side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
LTIMindtree
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Vallum Associates
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
Vallum Associates
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
Impact Team
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
eTeam
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
adoption metrics. What You'll Bring Nice Haves: Bachelor's degree (or equivalent related experience) 7+ years' experience working with AWS, GCP, Azure, or Alibaba cloud Understanding of API concepts and RESTful services Understanding of cloud security, zero trust, risk-based authentication, and multi-factor authentication (MFA) solutions Hands More ❯
adoption metrics. What You'll Bring Nice Haves: Bachelor’s degree (or equivalent related experience) 7+ years’ experience working with AWS, GCP, Azure, or Alibaba cloud Understanding of API concepts and RESTful services Understanding of cloud security, zero trust, risk-based authentication, and multi-factor authentication (MFA) solutions Hands More ❯
SDN, encryption, security solutions, attack and defense strategies, Threat Hunting, Threat Modelling, Reverse Engineering, Vulnerability Management, Data Modelling, and Cloud Technologies (Azure, AWS, GCP, Alibaba). The client is willing to provide training in areas such as forensics authentication, Python, Shell scripting, Ansible, Jenkins, Azure Architecture, Threat Intelligence, and More ❯
in writing elegant and maintainable code, to join our mission of securing the cloud. We run a multi-cloud architecture (Azure, AWS, GCP, OCI, Alibaba Cloud) using Golang, GraphQL, PostgreSQL, Neptune, Docker, Kubernetes, and the list goes on. WHAT YOU’LL DO End-to-end development of backend software More ❯
London, England, United Kingdom Hybrid / WFH Options
Fab Lab ABQ
have experience securing both Linux and Windows-based systems. You have experience with public cloud environments, including a hybrid environment with AWS, Azure, and Alibaba Cloud. You have experience integrating security scanning tools into CI/CD pipelines and runtime environments. You have experience within a trading/financial More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
of securing both Linux and Windows based systems You have experience with public cloud environments, there's a hybrid environment with AWS, Azure and Alibaba Cloud You have experience of integrating security scanning tools into CI/CD pipelines and runtime environments You have experience within a trading/ More ❯
London, England, United Kingdom Hybrid / WFH Options
Veeva Systems
Perl, PHP, C/C++, C# Experience with cloud service providers and their offerings, preferably AWS and its various technologies and APIs, Azure, and Alibaba Cloud Nice to Have Bachelor of Science in Cyber Security, Information Security, MIS, or equivalent Experience in Web and Mobile (Android/iOS) based More ❯
assess risks. Understand IAM constructs across cloud platforms: AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), Alibaba Cloud (RAM users, groups, roles, policies), and Kubernetes RBAC (roles, bindings). Identify gaps and over-privileged accounts in SaaS identity management, including SSO … as a Business Analyst or similar, focused on IT security, governance, or IAM. Hands-on experience with IAM processes in AWS, Azure, GCP, and Alibaba Cloud. Proficiency with cloud consoles, CLIs, and reviewing Infrastructure as Code (Terraform, CloudFormation) for IAM issues. Excellent stakeholder management and facilitation skills. #J More ❯
and maintainable code. Join us in our mission to secure the cloud. Our tech stack includes a multi-cloud architecture (Azure, AWS, GCP, OCI, Alibaba Cloud) with Golang, GraphQL, PostgreSQL, Neptune, Docker, Kubernetes, and more. WHAT YOU’LL DO End-to-end development of backend software components (research, design More ❯
and VMware Horizon. Be familiar with the operation and maintenance of at least one public cloud, such as Amazon Web Services (AWS), Microsoft Azure, Alibaba Cloud, or Huawei Cloud. Be familiar with operating systems (such as Windows Server, Linux, etc.), network technologies, and hardware configurations (including servers, storage systems More ❯
understanding of cloud security principles, compliance frameworks (e.g., CIS, NIST), and risk management. Experience with cloud platforms such as AWS, Azure, Google Cloud, or Alibaba Cloud. Cybersecurity experience managing large cloud-based asset estates. Experience ensuring cloud projects adhere to security policies and standards. This position is based in More ❯
ID) and actionable fraud intelligence, empowering businesses to stay ahead of new and unknown fraud threats. We are trusted by global unicorns like inDrive, Alibaba, Swiggy, Meesho, TrueMoney, and more. With offices in Los Angeles, London, Jakarta, Bengaluru, Beijing, and Singapore, we are rapidly achieving our mission - eliminating unfairness More ❯
AI-powered advice on this job and more exclusive features. Direct message the job poster from 2-TIMES Digital Performance at 2-TIMES | ex-Alibaba & Baidu Candidates must be based within proximity of one of our 2-TIMES locations: Hong Kong (Central), Singapore (Rochor), or Melbourne (CBD). For More ❯