ideal candidate will have extensive hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN, and … Virtual Desktop Infrastructure (VDI) is a plus. Your key responsibilities will include: 1. Microsoft Security & IdentityManagement Design and implement Zero Trust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device … management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across Microsoft Azure environments. 3. Security Automation & Incident Response Automate security More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Infrastructure Security Engineer - Microsoft Entra (Identity & Access) Hybrid role, 2-3 days in the office in Handforth, 1-2 days WFH Type: 12 months Contract Reports into Infrastructure Manager Overview: We are seeking a skilled Infrastructure Engineer with a strong focus on Microsoft Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play … a critical role in architecting, deploying, and maintaining secure identity and access solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure AD), Entra Permissions Management, Verified ID, and Conditional Access. Configure and maintain identity synchronization (e.g., Azure AD … Connect, Entra Connect) and federation services (e.g., AD FS, Entra ID Federation). Develop and enforce identity governance policies, including role-based access control (RBAC), just-in-time access, and lifecycle management. Manage multi-factor authentication (MFA), self-service password reset (SSPR), and secure hybrid access configurations. Implement Conditional Access policies and Microsoft Defender for Identity integrations to More ❯
Cybersecurity Specialist Location: UK - Sheffield (Hybrid) BA Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analysing IAM logs and evaluating risk. On the cloud … understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identitymanagement—SSO protocols (SAML, OAuth/… RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged IdentityManagement) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and More ❯
Location: Sheffield (3day/week onsite) Duration: 06+ Months Banking Client Experience Required Job Description -Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analyzing … understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should be familiar with SaaS identitymanagement—SSO protocols (SAML, OAuth/… RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged IdentityManagement) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and More ❯
Duration: 28/11/2025 Rate: 406GBP/Day(Inside IR35) Role Description: BA - Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analysing … understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identitymanagement—SSO protocols (SAML, OAuth/… Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. o Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged IdentityManagement) best practices for just-in-time elevation. 3. GCP IAM o Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account More ❯
Ellesmere Port, England, United Kingdom Hybrid / WFH Options
Lorien
to ensure the stability, efficiency and continuous improvement of the core IT Services, whilst collaborating with internal teams to deliver reliable and scalable solutions. Experience: Supporting and Deploying M365 (identitymanagement, Teams, Exchange online, SharePoint online and OneDrive). Experienced in 3rd line support with MS Windows Server 2008-2022 Active Directory Hyper-V Azure Strong problem solving More ❯
Engineers and senior stakeholders to gather and validate requirements and define end to end solutions. Develop and maintain process flows. Support System integration, user adoption and training related to Identity Management. Required Skills/Experience The ideal candidate will have the following: Strong IAM/IGA domain expertise Knowledge of governance, controls, and compliance Requirements gathering & process mapping System More ❯
EBS in line with Solution Design. You will also be driving discussion with Client and Business Users on Solution Design. Key responsibilities: Experience in architecting e-commerce platforms, inventory management, and order fulfillment, Marketing, Loyalty. Define technology roadmaps, ensuring alignment with business objectives and scalability requirements. Evaluate and select appropriate technology stacks, cloud services, and third-party integrations. Possess … IBM e - commerce/Ocado ecommerce is plus Good experience in working with DevOps teams to enhance CI/CD pipelines and ensure smooth deployments. Define best practices for identitymanagement, authentication etc. Your Profile Key Skills/Knowledge/Experience Good experience with solutioning and designing. Strong understanding of marketing automation, CRM, and data analysis Knowledge of … SQL, data modelling, and data warehousing. Excellent communication, technical documentation, and project management skills. Togaf certified Certification in cloud specific solution architect Familiarity with cloud-based integrations (e.g., AWS, Azure) Experience with Agile project management methodologies Rewards & Benefits TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Thales Group
