Endpoint Security: Evaluate User Access Permissions: Review and potentially limit access to administrative tools like PowerShell and CMD, based on a least privilege principle. ZeroTrust Security Framework: ZeroTrust Investigation and Roadmap Definition: Research and develop a roadmap for implementing a ZeroTrustmore »
or Azure technology stack, including Web apps, traffic manager, serverless functions, CDN, application insights, CloudWatch, pipelines, storage and security. Experience with implementing and maintaining Zero-Trust concepts and policy enforcement. Understanding of software development methodologies and programming languages. Deep knowledge of continuous integration and delivery tooling such as … Github, ArgoCD, Docker, Kubernetes and Terraform. Understanding and experience using or deploying device-based trust applications (Okta Verify, Google Beyondcorp, Cloudflare ZeroTrust, etc). Extensive knowledge of RBAC/ABAC concepts and operating policies. Excellent technical documentation and KB writing skills with the ability to contribute more »
Employment Type: Permanent
Salary: £60000 - £85000/annum Excellent bonus and benefits
encryption products. You will support our research efforts around IoT Security, the Identity of Things (IDoT), Machine-to Machine (M2M) communication security and authentication, zero-trust networks and zero-knowledge systems. This role offers the opportunity for significant learning and professional development, whilst contributing significantly to our … into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
depth knowledge of cloud security (AWS, Azure, GCP). Relevant certifications such as CSPM, CISSP, CISM, CEH, or AWS Certified Security – Specialty. Familiarity with zero-trust architecture and principles. more »
Kanban, and Scrum methodologies.Expertise in leading diverse and inclusive teams.Cyber Security:Experience in architecting secure, cloud-based (AWS) applications, including CI/CD.Familiar with ZeroTrust Architecture, SBD, OWASP, NIST, CIS, and NCSC baselines.Strong foundation across the cybersecurity technology stack.Desirable:Prior experience working in agile delivery teams.Familiarity with more »
one or more software stacks of the DevSecOps team. Microservices Security: Implement and manage security measures for microservices architectures, including service mesh configurations and zero-trust principles. API Security: Ensure all APIs are secure, utilizing appropriate authentication, authorization, and encryption mechanisms. Cloud Security: Secure cloud environments (AWS, Azure more »
including Azure networking, provisioning, and Security (IAM) management. Experience in Azure security (NSG, F/W, Managed Identity, Service Principal) and best practices for zero-trust infrastructure setup. Knowledge of cloud architecture and implementation features (OS, multitenancy, virtualization, orchestration, elastic scalability). 5+ years of experience in support more »
two years experience working within Secuirty Engineering · Understanding of Security Operations · Experience with security toolsets such as (but not limited to) SIEM, cloud security (zerotrust, CASB ect), SOAR, CVM tools. Desirable skills: · Experience with using Zscaler · Experience with using CrowdStrike. · Experience with using Qualys CVM. If you more »
Management ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape or Ansible ● Experience with Public Cloud Security ● Experience with ZeroTrust Platforms WHAT'S ON OFFER? ● You'll be joining an organisation that is truly shaping the future of the sector in which more »
to the Buyer’s IT service and ensuring that designs justify this. Understanding the implications of design choices in highly secure micro-segmented and zero-trust architectures. • Providing assessments of design/technology options as part of design choices, clearly describing the criteria used, options analysis and final more »
to Cloud based technologies such as Azure and AWS Experience with Application Virtualization in a VDI environment Understand infrastructure security best-practices such as zero-trust, least-access, MFA, etc. Comprehensive practice in implementing and troubleshooting using the OSI networking model. At Cognizant you will experience an exciting more »
expert: Setting up, configuring and updating the Azure suite of tools including InTune, Azure Key Vault, Defender, email security, sharepoint security etc Embrace a zero-trust approach: Patch management, emerging security trends? You'll be a master, integrating cutting-edge tools like Zscaler and CrowdStrike to create an more »
documentation & presentations and marketing material as well as a quality service to all Excellent knowledge of Security products, especially Next Generation, virtual, FW, MDR, ZeroTrust etc. Dependable and professional Excellent knowledge and proficiency for ICT services, especially network, solutions, & security Good technical computer and software skills. Ability more »