Aberdeen, Aberdeenshire, Scotland, United Kingdom Hybrid / WFH Options
AWD Online
Line Support Technician you will have experience at a technical level in the development, deployment, support and maintenance of IT infrastructure components such as servers, storage, virtualisation, desktop systems, identitymanagement, security etc. As an IT Systems Engineer/2nd Line & 3rd Line Support Technician you will be part of the team responsible for the design, development and … Configure and deploy Applications (e.g. using System Center Configuration Manger, Citrix, Intune, JAMF) and provide third line support where required VDI development and support Develop and manage the universities IdentityManagement Systems Administer, maintain and support M365 services, providing and implementing recommendations for change SAN management and development Develop and support Windows 10/11 and macOS … structured projects Third line support, troubleshooting and resolving major incidents Experience of AD and EntraID design and maintenance Server and desktop deployment including virtualisation, configuration, installation and upgrades Performance management, capacity monitoring & optimisation, security management Endpoint and Mobile Device Management e.g. Intune and JAMF Application virtualisation Systems management, preferably SCCM Desktop OS preferably Windows 10 and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
out of our Bristol office. The Lead Solution Architect will lead and be responsible for the architecting and designing large complex supply chain and logistics solutions employing commercial fleet management, supply chain management, ERP, business intelligence, web portal and integration with 3PL systems using EDI and modern integration capabilities. What will I be doing? This role will work … and into sustainment of the solution. What does Leidos need from me? Previous experience as a Solution Architect on large customer projects, government customer experience preferred. Experience architecting Inventory Management, and complex multi-stakeholder logistics/supply chain management solutions using modern commercial solutionsi.e. Manufacturing Building IT solutions in Manufacturing/Repairs systems/domain, WMS Warehouse Management System, TMS Transport Management System, IBM Sterling OMS Order Management System, ERP, ESB, Procurement, Business Intelligence, Data Warehouse, etc.), within a government customer environment Experience managing Application Architecture and/or Integration architectural development at an enterprise level including knowledge of application integration concepts and technologies e.g. SOA, ESBs, EAI, XML, Web Services, E-Commerce Solutions, Service More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
portfolio of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture and identity & access management to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful architecture for large … guidance. Key Skills & Expertise Cybersecurity expertise in one or more domains: Security Operations, Threat & Vulnerability, IAM, Cryptography, Infrastructure, Application, Data, or Cloud. Strong understanding of cybersecurity practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & Access Management and Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged Access … Management (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
and build of SAP Security and GRC solutions Contribute to the SAP security strategy aligned with enterprise security requirements Interpret business requirements for SAP GRC modules including: Access Request Management (ARM), Access Risk Analysis (ARA) & Emergency Access Management (EAM) Ensure compliance with Segregation of Duty (SoD) and Sensitive Access rules in ARA Maintain Risk and Access Controls compliance … role build Support user provisioning and access review workflows in ARM Maintain and support SAP Security and GRC modules Provide technical support for SAP technologies including Centralised User Administration, IdentityManagement (IdM), Single Sign-On, and SAP GRC Ensure audit compliance and support privacy standards in reporting Share SAP Security best practices and mentor junior team members Stay … functional roles based on design outputs Strong understanding of SAP Security fundamentals, including authorization concepts, roles/activity groups, and user administration Expertise in SAP GRC modules: Access Request Management (ARM) Access Risk Analysis (ARA) Emergency Access Management (EAM) Ability to configure Segregation of Duty (SoD) and Sensitive Access rules in ARA Experience with SAP IdentityManagementMore ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
guide projects, programmes and changes. Define, document, and embed a complete set of ISO27001 compliant Security Policies, and associated ISMS. Develop Reference Architecture and all associated architecture models for IdentityManagement and Privileged Account Management Consult on and input into the redevelopment and regular testing of the Security Incident Response Plan Inputs to the strategic planning and … heavily involved with a security maturity improvement program Skilled in reviewing and analysing security controls for their suitability Experience of drafting Security Solutions Design documentation sets Strong experience in IdentityManagement and the evaluation of access models (inc. SSO, MFA, RBAC, ABAC, eIDV etc) Strong knowledge of and the ability to put into practice global Information Security Standards More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
and build of SAP Security and GRC solutions Contribute to the SAP security strategy aligned with enterprise security requirements Interpret business requirements for SAP GRC modules including: Access Request Management (ARM), Access Risk Analysis (ARA) & Emergency Access Management (EAM) Ensure compliance with Segregation of Duty (SoD) and Sensitive Access rules in ARA Maintain Risk and Access Controls compliance … role build Support user provisioning and access review workflows in ARM Maintain and support SAP Security and GRC modules Provide technical support for SAP technologies including Centralised User Administration, IdentityManagement (IdM), Single Sign-On, and SAP GRC Ensure audit compliance and support privacy standards in reporting Share SAP Security best practices and mentor junior team members Stay … functional roles based on design outputs Strong understanding of SAP Security fundamentals, including authorization concepts, roles/activity groups, and user administration Expertise in SAP GRC modules: Access Request Management (ARM) Access Risk Analysis (ARA) Emergency Access Management (EAM) Ability to configure Segregation of Duty (SoD) and Sensitive Access rules in ARA Experience with SAP IdentityManagementMore ❯
