Uxbridge, Middlesex, United Kingdom Hybrid / WFH Options
Sky
the following areas: Linux System Administration (Ubuntu) Monitoring (Prometheus/Nagios/Icinga). Cloud Platforms - deploying and automation (AWS/GCP) Networking (LB/Routing/Switching) Databases - (SQL/NoSQL). Cassandra knowledge would be great to have Scripting/System-Programming - (Python/Bash/Go/Java) Configuration management - (Ansible/Terraform) CI/CD (Jenkins More ❯
driven. Therefore, we will provide you with access to the following additional courses to ensure you are suitably employable as a data analyst. Microsoft excel - to expert level. Learn SQL - the programming language used for extracting data from more complex databases. Learn Python 3 - Python 3 is a simple to use programming language used by many analysts. Learn Tableau - Tableu More ❯
driven. Therefore, we will provide you with access to the following additional courses to ensure you are suitably employable as a data analyst. Microsoft excel - to expert level. Learn SQL - the programming language used for extracting data from more complex databases. Learn Python 3 - Python 3 is a simple to use programming language used by many analysts. Learn Tableau - Tableu More ❯
growth. Ensure data accuracy, availability, security, and compliance. Partner with leadership to shape the company's tech and data strategy. Experience: Proven experience in data engineering, analytics, and reporting (SQL, Google BigQuery, Power BI, Looker, Tableau). Strong capability with API integrations and low/no-code tools (n8n, Zapier, Airtable, Make). Broad technical problem-solving skills, able to More ❯
Uxbridge, Middlesex, United Kingdom Hybrid / WFH Options
Sky
experience with One Identity Manager and other Identity Governance tools, with strong knowledge of IAM protocols (LDAP, SAML, OAuth, OpenID Connect). Proficiency in cross-platform scripting (e.g., T-SQL, PowerShell, Bash) and integration with on-premise/cloud directory services (Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. More ❯