industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Searchability®
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
and response. Cloud Security Leadership Serve as the subject matter expert on AWS security and threat modeling methodologies. Provide guidance on cloud security principles, including identityandaccessmanagement (IAM), data protection, network security, and incident response in AWS environments. Stay current on the latest cloud security trends, AWS security features, and emerging threats. … of security awareness across engineering and operations teams. Lead workshops and training sessions to raise security awareness and improve threat modeling practices within the organization. Incident Response & Vulnerability Management Lead post-incident reviews related to security breaches or vulnerabilities in AWS infrastructure. Assist in the identification and resolution of security vulnerabilities related to AWS resources. Collaborate with the … with cloud-native security tools for monitoring, vulnerability management, and threat detection. Understanding of encryption, tokenization, and data protection strategies in the cloud. Expertise in IAM andaccess controls, including role-based access control (RBAC), policies, and permissions in AWS. Certifications (Preferred): AWS Certified Security – Specialty. Certified Information Systems Security Professional (CISSP). Certified More ❯
DORA, PSD2 SCA, CSSF) and global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital Operational Resilience Act) , ensuring alignment … risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct periodic user access … PCI DSS, and outsourcing/third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST frameworks (CSF, 800-53) andMore ❯
South East London, England, United Kingdom Hybrid / WFH Options
Falcon Smart IT (FalconSmartIT)
Type: FTC Job Description: Looking for a UAT QA immediately. This should be either certified on SailPoint application or with a strong working experience on SailPoint Application Onboarding (IdentityAccessManagement Testing Application). The Job description is as follows: Experience of IdentityAccessManagement - Mandatory Experience of … life cycle. Collaborate with development, business, and QA teams to understand requirements and ensure test coverage. Understanding of defect life cycle. Experience of root cause analysis. Good stakeholder management skills Familiarity with Agile and DevOps methodologies. Strong Interpersonal Skills - Mandatory More ❯
Duration: 1 year Hybrid – 2 days onsite per week Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of IdentityandAccess Management. Collect requirements and transform them into a structured and comprehensive work product. Define clear acceptance criteria which can serve as a comprehensive test set. … presentations to present the outcome of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key contributors during the project delivery … qualifications: My client is looking for a candidate with 5+ years of experience as Senior Business Analyst to be able to produce the required work products. Understanding of IdentityManagement including privileged accessmanagement, access request, privileges elevation, session recording, knowledge of access control models and policies. Experience More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Computappoint
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Anson McCade
Have: SC level clearance. Proven experience as an Infrastructure Architect or Senior Infrastructure Engineer in data centre migrations. Deep understanding of on-premise infrastructure including, Compute, Storage, Networking & IdentityandAccess Management. Certifications such as VMware VCAP/VCIX, Cisco CCNP/CCIE, Microsoft, TOGAF or ITIL. Background in public sector consulting. Data Centre Architect Key More ❯
Technical Programme Manager – Identity/accessmanagement Duration: 12 months Pay: 45-50/hour PAYE Location: Remote (UK) The ideal candidate will have 10 years experience in programme management with experience in either identity or security or system reliability. 3 areas of interest are: Accessmanagement, identity experience System reliability, stability, performance Threat intelligence, security, financial crime Key Responsibilities Lead a Platform team building the organisation’s first enterprise identityand related safety features. Work with product teams to ensure alignment with platform, develop technical roadmaps and ensure that platform decisions are continuously updated and aligned with evolving requirements of … performance and reliability commitments effectively Minimum Qualifications Bachelor’s degree in Computer Science, Engineering, or a related technical field, or equivalent practical experience. Proven experience in technical program management, project management, or a related domain. Strong understanding of software development processes and methodologies. Excellent communication, leadership, and organizational skills. Ability to manage multiple priorities in a More ❯
East London, London, United Kingdom Hybrid / WFH Options
Ventula Consulting
opportunity to work with a dynamic, forward-thinking team. Key Requirements: Strong hands-on experience with Workday integration development Proven experience working with Okta for identityandaccessmanagement Ability to work independently and deliver robust, scalable solutions Excellent communication and problem-solving skills If you're a proactive contractor with a passion for More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Principle
Technical Program Manager – Enterprise Identity, Risk & Platform Integrity Candidates to be considered have to be physically present in the UK with the appropriate right to work status - No sponsorships/work permits provided. A global tech platform is seeking a seasoned Technical Program Manager to lead delivery across enterprise identity, platform reliability, and security. This is … a 12-month PAYE contract (inside IR35), remote within the UK, with scope to extend. The Role You’ll drive large-scale technical programs across: Identityandaccessmanagement (SSO, onboarding, controls) Platform reliability (stability, performance, SLAs) Security and threat mitigation (trust, risk, fraud tooling) You'll work across product and engineering teams in … escalations and reporting. What You’ll Bring 10+ years in Technical Program/Project Management roles within identity, infra, or security Strong stakeholder and risk management skills Experience delivering in complex, high-scale tech environments Solid handle on Jira, G Suite, MS Project or similar tools What's in it for you Annual Salary More ❯