cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
DEBRA International
Understanding of charity sector KPIs (fundraising metrics, retail performance, supporter engagement). Support company-wide Power BI deployments. Experience with Role-BasedSecurity in Power BI - for managing access at an enterprise level. Demonstrable experience in advanced Power BI development, data modelling More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
both on-prem and Azure AD. Oversee the support of accesscontrol policies, user lifecycle management, and Role-BasedAccessControl (RBAC). Drive automation of AD processes (e.g., onboarding, offboarding, and permissions management). Implement and ensure compliance with More ❯