Acadian Asset Management LLC is a Boston-headquartered investment management firm with wholly owned affiliates located in Singapore, London, and Sydney. As of March 31, 2025, the firm managed approximately US$122 billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to … and consistently governing our AWS Platform-as-a-Service (PaaS) infrastructure. We are looking for candidates with deep experience and understanding of continuous delivery, container security, SAST/DAST, secretsmanagement, Identity and Access Management (IAM) governance, privilege management, encryption and key management, threat detection, logging, cloud infrastructure security and policy-as-code.What You'll … Utilizing tools like AWS Config, Security Hub, Inspector, Guardduty, and Crowdstrike Falcon, assess monitor and prioritize remediation of Cloud security vulnerabilities. Develop and maintain tools to detect and remove secrets from code check-ins. Establish development best practices for working with code libraries such as docker, pypi and others, ensuring that libraries are only obtained from trusted sources, e.g. More ❯
with technical and business teams to address security flaws and implement remediation plans. • Oversee application security tasks, ensuring alignment with audit requirements and internal policies. • Support change and incident management processes, with a focus on high-priority incidents (P1 & P2). • Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance. … functions, including audit preparation and policy development. • Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics. Required Key Skills (Functional/Technical) Application Security & Vulnerability Management • Familiarity with Common Vulnerability Scoring System (CVSS) • Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM) • Track and assist in … of network security principles and firewall configurations • Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory • Experience with CyberArk PAM for privileged access management Security Information and Event Management (SIEM) • Use of Splunk SIEM for real-time threat detection and log analysis • Review and optimise SIEM use cases to enhance threat detection More ❯
support secure, reliable, and efficient access to compute resources in an on-premise datacenter environment. You will work closely with engineers and researchers to implement solutions around deployment, configuration management, and system security. Essential functions Implement and maintain infrastructure-as-code using tools like Terraform and Ansible Develop and manage secure access and identity controls, particularly using AWS IAM … and related services Support deployment of internal services with HTTPS, secretsmanagement, and authentication tooling Contribute to the configuration and monitoring of HPC systems and related services Design and support centralized log collection and syslog forwarding for the compute cluster Collaborate with software and infrastructure teams to ensure reliable compute access for researchers Qualifications Strong understanding of infrastructure … automation tools such as Terraform and Ansible Experience working with AWS, including VPCs, EC2, IAM, and related services Familiarity with secure service deployment practices including TLS/HTTPS and secretsmanagement (e.g., Vault) Experience with centralized logging (e.g., syslog, journald, log forwarders, ELK, or Loki/Promtail) Comfort working in Linux environments and automating common administrative tasks Knowledge More ❯
ensure high availability, security, and performance Managing service observability and reliability, including logging, metrics and alerting (we use Prometheus and Grafana) Handling database and service upgrades (e.g. MySQL, Kubernetes), secretsmanagement and security best practices Taking ownership of platform-level concerns such as deployment pipelines, configuration management, and cost awareness Helping drive pragmatic AI utilisation across our … including deploying to production Strong fundamentals of Java or Kotlin development practices A good grasp of principles behind building reliable and scalable systems, including redundancy, time complexity, and memory management Hands-on experience with cloud infrastructure and container orchestration, ideally with Kubernetes on GCP, and a strong understanding of platform reliability, cost awareness, and secure configuration Solid understanding of … security best practices across infrastructure and applications, including secretsmanagement and credential rotation. Familiarity with infrastructure-as-code or automation tools is a plus Experience with observability tools (such as Prometheus and Grafana), service monitoring, and debugging in production environments A demonstrated interest in staying up-to-date with new technology, new frameworks, new languages and other developments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
and continuous delivery (CI/CD) tools across varied technology stacks. Experience with infrastructure monitoring for availability, performance, and/or security. Understanding of infrastructure security principles, including vulnerability management, secretsmanagement, network security, and supply chain security. (Desirable) Experience with automated testing, performance testing, and stress testing tools. Organisation: Initial 12-month contract Fully remote role More ❯
