Although not essential, the following skills are desired by the client: Understanding of authentication protocols (SAML, OAuth, etc.) Familiarity with regulatory frameworks (SOX, GDPR, HIPAA) Knowledge of directory services (LDAP, Active Directory) Business analysis certification (CBAP, PMI-PBA) Experience with JIRA, Confluence, ServiceNow Exposure to cloud IAM (AWS, Azure AD) If you are interested in this opportunity, please apply now More ❯
with Palo Alto firewall administration and enterprise network security design. High proficiency in working with Juniper network hardware and software. Expert-level understanding of VPN configurations, authentication protocols (RADIUS, LDAP, Active Directory), and wireless network technologies. Working knowledge of server operating systems, including both Linux and Windows Server platforms. Proven experience with scripting and automation using tools such as PowerShell More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
the implementation, operation and maintenance of SIEM products Understanding of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus) Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of security infrastructure in Public and Private cloud, e.g. virtual network infrastructure, hybrid IaaS/PaaS/SaaS solutions Communication and Soft Skills Excellent verbal and written More ❯
Redhill, Surrey, United Kingdom Hybrid / WFH Options
Citysprint UK Ltd
of JavaScript (Node.JS) and/or Go. Experience with Azure Resource Manager Template. Experience of securely managing SSL Certificates lifecycles (automation, renewal, bindings etc). Experience of authentication technologies (LDAP, EntraID, Azure B2C etc). A willingness to learn and contribute to the team. Strong communication, planning and troubleshooting skills with a strong sense of ownership. Knowledge of network routing More ❯
of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical More ❯
of IT Security standard methodologies Understanding of the OSI Reference Model and network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S Experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat hunting activities Strong analytical More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST More ❯
understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverse engineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
Our Cyber team look after some complicated and compelling areas within Aero, Defence and Security. If you want to lead from the front, gain experience working with multiple clients, and always have access to the latest technologies, then join the More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Manchester Digital
NoSQL, e.g., RDS, DynamoDB, Athena, Cassandra - Experience with virtualisation platforms such as VMWare, Hyper V - Storage and Data availability systems, e.g., HP Nimble, NetApp. - Networking and Domain Communication, e.g., LDAP, DNS , VPN, Firewalls. - Configuration Management, e.g., Ansible, Puppet. - Thorough understanding of Infrastructure as Code principles and related tech such as Terraform or CloudFormation - Enhanced experience of AWS cloud technologies, e.g. More ❯
Strong coding skills with expert-level proficiency in at least one of the following languages - Java (preferred), Golang, C++, Python or Rust Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) #J-18808-Ljbffr More ❯
Stranraer, Wigtownshire, United Kingdom Hybrid / WFH Options
Sky UK Limited
security standards, and regulatory compliance. Develop custom scripts and processes to extend the functionality of One Identity Manager. Configure and maintain connectors for identity sources such as Active Directory, LDAP, and HR systems. Perform IAM solution testing, troubleshooting, and issue resolution. Be responsible for the development lifecycle, testing and deployment of your code, ensuring change compliance is maintained throughout. Proactively … Bring Solid understanding of Identity Governance and Administration platforms (preferably One Identity) with extensive demonstrable recent experience in the field. Strong understanding of IAM concepts and protocols such as LDAP, SAML, OAuth, and OpenID Connect. Expertise in cross platform scripting (TSQL, Powershell, bash etc ) On premise and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert More ❯
shadow IT monitoring Cloud computing Infrastructure (e.g. AWS/Azure) Nice to have Hands on experience with the following: Directory Services and protocols such as Active Directory, Azure AD, LDAP, iDP (identity providers) Email authentication (SPF, DKIM, DMARC) Networking and protocols such as DNS, LDAP, HTTP Experience with security standards and frameworks such as ISO, MITRE and/or NIST More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
network storage solutions such as NetApp, Lustre, Weka, LakeFS, etc. Experience in networking technologies and services such as load balancing, DNS, packet tracing and debugging, etc. Deep understanding of LDAP implementations such as Oracle Unified Directory (OUD), OpenLDAP, Microsoft Active Directory, Entra ID and Kerberos authentication. Hands-on experience in automated infrastructure provisioning using tools such as Terraform, Pulumi, Ansible More ❯
Cambourne, Cambridgeshire, United Kingdom Hybrid / WFH Options
Remotestar
OneDrive (ODFB), Sharegate, Metalogix. Hyper-V cluster design, workload migration, DNS, DHCP, KMS, WINS, IPAM, RADIUS. Tool experience: AppZero , Factfinder , ChangeBase , DoubleTake , Ctera , Ricoh , etc. Business apps integration using LDAP , SSO , etc. PowerShell scripting for automation of migrations and configuration. Identity, Security, and Compliance Skills: Strong grasp of Authentication , Authorisation , AD Replication , GPOs , AD LDS , ADAM . DR planning for More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. System Integration: Integrate ISIM with third-party identity providers, enterprise applications, databases, and LDAP directories. Security Best Practices: Enforce IAM security best practices, ensuring that solutions comply with relevant industry standards and regulations (e.g., GDPR, HIPAA). Troubleshooting & Optimisation: Identify and resolve IAM-related … to the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate More ❯
up to date with advancements in technology Identify Continual Improvement opportunities The Requirements Active Directory experience: Group Policy, Forests, Domains, Domain Controller Roles, DNS, Permission Models, Delegation, Trust relationships, LDAP and Kerberos DHCP Internet Information Services Microsoft Windows Server (2016, 2019 & 2022) - including server core Windows 10 Desirable PKI, N-cypher and Certificate Management Microsoft Endpoint Configuration Manager (MECM) for More ❯
up to date with advancements in technology Identify Continual Improvement opportunities The Requirements Active Directory experience: Group Policy, Forests, Domains, Domain Controller Roles, DNS, Permission Models, Delegation, Trust relationships, LDAP and Kerberos DHCP Internet Information Services Microsoft Windows Server (2016, 2019 & 2022) - including server core Windows 10 Desirable PKI, N-cypher and Certificate Management Microsoft Endpoint Configuration Manager (MECM) for More ❯
Security standard methodologies. * Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. * Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. * Hands on experience with IDS/IPS technologies and threat hunting activities. * Strong More ❯
Systems, and Applications. Proficient in IT Security best practices. Strong understanding of the OSI Reference Model and network communication protocols (DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S). Experienced with Security Information Event Monitoring Tools and Network Packet Capture tools. Hands-on experience with IDS/IPS technologies and threat hunting. Strong analytical skills and More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
Strong working knowledge of networking, packet tracing, understanding latency and throughput in order to pinpoint or resolve application issues. Thorough knowledge of HTTP(S), SMTP, TLS/SSL, DNS, LDAP, Kubernetes and Docker containers Experience of system/application administration in a distributed, customer-facing, high-availability and large-scale environments Experienced and confident in at least one scripting language More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
Are you in a Security Operations Centre and every day is the same? We can assure you that there is no boredom in our role. We have a growing Cyber practice in our Defence sector and support enterprise scale clients. More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯
Security standard methodologies. Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools. Hands on experience with IDS/IPS technologies and threat hunting activities. Strong More ❯