Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Run-Time Group Ltd
Landing Zones Core responsibilities of an Azure Infrastructure or Cloud Engineer especially in designing, deploying, and managing cloud infrastructure. Intune/AVD (Azure Virtual Desktop) experience in endpoint management … and virtual desktop infrastructure , common in cloud ops or endpoint management roles. Azure ENTRA/PIM (Privileged IdentityManagement) identityandaccessmanagement knowledge, fitting for someone managing enterprise cloud environments. Roles/Groups (including built-in) Related to RBAC (Role-Based Access Control) and security More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Description Allica's security team plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with various teams, such as Engineering … mitigation on potential intrusions in real-time, collaborating with cross functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities aimed at gaining unauthorized access … security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
effective controls, and ensuring adherence to security policies. Drive the selection and integration of security technologies and services within cloud ecosystems (AWS, Azure, GCP preferred). Risk & Compliance Management: Lead threat modeling, risk assessments, and security posture management across cloud environments. Ensure architectural designs meet stringent regulatory compliance requirements relevant to the financial industry in Europe … domain security, including understanding of common threats, European regulatory requirements (e.g., PSD2, DORA, EBA guidelines), and data privacy mandates (GDPR). Extensive knowledge of security architecture principles for: Identity & AccessManagement (IAM) in cloud (e.g., AWS IAM, Azure AD, GCP IAM). Network Security (VPCs, firewalls, WAFs, micro-segmentation, private connectivity). Data Security … transit, KMS, data classification, DLP). Application Security (secure coding, API security, SAST/DAST, WAF integration). Container Security (Kubernetes, Docker, service mesh). Security Information and Event Management (SIEM) and logging strategies. Zero Trust Architecture principles. Proven experience with DevSecOps methodologies and securing CI/CD pipelines. Strong understanding of security frameworks such as NIST CSF More ❯
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications. Lead efforts to onboard legacy applications to the SailPoint IdentityIQ platform, through calibration with Application Owners and … specific applications, ensuring full compliance with internal and regulatory IAM requirements. Design and build robust data collation and transformation workflows to facilitate the accurate and timely upload of Identityand Entitlement data for offline applications into IAM systems. Provide ongoing technical expertise and guidance on IAM best practices, processes, and principles, supporting both the IAM team and wider … global standards, sharing knowledge and best practices to drive consistency across regions. EDUCATION, TRAINING AND EXPERIENCE Mandatory Minimum of 3 years' hands-on experience in IdentityandAccessManagement (IAM), with a strong understanding of IAM principles and best practices. Proven experience assessing application maturity against IAM control requirements, identifying gaps, and recommending remediation More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Experis
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications. Lead efforts to onboard legacy applications to the SailPoint IdentityIQ platform, through calibration with Application Owners and … specific applications, ensuring full compliance with internal and regulatory IAM requirements. Design and build robust data collation and transformation workflows to facilitate the accurate and timely upload of Identityand Entitlement data for offline applications into IAM systems. Provide ongoing technical expertise and guidance on IAM best practices, processes, and principles, supporting both the IAM team and wider … global standards, sharing knowledge and best practices to drive consistency across regions. EDUCATION, TRAINING AND EXPERIENCE Mandatory Minimum of 3 years' hands-on experience in IdentityandAccessManagement (IAM), with a strong understanding of IAM principles and best practices. Proven experience assessing application maturity against IAM control requirements, identifying gaps, and recommending remediation More ❯
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications. Lead efforts to onboard legacy applications to the SailPoint IdentityIQ platform, through calibration with Application Owners and … specific applications, ensuring full compliance with internal and regulatory IAM requirements. Design and build robust data collation and transformation workflows to facilitate the accurate and timely upload of Identityand Entitlement data for offline applications into IAM systems. Provide ongoing technical expertise and guidance on IAM best practices, processes, and principles, supporting both the IAM team and wider … global standards, sharing knowledge and best practices to drive consistency across regions. EDUCATION, TRAINING AND EXPERIENCE Mandatory Minimum of 3 years' hands-on experience in IdentityandAccessManagement (IAM), with a strong understanding of IAM principles and best practices. Proven experience assessing application maturity against IAM control requirements, identifying gaps, and recommending remediation More ❯
related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
dofrom infrastructure to application design. Key Responsibilities Design and implement security controls across cloud platforms (AWS, Azure, or GCP) Develop and maintain security tooling for threat detection, vulnerability management, and incident response Lead threat modelling and risk assessments for critical systems and services Collaborate with engineering teams to integrate security best practices into CI/CD pipelines Monitor … controls and documentation What Were Looking For Proven experience as a security engineer with a strong background in cloud security (AWS, Azure, or GCP) Solid understanding of networking, identity & accessmanagement, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, and security scanners Familiarity with DevSecOps practices and modern CI More ❯
Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity managementand planning in place for the security services and solutions assigned to you and ensure that the … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
and fully aligned with the evolving needs of our research teams and scientists driving global pathogen research. Key Responsibilities: Manage our object data storage, ensuring efficient design, tiering, andaccess controls. Build and manage our research compute environment for running bioinformatics pipelines and interactive analytics. Ensure the data platform meets disaster recovery standards. Ensure cloud resources are managed … and follow through on opportunities for improvement. Essential Knowledge, Skills and Experience: Strong hands-on experience with cloud infrastructure, ideally Oracle Cloud and its portfolio, including provisioning, configuration, andmanagement of services. Ability to automate everything using Terraform and appropriate toolchains. In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes. Solid understanding of cloud … security best practices, including identityandaccessmanagement (IAM), network security, and encryption. Experience with Git or other version control systems. Desirable Knowledge, Skills and Experience: Certifications in Oracle Cloud (OCI) or other cloud platforms (AWS, GCP). Experience with Jira, Confluence, or similar project management tools. Knowledge of compliance frameworks andMore ❯
regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identityandaccessmanagement, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of assigned controls, documenting results clearly and raising issues where appropriate Ensure timely delivery of assigned control … of quality and accuracy. Strong understanding of Cyber Security Domains including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
IT Talent Solutions Ltd
environment. Strong knowledge of Azure IaaS and PaaS services, including Functions, App Services, Azure SQL, Key Vault, and API Management. Deep understanding of cloud security, identityandaccessmanagement (Azure AD), and governance (Azure Policy, Blueprints). Familiarity with microservices, event-driven architectures, and container technologies (Docker, AKS). Ability to translate complex technical More ❯
Employment Type: Full-Time
Salary: £50,000 - £70,000 per annum, Negotiable, Inc benefits
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … security/operational network architecture design Must have proficient knowledge and experience with SIEM technologies Strong troubleshooting, reasoning and problem-solving skills Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN etc. Excellent communications skills Exceptional Time Managementand organizational skills Ability to conduct forensic analytical studies and investigations effectively and efficiently Knowledge of More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications click apply for full job details More ❯