and discoverability. Build end-to-end monitoring and observability for your pipelines: owning data quality, latency, completeness, and lineage at every stage. Champion secure, governed data practices : access controls, secretsmanagement, encrypted data-in-transit/at-rest, and compliance with frameworks like GDPR. Collaborate closely with AI, Platform, and Product teams , provisioning data sets, feature tables, and … code at scale. Modern Data Pipelines: Experience with batch and streaming frameworks (e.g., Apache Spark, Flink, Kafka Streams, Beam), including orchestration via Airflow, Prefect or Dagster. Data Modeling & Schema Management: Demonstrated expertise in designing, evolving, and documenting schemas (OLAP/OLTP, dimensional, star/snowflake, CDC), data contracts, and data cataloguing. API & Integration Fluency: Building data ingestion from REST … warehouse paradigms. Observability & Quality: Deep familiarity with metrics, logging, tracing, and data quality tools (e.g., Great Expectations, Monte Carlo, custom validation/test suites). Security & Governance: Data encryption, secretsmanagement, RBAC/ABAC, and compliance awareness (GDPR, CCPA). CI/CD for Data Systems: Comfort with automation, infrastructure as code (Terraform), version control, and release workflows. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Become
of Excellence team Strong scripting skills (e.g., Bash, Python) and automation mindset Excellent communication and collaboration skills Desirable Attributes Exposure to service mesh technologies (e.g., Istio, Linkerd) Experience with secretsmanagement and security tooling (e.g., Vault, Snyk) Familiarity with compliance frameworks (e.g., ISO 27001, PCI-DSS) Prior consulting experience or experience in client-facing roles Engagement Model Outside More ❯
OpenShift), CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secretsmanagement tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/ More ❯
OpenShift), CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secretsmanagement tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/ More ❯
it, which means we have a lot of work ahead of us. What you'll work on Initial projects: Blue/green deployment implementation - Set up zero-downtime releases Secretsmanagement consolidation - We're split between AWS Secrets Manager and Pulumi secrets; need to audit and consolidate Sentry configuration audit - Upgrade our error monitoring to improve More ❯
services that matter Preferred Tech Stack Expertise Cloud Infrastructure: AWS (EKS, RDS, Aurora, ElastiCache, Kafka, IAM) Secure Hosting: Experience working with air-gapped or government-secure environments Container & Cluster Management: Docker, Kubernetes, Rancher, Jenkins, Helm Monitoring & Observability: Prometheus, Grafana, ELK Stack, Dynatrace Secrets & Identity Management: HashiCorp Vault, Keycloak CI/CD & DevOps Tooling: Jenkins, Git, ServiceNow, Trivy … all services are compliant with security standards and support the change and release governance model. Build and maintain infrastructure components like event streaming (Kafka), databases (Aurora, RDS, Redis), identity management (Keycloak), and caching layers. Enhance and maintain CI/CD tooling and self-service developer pipelines for tenant teams. Proactively manage and resolve tech debt by working with central … roadmap, collaborating with internal/external platform and infrastructure teams to support scalable and resilient services. Support critical national infrastructure tasks including platform deployments, incident/problem/change management, and continual service improvement (ITIL-aligned). Use and integrate ServiceNow (or its successor) to track and manage changes, incidents, requests, and problem records. Support replication services, match engines More ❯
services that matter Preferred Tech Stack Expertise Cloud Infrastructure: AWS (EKS, RDS, Aurora, ElastiCache, Kafka, IAM) Secure Hosting: Experience working with air-gapped or government-secure environments Container & Cluster Management: Docker, Kubernetes, Rancher, Jenkins, Helm Monitoring & Observability: Prometheus, Grafana, ELK Stack, Dynatrace Secrets & Identity Management: HashiCorp Vault, Keycloak CI/CD & DevOps Tooling: Jenkins, Git, ServiceNow, Trivy … all services are compliant with security standards and support the change and release governance model. Build and maintain infrastructure components like event streaming (Kafka), databases (Aurora, RDS, Redis), identity management (Keycloak), and caching layers. Enhance and maintain CI/CD tooling and self-service developer pipelines for tenant teams. Proactively manage and resolve tech debt by working with central … roadmap, collaborating with internal/external platform and infrastructure teams to support scalable and resilient services. Support critical national infrastructure tasks including platform deployments, incident/problem/change management, and continual service improvement (ITIL-aligned). Use and integrate ServiceNow (or its successor) to track and manage changes, incidents, requests, and problem records. Support replication services, match engines More ❯
CSF, OWASP SAMM), and compliance frameworks (SOC 2, ISO 27001, GDPR). Secure SDLC & DevSecOps - Build and maintain guardrails for static/dynamic analysis, container and IaC scanning, SBOM management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, network … segmentation, KMS, secretsmanagement, WAF, EDR, and zero-trust patterns. Identity & Access Management (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML), and privileged-access workflows. Monitoring, Detection & Response - Define audit logging, metrics, and telemetry requirements; integrate with SIEM/SOAR to deliver actionable alerts and playbooks for engineering-led incident … software teams, especially for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred, but not essential Certifications such as CISSP, CSSLP, AWS Certified Security. More ❯
