Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Artis Recruitment Ltd
optimise cloud resources, driving automation and efficiency Ensure high levels of uptime and strong disaster recovery planning for Azure services Enforce device and system security through Intune and Azure policy management Spearhead the shift from on-premise infrastructure to a cloud-first environment, including migrating from Active Directory to Entra ID Oversee the transition of device management … Strong scripting and automation skills using PowerShell, Python, or Bash Solid foundation in networking concepts (VPNs, Load Balancing, DNS, Firewalling, VNet peering, etc.) Expertise in identityandaccessmanagement, including Entra ID (formerly Azure AD), Conditional Access, RBAC, and endpoint protection Familiarity with Azure cost optimisation and billing best practices Hands-on More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
look for your experience and knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This role requires you to hold or fulfil the criteria to obtain a UK Security Clearance #LI More ❯
At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to … cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to … Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, andidentityandaccess management. We're seeking a skilled and passionate More ❯
or application optimisation. You should have: Experience with system management stacks used in the management of reasonably large HPC systems, including identityandaccessmanagement, system configuration, software deployment, high performance networks, and software container technology and monitoring. Development experience classic compiled languages such as C, C++ or Fortran and … developers. Combining technical knowledge with bigger-picture thinking. You might also have: M.Sc./Ph.D. in a Science, Technology, Engineering or Mathematical discipline. Experience with the Cray System Management software or OpenCHAMI Experience in one or more domain specific software ecosystems (e.g. weather and climate, computational fluid dynamics, AI, data science). Experience working on EU projects. Experience … Additional Skills: Accountability, Accountability, Action Planning, Active Learning (Inactive), Active Listening, Agile Methodology, Agile Scrum Development, Analytical Thinking, Bias, Coaching, Creativity, Critical Thinking, Cross-Functional Teamwork, Data Analysis Management, Data Collection Management (Inactive), Data Controls, Design, Design Thinking, Empathy, Follow-Through, Group Problem Solving, Growth Mindset, Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity + More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Smartbox Assistive Technology
techniques, and secret management. Familiarity with Entity Framework or other ORM tools. Experience in applying OWASP secure coding practices. Confident applying cloud best-practices for identityandaccessmanagement, hosting, deployment and monitoring. Confident working on problems from scratch - resourceful in turning problems into simple solutions, and proactive in working with stakeholders to resolve More ❯