stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Capgemini Invent
secure business outcomes for our clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data andidentity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our security specialists and innovators enable our clients to evaluate cyber risks, redesign Cybersecurity operating models, modernise … digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. We continuously recruit across a range of experienced hire grades for our DT&S practice. … often the first step in engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threat modelling, risk managementand security overlay approaches by conducting security maturity assessments. Developing new security strategies to manage emerging risks in Cloud & agile/DevSecOps operating environments. Providing a business understanding of More ❯
AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and … controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Capgemini
secure business outcomes for our clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data andidentity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our security specialists and innovators enable our clients to evaluate cyber risks, redesign Cybersecurity operating models, modernise … digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. We continuously recruit across a range of experienced hire grades for our DT&S practice. … often the first steps in engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threat modelling, risk managementand security overlay approaches by conducting security maturity assessments. Providing a business understanding of technical domains and tailoring these to help clients maximise value and leverage quick wins on More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and … controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as, CIS, ISO 27001, NIST, and regulatory requirements Collaborate Across Teams More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance #J-18808-Ljbffr More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance We know our colleagues work tirelessly to make JD Sports the success it is today and in turn, we offer them some amazing benefits including staff Discount More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lonza
that’s the kind of work we want to be part of. The IAM Engineer for directory services at Lonza, you will be responsible for the design, implementation, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) across the organization's global infrastructure. Your role will involve ensuring the security, availability, and scalability of these … directory services, which are critical to the company's identityandaccessmanagement framework. You will work closely with cybersecurity, IT operations, and business units to develop and enforce access control policies, manage user identities, and support seamless integration with both cloud and on-premises applications. Additionally, you will ensure that the … while continuously evaluating and adopting emerging technologies to enhance the organization's security and operational efficiency. Key responsibilities: Design and Implementation of Directory Services: Lead the design, deployment, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) environments, ensuring they are secure, scalable, and optimized for performance. Develop and implement policies for directory services that More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
optimization. Ensure compliance with industry regulations (e.g., FCA, GDPR) and internal security policies. Implement backup, disaster recovery, and high availability strategies in the cloud. Manage identityandaccessmanagement (IAM), security groups, and networking configurations. Automate deployment pipelines and configuration management using DevOps practices and CI/CD tools (e.g., GitHub Actions … Scripting or automation experience (PowerShell, Bash, or Python). Familiarity with monitoring and logging tools such as Azure Monitor, CloudWatch, or Datadog. Understanding of IT governance, compliance, and risk management within financial services. Desirable Qualifications: Relevant cloud certifications (e.g., Microsoft Certified: Azure Solutions Architect , AWS Certified Solutions Architect , etc.). Experience with hybrid cloud and on-prem to More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer – Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … the following technologies: • Entra Collaboration Solutions (B2B, B2C) • Identity Models: Managed (PHS/PTA) vs Federated • Hybrid Identity Solutions • Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: • Active Directory Federation Services (ADFS) or third-party federation • Privileged IdentityMore ❯
the future. Free breakfast, drinks and fruit in the office – you can help yourself to cereals, toast, fizzy drinks and lots of fruit. Employee discounts – discounts you can access anywhere, anytime for all major shops. 1 day volunteer day per year– an opportunity to give back to the community each year. Mental health care – 6 free counselling sessions … of identified risks. Provide technical security guidance to project teams, embedding security considerations throughout the software development lifecycle (Security by Design). Maintain oversight of identityandaccessmanagement controls. You’ll be a great fit if you have: A minimum of 4 years proven experience in a 1st line cyber security operations role. … hunting techniques. Excellent communication and interpersonal skills. Strong analytical and problem-solving skills. Ability to work independently and as part of a team. Experience with security information and event management (SIEM) systems. Commitment to fostering and embedding a strong cyber security risk culture. Ability to handle multiple competing priorities simultaneously in a fast-paced and dynamic environment. Desirable More ❯
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from NCC Group Global Talent Acquisition Partner | Global Managed Services | Consulting & Implementation & IdentityAccessManagement | NCC Group Cyber Security Senior Consultant Role Purpose NCC Group provides Information Assurance consultancy to help companies protect critical systems and information. We … client base. In addition to your technical skills, you will have strong client facing skills and be comfortable dealing with senior client stakeholders. Summary Liaise with the Resource Managementand Pre-Sales team during the sales cycle to assist in quantifying, pricing and assessing resources required for the project delivery. Assist with sales proposals, bids and tenders for … act as mentor to less experienced consultants and foster knowledge sharing throughout the delivery team. What we are looking for in you Skills Have strong skills in Sentinel management & optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & Data Loss Prevention (DLP) Experienced in More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
NCC Group is excited to announce our continued investment in expanding our digital identity team as we continue to expand and enhancing our identityandaccessmanagement (IAM) capabilities, offerings, and propositions. Our incredible Digital Identity team operate as a global practice to deliver leading consultancy and managed services. We … transition to a consulting level position, based on a 2-to-3 timeframe, with the ability to focus on a broad or specific focus on IdentityandAccessManagement services. Essential Skills To thrive at NCC Group, you should possess a genuine enthusiasm for your work and a strong desire to learn both on … skills, we are particularly interested in candidates who demonstrate proficiency in three or more of the following areas: Relevant experience in cybersecurity or familiarity with IdentityandAccessManagement (IAM) processes, policies, or technologies Knowledge of operating systems, including Windows, MacOS, and/or Linux Proficient programming skills in languages such as Python, Java More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
warrington, cheshire, north west england, united kingdom
Suits Me
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
bolton, greater manchester, north west england, united kingdom
Suits Me
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
other stakeholders to implement robust security practices and tooling across the company. Your Impact Develop and implement security measures that protect the organization's information assets from unauthorized access or misuse. Collaborate closely with IT to harden the enterprise environment using industry best practices. Evaluate, deploy, and manage security tools for monitoring, data loss prevention, infrastructure, network, and … modern technology environment. Proven experience deploying and managing endpoint security solutions. Familiarity with public cloud platforms such as AWS, Azure, or GCP. Working knowledge of identityandaccessmanagement protocols (SAML, OAuth, SCIM). Experience with email security controls and protocols such as SPF, DKIM, and DMARC. Proficiency in scripting languages (e.g., Python, Bash … a place that thrives on diversity, equity, inclusion, and belonging. We believe in a hiring and working environment where all people are respected and valued, regardless of gender identity or expression, sexual orientation, religion, ethnicity, age, neurodiversity, disability status, citizenship, or any other aspect which makes people unique. We hire you for who you are, and we want More ❯
Senior Software Engineer – Client Identity 2 weeks ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless … of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). Implement secure authentication mechanisms such … as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive continuous improvement of engineering practices, coding standards, and deployment processes. Collaborate with Product Owners to More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
PURVIEW
Management (SIEM) tools, and respond to security incidents in a timely and effective manner. Collaborate with cross-functional teams to develop and enforce identityandaccessmanagement (IAM) policies and network access control (NAC) solutions. Stay abreast of the latest security threats, industry trends, and best practices to proactively enhance … science, Information Technology, or related field. Proven experience in network security, with a strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusion detection/prevention systems, as well as with SIEM tools More ❯