Location: Cheadle, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … your lifestyle and helps you reach your ambitions. THALES has an exciting opportunity for a Service Delivery Manager to be responsible on the end to end service delivery, SLA management and customer services/relationships for the DIS Operated Managed Services Portfolio. Location: Cheadle What can we offer you? On offer is a competitive salary and benefits package, which … Assistance Program and access to mental wellbeing app Employee discount shopping schemes on major brands and retailers Gym membership discounts What will you deliver? Effective service delivery, customer SLA management, expert knowledge and practical implementation of the ITIL V3 framework. Contractual knowledge of Service Level Agreement, OLA, CSF, KPIs and Service Credit structures for specific customer services. Monitoring and More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Henderson Scott
in designing and implementing secure systems at scale Experience of working in the public sector/government would be preferred Certified Information Systems Security Professional (CISSP) qualification Excellent stakeholder management and communication skills A clear understanding of modern security principles, risks, and mitigations Ability to balance business needs with technical security requirements Experience influencing architectural decisions and driving secure … by-design approaches Solid experience with cloud platforms, especially AWS Familiarity with databases like MongoDB and PostgreSQL Understanding of encryption, identitymanagement, and secure data handling If you're passionate about embedding Security into every layer of technology and want to make a real impact for public services, we'd love to hear from you. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
in secure design reviews, threat modeling experience, code reviews, pen-testing Minimum of 3 years of technical experience with any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security. Minimum 2 years experience with Software Development Life Cycle in one or more languages ( Go, Python, Nodejs … a person's merit and qualifications. We are committed to providing equal employment opportunity regardless of sex, age, race, color, national origin, religion, marital status, pregnancy, sexual orientation, gender identity, disability, citizenship, veteran or military status, and other legally protected characteristics. Wewill keep your application on file so that we can consider you for future vacancies and you can More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
What you'll Need to Succeed: Strong foundations in software engineering. Minimum of 7 years of technical experience with any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security. Minimum 2 years experience with Software Development Life Cycle in one or more languages (Rust, Python, Go … a person's merit and qualifications. We are committed to providing equal employment opportunity regardless of sex, age, race, color, national origin, religion, marital status, pregnancy, sexual orientation, gender identity, disability, citizenship, veteran or military status, and other legally protected characteristics. Wewill keep your application on file so that we can consider you for future vacancies and you can More ❯
IT Cloud Engineer, you will have: Hands-on experience with Microsoft Azure. An understanding virtual networks, VPNs, firewalls, and load balancers. Experience implementing security measures like encryption, firewalls, and identity management. Knowledge of CI/CD pipelines, containerisation, and Infrastructure as Code (IaC) tools. Experience developing and delivering cloud-based solutions. Knowledge across multiple cloud technologies, with the ability More ❯
we do. To be successful in this role you should have: Strong hands-on IAM engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identitymanagement, authentication, authorization and identity federation. Expertise with single sign on, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM … implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in partnering with security, product, engineering and compliance teams, to embed identity-first principles into the DevSecOps lifecycle You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business … will train, guide and coach less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for More ❯
IT Security Specialist IT Security Specialist - EDR/XDR (SentinelOne), CyberArk Identity Security and Access Management, Specops Authentication and Password Security, Email Security, DLP, SIEM (Splunk) - Hybrid (Warrington) - to £60k + excellent bonus + bens An IT Security Specialist is urgently required to play a key role in the strategic design and development of my clients security control … cyber-attack surface of my clients operations environment. IT Security Specialist Role and Responsibilities: - Manage and design the full Cyber security infrastructure with significant focus on EDR/XDR, Identity Security (CyberArk) and Authentication/Password Security (Specops) - Perform analysis and monitoring of IT and Cyber Security services - Monitor and improve SIEM capability across the estate (Splunk) - Play a … key role in developing and supporting the IdentityManagement, Email Security and DLP technologies - Provide a robust technical support service on IT Security incidents IT Security Specialist Skills and Experience: - Substantial experience in an IT security role - Demonstrable expertise in EDR/XDR technologies (SentinelOne) - Detailed experience with identity platforms (Okta, CyberArk) and SIEM logging and monitoring More ❯