slough, south east england, united kingdom Hybrid / WFH Options
Sanderson Government & Defence
tools (ELK, Nagios, DataDog, Splunk, New Relic) Experience with Atlassian Toolset (Jira, Confluence, etc.) Understanding of databases and query languages Awareness of identity and access management technologies (ADFS, OIDC, OAuth2, Keycloak, Red Hat SSO) Security Clearance Requirements Due to the nature of the work, candidates must be eligible for national security clearance . To meet this requirement, applicants must: Be More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Futuria
driven architectures, asynchronous processing, and tools like Celery or Kafka Familiarity with CI/CD pipelines, Docker, and DevOps workflows Experience designing or integrating authentication and authorisation systems (e.g., OAuth2, JWT) Success Metrics Deploy secure, scalable, and maintainable full-stack systems and LLM applications that deliver measurable business value Maintain low latency, high system uptime, and strong performance across APIs More ❯
Apache Airflow). Proven backend development skills using Node.js, Python, Java, or similar. Strong understanding of API design and integration techniques (REST, Webhooks, GraphQL). Familiarity with authentication protocols (OAuth2, JWT). Experience with ETL/ELT frameworks and data pipeline tools. Solid understanding of relational and NoSQL databases. Hands-on experience with AWS cloud services and integration tools. Strong More ❯
integration middleware platforms. Strong knowledge of Oracle ERP Cloud, HCM, or SCM modules and their APIs. Hands-on experience with REST/SOAP web services, JSON/XML, OAuth2.0, and related security protocols. Experience designing and implementing event-driven and microservices-based architectures. Familiarity with DevOps practices, CI/CD pipelines, and cloud-native architectures. Excellent communication and More ❯
/Hive/Spark), data lakehouse architectures, mesh topologies, and real-time streaming platforms Strong Unix/Linux skills, database connectivity (JDBC/ODBC), authentication systems (LDAP, Active Directory, OAuth2), and data integration methodologies Experience implementing privacy-by-design principles, data governance frameworks, and interoperability standards with proven stakeholder engagement abilities Desirable: Data certifications, Python/Java development, infrastructure automation More ❯
adapters, mappings). Familiarity with SAP BTP, Cloud Connector, and API Management. Experience with integration protocols: IDoc, SOAP, REST, OData, SFTP, JDBC. Knowledge of authentication and security standards (OAuth2.0, TLS, certificates). Experience with automated testing tools (e.g., INT4 Shield) is a strong advantage. Ability to troubleshoot integration issues and optimise performance. Excellent communication and documentation skills. Azure More ❯
adapters, mappings). Familiarity with SAP BTP, Cloud Connector, and API Management. Experience with integration protocols: IDoc, SOAP, REST, OData, SFTP, JDBC. Knowledge of authentication and security standards (OAuth2.0, TLS, certificates). Experience with automated testing tools (e.g., INT4 Shield) is a strong advantage. Ability to troubleshoot integration issues and optimise performance. Excellent communication and documentation skills. Azure More ❯
understanding of data warehousing concepts, dimensional modelling and medallion architecture. Building production-grade pipelines with logging, alerting, retries, idempotency, and robust error handling. Experience with REST APIs, pagination, authentication (OAuth2, service principals), and file-based ingestion (CSV/Parquet). More ❯
understanding of data warehousing concepts, dimensional modelling and medallion architecture. Building production-grade pipelines with logging, alerting, retries, idempotency, and robust error handling. Experience with REST APIs, pagination, authentication (OAuth2, service principals), and file-based ingestion (CSV/Parquet). More ❯
/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices More ❯
IDAM Architect - Permanent - Hybrid We are working with a leading data science company that is undergoing a major digital and identity transformation. They are seeking an Enterprise Identity Architect to design and deliver next-generation identity solutions across a hybrid More ❯