primary focus of the HP Wolf Security team is developing cyber security solutions to protect our customers devices and data. The digital threat landscape is ever-changing and as the cyber security industry reacts and adapts to changes, so too do the malware authors.  Our unique micro-virtualization technology ensures that customers are protected from even the most bleeding edge cyber security threats. That micro-virtualization technology forms a key pillar in a wider cyber security suite that we're actively developing. 

To see what our engineering teams are working on, check out our technical blogs: https://threatresearch.ext.hp.com/blog

Our history:

Inspired by the isolation principles of traditional virtualization, our team known then as Bromium, created a game-changing technology called micro-virtualization to protect end users against advanced malware. Every task the user performs, such as opening a document or clicking on a link, is isolated in its own micro-VM, with access to just the resources required for that task, and existing just for the life of the task. Protection is thus provided through isolation, without relying on detection, hence reliably defending the user from polymorphic and even zero-day malware. 

Bromium was acquired by HP Inc on 19 September 2019 forming HP Wolf Security. 

For more information, visit our website: https://www.hp.com/uk-en/security/endpoint-security-solutions.html

Job -

Software

Schedule -

Full time

Shift -

No shift premium (United Kingdom)

Travel -

Relocation -

Equal Opportunity Employer (EEO) - 

HP, Inc. provides equal employment opportunity to all employees and prospective employees, without regard to race, color, religion, sex, national origin, ancestry, citizenship, sexual orientation, age, disability, or status as a protected veteran, marital status, familial status, physical or mental disability, medical condition, pregnancy, genetic predisposition or carrier status, uniformed service status, political affiliation or any other characteristic protected by applicable national, federal, state, and local law(s).

Please be assured that you will not be subject to any adverse treatment if you choose to disclose the information requested. This information is provided voluntarily. The information obtained will be kept in strict confidence.

If you’d like more information about HP’s EEO Policy or your EEO rights as an applicant under the law, please click here: Equal Employment Opportunity is the Law Equal Employment Opportunity is the Law – Supplement

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  22  1  0

Tags: Automation Computer Science DevOps Jenkins Malware Mathematics Python R&D Scripting SDLC Windows

Perks/benefits: Career development Salary bonus

Regions: Remote/Anywhere Europe
Country: United Kingdom

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.