Pattern: Permanent Full Time Flexible First options available The Role The Head of Cyber Security (Transmission) will lead the team delivering the day-to-day cyber security strategy, risk management and cyber operations for the Transmission business unit covering both IT and OT security. They will drive and manage compliance with the NIS Regulatory requirements and will provide specialist … the liaison point to maximise leveraging skills and services from the teams that provide Group wide cyber security services. You Will Drive and champion the cyber security strategy, risk management and NIS regulatory compliance for the Transmission Business Unit while collaborating across the Group's cyber security community and leveraging Group wide cyber security services. Lead the engagement of … responsibility for key aspects of the Programme. Overseeing cyber security operations and control position for Transmission systems and assets working with system and service owners including network security, vulnerability management, identitymanagement and detection and response. Perform business unit testing to identify control issues and work with owners to drive control improvement. Work with peer Heads of More ❯
Pattern: Permanent Full Time Flexible First options available The Role The Head of Cyber Security (Transmission) will lead the team delivering the day-to-day cyber security strategy, risk management and cyber operations for the Transmission business unit covering both IT and OT security. They will drive and manage compliance with the NIS Regulatory requirements and will provide specialist … the liaison point to maximise leveraging skills and services from the teams that provide Group wide cyber security services. You Will Drive and champion the cyber security strategy, risk management and NIS regulatory compliance for the Transmission Business Unit while collaborating across the Group's cyber security community and leveraging Group wide cyber security services. Lead the engagement of … responsibility for key aspects of the Programme. Overseeing cyber security operations and control position for Transmission systems and assets working with system and service owners including network security, vulnerability management, identitymanagement and detection and response. Perform business unit testing to identify control issues and work with owners to drive control improvement. Work with peer Heads of More ❯
Pattern: Permanent Full Time Flexible First options available The Role The Head of Cyber Security (Transmission) will lead the team delivering the day-to-day cyber security strategy, risk management and cyber operations for the Transmission business unit covering both IT and OT security. They will drive and manage compliance with the NIS Regulatory requirements and will provide specialist … the liaison point to maximise leveraging skills and services from the teams that provide Group wide cyber security services. You Will Drive and champion the cyber security strategy, risk management and NIS regulatory compliance for the Transmission Business Unit while collaborating across the Group's cyber security community and leveraging Group wide cyber security services. Lead the engagement of … responsibility for key aspects of the Programme. Overseeing cyber security operations and control position for Transmission systems and assets working with system and service owners including network security, vulnerability management, identitymanagement and detection and response. Perform business unit testing to identify control issues and work with owners to drive control improvement. Work with peer Heads of More ❯
Pattern: Permanent Full Time Flexible First options available The Role The Head of Cyber Security (Transmission) will lead the team delivering the day-to-day cyber security strategy, risk management and cyber operations for the Transmission business unit covering both IT and OT security. They will drive and manage compliance with the NIS Regulatory requirements and will provide specialist … the liaison point to maximise leveraging skills and services from the teams that provide Group wide cyber security services. You Will Drive and champion the cyber security strategy, risk management and NIS regulatory compliance for the Transmission Business Unit while collaborating across the Group's cyber security community and leveraging Group wide cyber security services. Lead the engagement of … responsibility for key aspects of the Programme. Overseeing cyber security operations and control position for Transmission systems and assets working with system and service owners including network security, vulnerability management, identitymanagement and detection and response. Perform business unit testing to identify control issues and work with owners to drive control improvement. Work with peer Heads of More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
controls, and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identitymanagement, cloud security, network defence, vulnerability management, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers … and delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable … Committed to continuous improvement and professional development. Can-do attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
controls, and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identitymanagement, cloud security, network defence, vulnerability management, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers … and delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable … Committed to continuous improvement and professional development. “Can-do” attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
Identity and Access Management Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of application. Accenture is a leading global … which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identity and access governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG solutions with business … Design workflows for user provisioning, de-provisioning, access requests, approvals, and certifications. Collaborate with software development teams to integrate IAG solutions with existing IT infrastructure and applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identity and access management and recommend mitigation strategies. More ❯
