challenges and deliver them to production whilst providing technical mentorship to junior colleagues and the development teams of consuming services. IdentityandAccessManagement (IAM) extends far beyond a pane in the AWS console for us. Our team are experts in identity … coordinating with other teams to ensure the resilience of our production systems. Your key duties Help the Met Office build IdentityandAccessmanagement solutions that supports the adoption of cloud and hybrid cloud services that is in line with our vision of: "Provide … a unified approach to protecting data and services with an IdentityandAccessManagement service that is manageable, scalable, and easy to use" Using proven industry knowledge and experience with IdentityandAccessManagement to set future technical more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving … in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identityandaccessmanagement, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerability … management Skills: Relevant certifications (CompTIA Security+, CySA+, CASP+, PenTest+, or Microsoft Azure Security). Proficiency in Microsoft Sentinel, KQL queries, and cloud security technologies would be beneficial. Strong understanding of firewalls, networking. Microsoft 365 and endpoint security. Keen awareness of Cyber Security trends and hacking techniques. Network Security more »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
seeking an experienced Implementation Project Manager for an initial 6 month contract. The Data Consent Project will focus on implementing a data consent management platform. The right person will have extensive experience in similar implementation projects, proven data privacy compliance knowledge and a background managing enterprise level projects. … business and IT to create processes for selecting a platform and partner to implement a global consent and identify platform. Collaborate with senior management, stakeholders, and technical teams to define the project scope, goals, and deliverables. Lead a cross-functional project team consisting of IT professionals and business … IT projects on time and within budget. Strong experience managing enterprise projects involving data privacy compliance and implementation of customer identityandaccessmanagement (CIAM) solutions like Adobe Experience Platform, SAP CDC, Oracle Identity Cloud Service (OICS), or Auth0. Strong understanding of more »
Devon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of CI/CD tools and SAST/DAST tooling. Understanding of networking principles and cloud security frameworks. Experience with identityandaccessmanagement tools. Familiarity with relational and NoSQL databases. #INDTech more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
flexible working .We give you a world of potentialThe Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring andmanagement of information and cyber security across the Computershare businesses, globally. Through partnerships with the business units, Technology Services and other support functions, the Global … maintain strong, collaborative working relationships with global and regional technology infrastructure, application, and architecture teams.Essential Experience:Relevant experience within any of the following:IdentityAccess ManagementSIEMData Loss PreventionIDS/IPSEmail Threat PreventionEndpoint Detection and ReponseIdentity ProtectionPrivileged Password ManagementCloud SecurityRewards designed for youFlexible work to help you more »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
SIEM, EDR, XDR and CMDBs. Develop and deliver secure system profiles and maintain a view of compliance. Assist the development of granular Asset Management tooling and processes and employ such mechanisms to maintain granular visibility of the estate. Where and when appropriate you may be expected to support … on premise infrastructure. Network security design and technologies. Experience securing OT/ICS systems (SCADA, HMI, PLC, etc.). Experience and knowledge of identityandaccess management. Knowledge of common cyber security threats and application of countermeasures. Good knowledge of Tactics, Techniques and Procedures (TTP) e.g. more »