Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … environment. Strong understanding of both IT and OT systems and infrastructure. Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Run-Time Group Ltd
Landing Zones Core responsibilities of an Azure Infrastructure or Cloud Engineer especially in designing, deploying, and managing cloud infrastructure. Intune/AVD (Azure Virtual Desktop) experience in endpoint management … and virtual desktop infrastructure , common in cloud ops or endpoint management roles. Azure ENTRA/PIM (Privileged IdentityManagement) identityandaccessmanagement knowledge, fitting for someone managing enterprise cloud environments. Roles/Groups (including built-in) Related to RBAC (Role-Based Access Control) and security More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
X4 Technology
programme, advising IT on remediation strategies. Oversee security incident monitoring and response in coordination with the SOC team. Design and implement an effective identityandaccessmanagement (IAM) process and own access control across all systems. Required Skills & Experience Strong technical hands-on experience with Microsoft Security solutions, including Defender … and threat detection. Demonstrable background in implementing and running vulnerability management programmes, with experience using industry-standard tooling. Experience designing, deploying, and managing IdentityandAccessManagement (IAM) systems and processes. Strong understanding of risk management principles and experience building KPI, KRI, and risk-based security metrics. Ability to bridge More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
consultative selling. In the security industry, we develop high-quality solutions that are offered both on-premises and as SaaS solutions. Our products focus on IdentityandAccessManagement processes, with the goal of simplifying configuration andmanagement for our customers. End users appreciate our solutions for creating a secure and trusted … element of the role, you must be able to confidently deliver training sessions to engineers of varying levels of expertise; Develop and grow your own knowledge about our access control solutions by testing new functionalities, integrations and providing input for their documentation; Participate in and/or leads complex projects together with business partnersfrom the perspective of the … sales processes; including being part of a presentation/pitch team and delivering compelling product demonstrations; Advise and provide product or selling information to external stakeholders up to management level; Develop strong relationships with end-users and business partners to continuously improve collaboration; Assist and participate in events. Your team In the role of Technical Support & pre-Sales More ❯
Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity managementand planning in place for the security services and solutions assigned to you and ensure that the … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
and fully aligned with the evolving needs of our research teams and scientists driving global pathogen research. Key Responsibilities: Manage our object data storage, ensuring efficient design, tiering, andaccess controls. Build and manage our research compute environment for running bioinformatics pipelines and interactive analytics. Ensure the data platform meets disaster recovery standards. Ensure cloud resources are managed … and follow through on opportunities for improvement. Essential Knowledge, Skills and Experience: Strong hands-on experience with cloud infrastructure, ideally Oracle Cloud and its portfolio, including provisioning, configuration, andmanagement of services. Ability to automate everything using Terraform and appropriate toolchains. In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes. Solid understanding of cloud … security best practices, including identityandaccessmanagement (IAM), network security, and encryption. Experience with Git or other version control systems. Desirable Knowledge, Skills and Experience: Certifications in Oracle Cloud (OCI) or other cloud platforms (AWS, GCP). Experience with Jira, Confluence, or similar project management tools. Knowledge of compliance frameworks andMore ❯
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … with cloud environments (AWS, Azure, and/or GCP) and common SaaS applications (e.g. Office 365, Okta, Salesforce, Proofpoint) SOC experience or experience doing event investigations Proven project management success Proven core competency in multiple qualifications noted above Working knowledge of Google SecOps a plus Working knowledge of LogStash a plus Cyderes i s an Equal Opportunity Employer More ❯
Amersham, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Anson Mccade
or multi-entity environments . Strong expertise in Microsoft 365 (Exchange, SharePoint, Intune, Entra ID, Security & Compliance). In-depth knowledge of Azure infrastructure , including identityandaccessmanagement (Azure AD, Azure AD Connect, MFA, Conditional Access). Solid background in managing and supporting on-premises infrastructure . Proficient in PowerShell scripting More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
IT Talent Solutions Ltd
environment. Strong knowledge of Azure IaaS and PaaS services, including Functions, App Services, Azure SQL, Key Vault, and API Management. Deep understanding of cloud security, identityandaccessmanagement (Azure AD), and governance (Azure Policy, Blueprints). Familiarity with microservices, event-driven architectures, and container technologies (Docker, AKS). Ability to translate complex technical More ❯
Employment Type: Full-Time
Salary: £50,000 - £70,000 per annum, Negotiable, Inc benefits
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … security/operational network architecture design Must have proficient knowledge and experience with SIEM technologies Strong troubleshooting, reasoning and problem-solving skills Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN etc. Excellent communications skills Exceptional Time Managementand organizational skills Ability to conduct forensic analytical studies and investigations effectively and efficiently Knowledge of More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