who are delivering digital transformation to the MoD. They are seeking an experienced Solution Architect or Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. Key Duties and … Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality … delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems." Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business and security requirements. Collaborate with stakeholders across security, networking, infrastructure, and application teams to ensure integration and operational More ❯
who are delivering digital transformation to the MoD. They are seeking an experienced Solution Architect or Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. Key Duties and … Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality … delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems." Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business and security requirements. Collaborate with stakeholders across security, networking, infrastructure, and application teams to ensure integration and operational More ❯
on site North West Wiltshire ( 5 days per week) Looking for a DV Cleared Solution/Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. This position requires … and technical execution, working closely with engineering teams to ensure successful delivery and ongoing support. Key Duties and Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles … for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems. Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business More ❯
will involve the following: * Endpoint monitoring and analysis. * Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert … knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing * Knowledge of Cloud computing, computer network defence, identitymanagement, incident management and network security. * Significant experience within a SOC environment. * Incident response experience * Qualification/Certification in Cyber Security Desirable * IT Qualifications/Certifications such More ❯
seeking an experienced Security Tester to join an established testing team working on large scale, secure systems within the public sector. The role focuses on manual security testing, vulnerability management, and cyber resilience, supporting ongoing work around identity and access management and data protection. This is a hands on position where you will identify risks, validate security … in developing the team's cyber testing capability Technical Skills and Experience Essential Strong background in manual testing of systems and APIs Practical experience with security testing and vulnerability management Scripting skills in Python or JavaScript Familiarity with tools such as Jira, Confluence, Jenkins and Splunk Understanding of Azure security risks, particularly relating to storage and data protection Experience … twelve months validity remaining Ideal Candidate This position is suited to a hands on Security Tester or Quality Assurance Engineer with strong manual testing experience, solid understanding of vulnerability management and cyber resilience, and recent exposure to Azure and identitymanagement security. The successful candidate will be proactive, detail focused and capable of working effectively within a More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Exalto Consulting ltd
seeking an experienced Security Tester to join an established testing team working on large scale, secure systems within the public sector. The role focuses on manual security testing, vulnerability management, and cyber resilience, supporting ongoing work around identity and access management and data protection. This is a hands on position where you will identify risks, validate security … in developing the team's cyber testing capability Technical Skills and Experience Essential Strong background in manual testing of systems and APIs Practical experience with security testing and vulnerability management Scripting skills in Python or JavaScript Familiarity with tools such as Jira, Confluence, Jenkins and Splunk Understanding of Azure security risks, particularly relating to storage and data protection Experience … twelve months validity remaining Ideal Candidate This position is suited to a hands on Security Tester or Quality Assurance Engineer with strong manual testing experience, solid understanding of vulnerability management and cyber resilience, and recent exposure to Azure and identitymanagement security. The successful candidate will be proactive, detail focused and capable of working effectively within a More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Onyx-Conseil
hands-on expertise as a Solutions Architect. The key purpose for the position is to manage the applications and technology in the company. This includes Integrating products Managing Data IdentityManagement systems and software Enhancing existing applications. Must have an excellent understanding of networks and infrastructure. Must have excellent knowledge of the Azure environment and Office 365. This … phases of the software development lifecycle. Additional responsibilities include ensuring IT Infrastructure and application design are secure, reliable, and regularly reviewed. This role will also develop and enhance relationship management with key service partners, independent contractors, vendors, and suppliers. Key Responsibilities/Tasks: Lead the architectural design, and delivery towards consolidation of O365 amongst operating companies globally. Lead the … projects to ensure governance processes are aligned. Maintain and up to date solution architect ure diagrams/workflows and documentation for all key IT programmes. Provide timely reports to management and stakeholders on projects progress, and risks to delivery including non-compliance issues. Collaborate with the director of IT, ensuring IT security policies & practices are adhered to within all More ❯
london, south east england, united kingdom Hybrid / WFH Options
Experis
as Code (IaC) – Terraform, ARM Templates, or Bicep. Hands-on experience with DevOps practices and tools such as GitHub Actions, Azure DevOps, or Jenkins. Knowledge of networking, security, and identitymanagement in Azure. Experience with PowerShell, Python, or Bash scripting . Strong troubleshooting and problem-solving skills. Excellent communication skills and ability to work in a collaborative, Agile More ❯