Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
conducting regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & AccessManagement) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams … projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, andaccess reviews in GCP Proven experience working in FinTech or financial services, ideally under PCI-DSS, ISO 27001, or SOC 2. Strong Scripting or automation experience (Python, Terraform, Bash …/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence architecture More ❯
About the Role: As a Senior Consultant in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity … solutions using SAP CDC, aligned with Roche’s enterprise digital strategy. Serve as a consultative partner to business and technology teams, translating business needs into secure, user-friendly identity experiences. Drive the strategic integration of CIAM with digital platforms and applications, ensuring interoperability and performance across ecosystems. Champion compliance and data privacy by designing solutions that meet global … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯
and enables boundaryless opportunities that can drive your career in new and exciting ways If you’re looking for a challenging career working in a vibrant environment with access to training and a global network of experts, this could be the role for you. As part of our global team, you'll be working with cutting-edge technologies … skills: Passion for improving the UK public sector security posture Experience applying security technologies to architectures and solution designs, such as Privilege AccessManagement, SSO, IDAM, Network security and encryption Understanding of IT infrastructure, technical concepts, and design methodologies Understand threat modelling and development of reference architecture Ability to learn and adapt quickly Preferred hands on … Employment Opportunity Statement All employment decisions shall be made without regard to age, race, creed, colour, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by applicable law. Job candidates will not be obligated to disclose sealed or expunged records More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
Experience in a manufacturing or industrial environment, Operational Technologies Knowledge with security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR) Experience with SIEM solutions, endpoint security, andidentity & accessmanagement Ability to conduct risk assessments and develop mitigation strategies. Job Offer 10% on call allowance Opportunity to work as a critical security role More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
the following operators: o HashiCorp Vault - secrets management o Red Hat Quay - internal container registry o Clair - container image vulnerability scanning o Keycloak - identityandaccessmanagement o OpenShift Service Mesh (Istio) - microservices communications Additional Skills: * Infrastructure as Code (Ansible/Terraform) * CI/CD and GitOps (eg Jenkins, ArgoCD, Tekton) * Scripting More ❯