cyber capabilities to support delivery of a key cybersecurity programme focused on securing and modernising the application estate. This role will play a vital part in helping the Identityand Authentication team drive change across hundreds of applications, ensuring alignment with modern security practices, including Microsoft Entra ID and SailPoint, Microsoft Sentinel, Privileged AccessManagement … to: Engage with stakeholders across the airline to gather, refine and prioritise business and technical requirements. Own and manage the project backlog in JIRA, working closely with the Identityand Authentication Lead and product stakeholders. Conduct workshops with application owners and technical teams to extract key information and drive decision-making. Translate business requirements into technical stories suitable … knowledge of JIRA and backlog management. Excellent stakeholder engagement skills with the ability to communicate at all levels. Experience working on cybersecurity projects – particularly around IdentityandAccessManagement (IAM), PAM or Security Monitoring. Ability to translate non-technical input into structured technical requirements. Comfortable running workshops and engaging stakeholders in high-pressure environments. More ❯
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
warrington, cheshire, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
bolton, greater manchester, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
warrington, cheshire, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
bolton, greater manchester, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, andidentitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation … developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust IdentityandAccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identityandaccess controls. More ❯
warrington, cheshire, north west england, united kingdom
Anson McCade
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, andidentitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation … developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust IdentityandAccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identityandaccess controls. More ❯
bolton, greater manchester, north west england, united kingdom
Anson McCade
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, andidentitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation … developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust IdentityandAccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identityandaccess controls. More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … Front End technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … front-end technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
security strategy. Role Description Develop, implement, and maintain cutting-edge security solutions to protect sensitive systems and data. Act as a subject matter expert on security engineering, encryption, andaccess management. Conduct regular audits, identify vulnerabilities, and drive remediation initiatives across infrastructure and applications. Collaborate with cross-functional teams to ensure cryptographic and IAM solutions align with business … in Identity & AccessManagement (IAM) and cryptographic technologies. Skilled in conducting risk assessments, vulnerability analysis, and developing secure protocols. Excellent communication and stakeholder management skills, with the ability to influence decision-making. Desired Skills Advanced knowledge of internal controls, governance, and audit frameworks. Experience leading or mentoring teams, particularly within a complex More ❯
bolton, greater manchester, north west england, united kingdom
McGregor Boyall
security strategy. Role Description Develop, implement, and maintain cutting-edge security solutions to protect sensitive systems and data. Act as a subject matter expert on security engineering, encryption, andaccess management. Conduct regular audits, identify vulnerabilities, and drive remediation initiatives across infrastructure and applications. Collaborate with cross-functional teams to ensure cryptographic and IAM solutions align with business … in Identity & AccessManagement (IAM) and cryptographic technologies. Skilled in conducting risk assessments, vulnerability analysis, and developing secure protocols. Excellent communication and stakeholder management skills, with the ability to influence decision-making. Desired Skills Advanced knowledge of internal controls, governance, and audit frameworks. Experience leading or mentoring teams, particularly within a complex More ❯
warrington, cheshire, north west england, united kingdom
McGregor Boyall
security strategy. Role Description Develop, implement, and maintain cutting-edge security solutions to protect sensitive systems and data. Act as a subject matter expert on security engineering, encryption, andaccess management. Conduct regular audits, identify vulnerabilities, and drive remediation initiatives across infrastructure and applications. Collaborate with cross-functional teams to ensure cryptographic and IAM solutions align with business … in Identity & AccessManagement (IAM) and cryptographic technologies. Skilled in conducting risk assessments, vulnerability analysis, and developing secure protocols. Excellent communication and stakeholder management skills, with the ability to influence decision-making. Desired Skills Advanced knowledge of internal controls, governance, and audit frameworks. Experience leading or mentoring teams, particularly within a complex More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
premise hosted infrastructure that supports our end user devices and applications. You will be responsible for maintaining the integrity, security, and availability of domain services, ensuring seamless connectivity andaccess for all users to deliver a secure workspace, calling on your strong knowledge of Active Directory, DNS, Group Policy, and related technologies. Demonstratable experience of VDI, EDR, and … Thin Client management is also essential. You will work closely with cross-functional teams to ensure that the tailored solutions are delivered in line with the needs of the business, proactively recommending new working practices and adhering to current best practices. This role offers the opportunity to work with the latest technologies, contribute to digital transformation initiatives, and … for the product and its users to meet performance targets and KPIs. Within your first 6 months you will: Work as a team to enable identityandaccessmanagement services Define process and identify tooling that will help the team to deliver future capability repeatedly and reliably What are BAE Systems looking for from More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
suite of business-critical applications, including but not limited to: Atlassian suite (Jira, Confluence) Developer and product tools such as TeamCity, Bitbucket, Stoplight, Cucumber Studio, WebDMS, FEC, Document Management Systems CRM & ERP tools like HubSpot and SAGE Google Workspace (Admin Console) and other SaaS platforms Analyse existing application usage and workflows to identify inefficiencies, recommend improvements, and implement … assess needs, propose solutions, and improve workflows. Maintain accurate IT documentation, configuration records, and knowledge base articles for supported applications. Manage onboarding and offboarding processes related to application accessand user provisioning. Support local tech teams with day to day support on an ad-hoc basis Provide input into the deployment of customer-facing IT requirements aligned to … to work independently onsite while collaborating effectively with global teams. Desirable (but not essential) ITIL Foundations Certification Experience supporting Mac and Windows environments Familiarity with identityandaccessmanagement, SSO, and federation technologies Experience with scripting or automation tools (e.g., PowerShell, Python, Google Apps Script) Industry certifications (e.g., CompTIA A+, Google Workspace, Microsoft) What More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
Palo Alto, Juniper, Cisco, Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise in these areas, who are looking to take More ❯