cloud infrastructure across Cloud (Azure, AWS) and on-prem environments. Implement and maintain Infrastructure as Code (e.g. Terraform, Azure ARM/Bicep, AWS CloudFormation, and Ansible). Automate configuration management and routine tasks (e.g. Python, Bash). CI/CD & GitOps Maintain and optimize infrastructure, Pipeline-as-Code and shared libraries (e.g. Teamcity, Jenkins). Implement AI deployments and … Helm, ingress controllers, and service meshes to manage complex deployments. Security & Compliance Integrate security tools such as Snyk, Trivy, OWASP ZAP, and SonarQube into CI/CD pipelines. Manage secrets using HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault. Operate cloud-native security services like Azure Defender, AWS GuardDuty, Security Hub, Inspector, and Config. Monitoring & Observability Build More ❯
rock-solid. This is a hands-on role where you will solve complex operational problems and build the foundation for our next stage of growth. Key Responsibilities Platform & Infrastructure Management Own, manage, and evolve our AWS cloud infrastructure, ensuring it is scalable, cost-effective, and secure. Lead the architecture and hands-on implementation of our infrastructure using Terraform, maintaining … across the board, playing a critical role in our journey towards SOC2 compliance. Implement and manage security controls related to IAM, network security (VPCs, security groups), vulnerability scanning, and secrets management. Skills, Knowledge and Expertise Experience: Extensive hands-on experience in a DevOps, SRE, or Platform Engineering role, managing production systems in a cloud environment. Deep expertise with AWS … EKS, RDS, Lambda, EC2, S3, IAM, VPC). Proven, expert-level proficiency with Terraform for managing complex infrastructure as code. Extensive experience managing production workloads on Kubernetes, including cluster management, scaling, and security. Demonstrated ability to design, build, and significantly improve CI/CD pipelines, with specific experience in GitHub Actions. A strong track record of building out and More ❯
a full stack engineer and proficient in at least two backend languages i.e. Python, Node.js, Go - Familiar with frontend frameworks i.e. React, Angular, Vue.js - Strong knowledge of security scanning, secretsmanagement, IAM policies, and compliance frameworks (ISO27001, SOC 2, CIS Benchmarks). - Proven ability to lead technical initiatives, mentor others, and collaborate with distributed teams. Experience Requirements Deep More ❯
a Cloud native environment and automation Experience designing, implementing and managing security capabilities at scale 5+ years AWS, 3+ years IAC (Terraform) and automation (Python) experience (WAF, IAC, SCPs, SecretsManagement, Kubernetes) 5-8 years of experience within Cloud Security Experience working within SaaS companies Experience with incident handling and on-call What's in it for you More ❯
can make complex simple If you want to build the cloud backbone of tomorrow's AI products, get in touch for more info. Keywords - EC2, S3, RDS, Lambda, Bedrock, Secrets Manager, CloudFront Elastic Kubernetes Service (EKS), AWS Glue, Simple Notification Service (SNS), CloudWatch AWS Solutions Architect - AI Startup Oscar Associates (UK) Limited is acting as an Employment Agency in More ❯
be working on We are recruiting for a Head of Security Architecture & Engineering to join our team. In this role, you will be responsible for the leadership and operational management of the Security Architecture and Engineering team at Ki, actively collaborating with Ki's Technology & Product teams to devise and execute strategic initiatives that drive a 'secure, private and … value, and ensure a robustly secure platform and product are in place in light of emerging threats and regulatory requirements. You'll be an expert in Identity and Access Management, including privileged user controls and secretsmanagement, with a good understanding of security topics in Azure, GCP, serverless, container platforms, and Infrastructure as Code environments, within a More ❯
security-first culture across the company. Key Responsibilities Security Architecture & Design Design and implement secure infrastructure across cloud, web, and distributed application environments. Provide architectural guidance for cryptographic key management, signing workflows, and secure APIs. Evaluate and enhance security of components related to digital asset management, identity systems, or transaction flows. Risk Management & Threat Modelling Conduct comprehensive … Build and optimise detection mechanisms and playbooks for novel attack vectors, including abuse prevention and fraud detection. Governance, Compliance & Best Practices Help define internal standards for security development practices, secretsmanagement, and infrastructure hardening. Maintain compliance with relevant frameworks (e.g., SOC 2, ISO 27001, GDPR), and support any industry-specific due diligence. Cross-Functional Collaboration Partner with engineering More ❯
lifecycle (SDLC) practices. Advise and offer guidance on: * Design, implement, and maintaining secure CI/CD pipelines.* Integrate security tools and practices into DevOps workflows (e.g., SAST, DAST, SCA, secretsmanagement).* Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices.* Advise on threat modeling, risk assessments, and vulnerability management.* Provide More ❯
of our stack, eg Go, Typescript, react Terraform or other Infrastructure as Code tooling Exposure to Kafka, event driven architectures, or message queues Familiarity with HashiCorp Vault or other secretsmanagement tooling Knowledge of CI/CD pipelines Experience in a start-up or scale-up environment You don't need to have done all of these things More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital venturesand business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the client … requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identity and access management (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable … data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and AI/ML workloads. Leverage automation frameworks and IaC to More ❯