JavaScript. Test-Driven Development: Strong commitment to quality, utilizing TDD methodologies to ensure code reliability and maintainability. Security Practices: Knowledgeable in cybersecurity practices, including OAuth, OpenID Connect, and secure coding practices. Advanced Database Knowledge: Proficient in SQL and data modelling. SOLID Principles: Proficient in applying SOLID principles for object-oriented More ❯
event-driven systems. Experience with cloud platforms (AWS, Azure, or GCP) and containerization tools (Docker, Kubernetes). Knowledge of authentication and authorization mechanisms (e.g., OAuth, JWT). Understanding of SaaS architecture and experience building scalable, secure applications. Strong communication skills to effectively collaborate with cross-functional teams. Preferred Qualifications: Experience More ❯
london (city of london), south east england, united kingdom
Verityv Ecosystems
event-driven systems. Experience with cloud platforms (AWS, Azure, or GCP) and containerization tools (Docker, Kubernetes). Knowledge of authentication and authorization mechanisms (e.g., OAuth, JWT). Understanding of SaaS architecture and experience building scalable, secure applications. Strong communication skills to effectively collaborate with cross-functional teams. Preferred Qualifications: Experience More ❯
event-driven systems. Experience with cloud platforms (AWS, Azure, or GCP) and containerization tools (Docker, Kubernetes). Knowledge of authentication and authorization mechanisms (e.g., OAuth, JWT). Understanding of SaaS architecture and experience building scalable, secure applications. Strong communication skills to effectively collaborate with cross-functional teams. Preferred Qualifications: Experience More ❯
Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related More ❯
and containerization (Docker, Kubernetes). Experience with unit and integration testing frameworks (e.g., xUnit, NUnit, MSTest). Experience with authentication and security best practices (OAuth, JWT, etc.). Experience with event-driven architectures and message queues (Azure Service Bus, RabbitMQ, etc.). Degree in Computer Science, IT, or a related More ❯
and containerization (Docker, Kubernetes). Experience with unit and integration testing frameworks (e.g., xUnit, NUnit, MSTest). Experience with authentication and security best practices (OAuth, JWT, etc.). Experience with event-driven architectures and message queues (Azure Service Bus, RabbitMQ, etc.). Degree in Computer Science, IT, or a related More ❯
and infrastructure-as-code (Terraform, CloudFormation) Background in real-time systems or IoT architectures Useful Understanding of network protocols and security best-practices (TLS, OAuth) Prior exposure to robotics telemetry or control-plane integrations About Engineered Arts Engineered Arts is the leading manufacturer of full-size humanoid robots used for More ❯
a regulated environment. Ideally, you’ll also have Some knowledge of the UK energy market (desirable, not essential). Familiarity with RESTful APIs and OAuth/OpenID Connect. Exposure to Docker and/or Kubernetes. Experience with at least one programming language such as Python, Go, or JavaScript. Awareness of More ❯
message brokers such as RabbitMQ Expertise in relational databases, ORM and PL/SQL Experience with microservice architectures Public cloud platforms (e.g. Azure) IAM, OAuth 2.0, etc. Research has shown that women are less likely than men to apply for this role if they do not have solid experience in More ❯
authentication, data modeling, and design artifacts. Proficiency in Java 8+, Spring Boot, RDBMS (Oracle, Postgres), microservices, Kubernetes, and cloud functions. Understanding of authentication protocols, OAuth, MTLS, and certificates. Qualifications: 10-12 years of IAM implementation experience. Strong communication skills and customer-facing experience. CISSP certification is a bonus. Willingness to More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Basingstoke, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