related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP … and implementing Azure landing zones and hybrid cloud environments. Expert-level knowledge of core Azure services including Azure IaaS, Azure Networking, and Azure Active Directory. Deep expertise in identity federation and single sign-on (SSO), with hands-on experience integrating Okta with Azure AD. Strong understanding of traditional on-premises infrastructure services including Domain Controllers , Certificate Services , DNS More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP More ❯
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the More ❯
certificate lifecycle management. Implement and maintain Certificate Authorities, Registration Authorities, and associated infrastructure. Ensure secure deployment and configuration of PKI across enterprise systems, endpoints, applications, and devices. Collaborate with IDAM, DevOps, and cloud security teams to integrate PKI with broader identityand security architectures. Provide technical leadership in incident response and troubleshooting related to certificates and encryption. Stay … OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and key management practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards … such as PCI DSS, HIPAA, SOX, GDPR, NIST 800-53. Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: IdentityandAccess, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture andIdentity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible More ❯
Do Act as a trusted technical advisor, guiding customers through their cybersecurity and digital transformation journeys Stay at the forefront of emerging security technologies (SIEM, SOAR, EDR, SASE, DDoS, IDAM, WAF, and more) Design and present high-impact security and networking solutions (Fortinet, Palo Alto, Juniper, Zscaler, Netskope, and more) Lead technical discovery sessions, solution design, demos, and PoCs Create More ❯
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical concepts into business value. Requirements More ❯