Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, andidentitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation … developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust IdentityandAccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identityandaccess controls. More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … front-end technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
security strategy. Role Description Develop, implement, and maintain cutting-edge security solutions to protect sensitive systems and data. Act as a subject matter expert on security engineering, encryption, andaccess management. Conduct regular audits, identify vulnerabilities, and drive remediation initiatives across infrastructure and applications. Collaborate with cross-functional teams to ensure cryptographic and IAM solutions align with business … in Identity & AccessManagement (IAM) and cryptographic technologies. Skilled in conducting risk assessments, vulnerability analysis, and developing secure protocols. Excellent communication and stakeholder management skills, with the ability to influence decision-making. Desired Skills Advanced knowledge of internal controls, governance, and audit frameworks. Experience leading or mentoring teams, particularly within a complex More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
suite of business-critical applications, including but not limited to: Atlassian suite (Jira, Confluence) Developer and product tools such as TeamCity, Bitbucket, Stoplight, Cucumber Studio, WebDMS, FEC, Document Management Systems CRM & ERP tools like HubSpot and SAGE Google Workspace (Admin Console) and other SaaS platforms Analyse existing application usage and workflows to identify inefficiencies, recommend improvements, and implement … assess needs, propose solutions, and improve workflows. Maintain accurate IT documentation, configuration records, and knowledge base articles for supported applications. Manage onboarding and offboarding processes related to application accessand user provisioning. Support local tech teams with day to day support on an ad-hoc basis Provide input into the deployment of customer-facing IT requirements aligned to … to work independently onsite while collaborating effectively with global teams. Desirable (but not essential) ITIL Foundations Certification Experience supporting Mac and Windows environments Familiarity with identityandaccessmanagement, SSO, and federation technologies Experience with scripting or automation tools (e.g., PowerShell, Python, Google Apps Script) Industry certifications (e.g., CompTIA A+, Google Workspace, Microsoft) What More ❯
Do Act as a trusted technical advisor, guiding customers through their cybersecurity and digital transformation journeys Stay at the forefront of emerging security technologies (SIEM, SOAR, EDR, SASE, DDoS, IDAM, WAF, and more) Design and present high-impact security and networking solutions (Fortinet, Palo Alto, Juniper, Zscaler, Netskope, and more) Lead technical discovery sessions, solution design, demos, and PoCs Create More ❯
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical concepts into business value. Requirements More ❯