Architect and deploy Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions to secure internet-bound and internal application traffic. Integrate Zscaler Services : Work with enterprise infrastructure like identity providers, SIEM platforms, firewalls, and endpoint security tools to implement a zero-trust framework. Manage Zscaler Configurations : Maintain configurations, including policy setup, app connectors, authentication profiles, and access control … SSO) : Maintain SSO for Enterprise Applications, integrating with protocols like SAML, OAuth, and OpenID Connect for seamless and secure user access. Implement Azure PrivilegedIdentityManagement (PIM) : Control and monitor just-in-time (JIT) privileged access, approval workflows, and time-bound assignments for critical roles. Manage Identity Governance : Design and manage Access Packages and entitlement … issues Proficiency with Microsoft Entra ID (formerly Azure AD ) Experience configuring and maintaining Single Sign-On (SSO) for Enterprise Applications Familiarity with Azure PrivilegedIdentityManagement (PIM) Experience in managing Identity Governance Ability to create and enforce Conditional Access Policies and Multi-Factor Authentication (MFA) Desirable Skills/Knowledge/Experience : Contribute to company-wide initiatives More ❯
Platform Support Operations Engineer | London | Hybrid 3 days | Permanent Role Overview: Manage and support Azure cloud platform operations with a focus on Infrastructure as Code, network operations, and identitymanagement whilst ensuring platform reliability, security, and performance across Azure environments. Key Characteristics: Azure Platform Operations - Extensive hands-on experience managing and supporting Azure environments including Virtual Machines, Azure … Storage (Blob, Files, Disks), Azure SQL Database, App Services, Azure Functions, and container services (ACI, AKS). Proficient in Azure Monitor, Log Analytics, Application Insights, cost management and optimisation, resource tagging strategies, and maintaining platform availability through proactive monitoring and incident response. Infrastructure as Code (Terraform) - Strong working knowledge of Terraform for provisioning and managing Azure infrastructure including writing … CATO, Zscaler or Palo Alto integrated with Azure. Identity & Access Management - Expert knowledge of Microsoft Entra ID (Azure AD), Azure RBAC, PrivilegedIdentityManagement (PIM), managed identities, service principals, and Azure AD Connect for hybrid scenarios. Experience managing user provisioning/deprovisioning, conditional access policies, multi-factor authentication, Azure AD Application Proxy, federated authentication, SAML More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure Bring Your Own Device (BYOD) and other device More ❯
XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure Bring Your Own Device (BYOD) and other device More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain PrivilegedIdentityManagement (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure Bring Your Own Device (BYOD) and other device More ❯
Folkestone, Kent, South East, United Kingdom Hybrid / WFH Options
Saga Group
external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerability management activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to technology infrastructure … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privilegedidentitymanagement (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing and managing More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Saga Group
external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerability management activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to technology infrastructure … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privilegedidentitymanagement (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing and managing More ❯
external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerability management activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to technology infrastructure … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privilegedidentitymanagement (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing and managing More ❯
external stakeholders. Provide technical support to incidents raised by the business and ensure these are resolved within target resolution times. Research and apply the required security remediation and vulnerability management activities when required and within expected timescales. The Ideal Candidate We are keen to speak with Tech Engineers from large organisations or MSPs who have exposure to technology infrastructure … in a customer facing organisations. Candidates will need to demonstrate these key skills and meet the criteria below: Microsoft 365 administration - strong knowledge of Intune, Exchange Online, including license management, security and compliance configuration and general product administration within the Microsoft 365 Admin Center. Microsoft Entra - strong knowledge of Entra ID (Azure Active Directory) architecture, configuration and management. Experience … and support - advanced troubleshooting of authentication, access and service issues across M365 and Entra. Candidates will ideally have; Knowledge and understanding of RBAC, privilegedidentitymanagement (PIM) and Just-In-Time access. Experience with monitoring and reporting tools. Experience of maintaining and administering SharePoint Online, Teams and OneDrive. Microsoft 365 security and compliance knowledge - implementing and managing More ❯