Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
and enables boundaryless opportunities that can drive your career in new and exciting ways If you’re looking for a challenging career working in a vibrant environment with access to training and a global network of experts, this could be the role for you. As part of our global team, you'll be working with cutting-edge technologies … skills: Passion for improving the UK public sector security posture Experience applying security technologies to architectures and solution designs, such as Privilege AccessManagement, SSO, IDAM, Network security and encryption Understanding of IT infrastructure, technical concepts, and design methodologies Understand threat modelling and development of reference architecture Ability to learn and adapt quickly Preferred hands on … Employment Opportunity Statement All employment decisions shall be made without regard to age, race, creed, colour, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by applicable law. Job candidates will not be obligated to disclose sealed or expunged records More ❯
and enables boundaryless opportunities that can drive your career in new and exciting ways If you’re looking for a challenging career working in a vibrant environment with access to training and a global network of experts, this could be the role for you. As part of our global team, you'll be working with cutting-edge technologies … skills: Passion for improving the UK public sector security posture Experience applying security technologies to architectures and solution designs, such as Privilege AccessManagement, SSO, IDAM, Network security and encryption Understanding of IT infrastructure, technical concepts, and design methodologies Understand threat modelling and development of reference architecture Ability to learn and adapt quickly Preferred hands on … Employment Opportunity Statement All employment decisions shall be made without regard to age, race, creed, colour, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by applicable law. Job candidates will not be obligated to disclose sealed or expunged records More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
Experience in a manufacturing or industrial environment, Operational Technologies Knowledge with security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR) Experience with SIEM solutions, endpoint security, andidentity & accessmanagement Ability to conduct risk assessments and develop mitigation strategies. Job Offer 10% on call allowance Opportunity to work as a critical security role More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
TEKsystems
dedicated Senior Cloud Operations Engineer to join our team. This role involves working with AWS technologies, focusing on Big Data, AWS Databases, AWS Architecture, Cloud Compute, Cloud Security, andIdentityandAccess Management. As a Senior Cloud Operations Engineer, you will be instrumental in building out the Clients Data Hub and the infrastructure behind it, as … as scaling their machine learning services. Responsibilities Design and implement AWS cloud architectures focusing on Big Data and databases. Ensure robust cloud security and effective identityandaccess management. Develop and maintain AWS networking and data operations for scalable solutions. Collaborate with mid-level data engineers to enhance machine learning services. Oversee the development of the … infrastructure. Essential Skills Proficiency in AWS, including Big Data, AWS Databases, and AWS Architecture. Expertise in AWS Cloud Compute and Cloud Security. Experience in AWS IdentityandAccessManagementand AWS Networking. Strong background in data operations focused engineering. Additional Skills & Qualifications Experience with AI and machine learning technologies. Data Science Core Skills andMore ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
the following operators: o HashiCorp Vault - secrets management o Red Hat Quay - internal container registry o Clair - container image vulnerability scanning o Keycloak - identityandaccessmanagement o OpenShift Service Mesh (Istio) - microservices communications Additional Skills: * Infrastructure as Code (Ansible/Terraform) * CI/CD and GitOps (eg Jenkins, ArgoCD, Tekton) * Scripting More ❯
the following operators: o HashiCorp Vault - secrets management o Red Hat Quay - internal container registry o Clair - container image vulnerability scanning o Keycloak - identityandaccessmanagement o OpenShift Service Mesh (Istio) - microservices communications Additional Skills: * Infrastructure as Code (Ansible/Terraform) * CI/CD and GitOps (e.g. Jenkins, ArgoCD, Tekton) * Scripting More ❯