and rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies … a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secretsmanagement patterns and championing designs through architecture governance forums Capable of defining secretsmanagement strategy and influencing the future direction of secretsmanagement within More ❯
e.g., AWS SageMaker, Azure ML). Security by Design: Embed security controls into every stage of the ML lifecycle (data ingestion, feature store, model training, deployment, monitoring). Implement secretsmanagement, network security (firewalls, VPCs), and identity and access management (IAM) for data and model assets. Compliance & Governance: Ensure the MLOps platform adheres to stringent financial industry … regulations (e.g., GDPR, SOX, PCI-DSS, SWIFT CSCF) and internal policies (Model Risk Management). Automate compliance evidence collection. Threat Modeling & Risk Assessment: Proactively conduct threat modeling for AI/ML systems, identifying risks related to data poisoning, model inversion, adversarial attacks, and unauthorized access to sensitive models. Tooling & Automation: Develop and maintain infrastructure-as-code (IaC) using Terraform … of cloud security principles (Zero Trust, Least Privilege), IAM, network security, and encryption (at-rest and in-transit). Practical experience with security tools for SAST, DAST, SCA, and secretsmanagement (e.g., HashiCorp Vault). MLOps & AI/ML Knowledge: Must have practical experience with MLOps tools and workflows (e.g., MLflow, Kubeflow, Seldon Core) and an understanding of More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. … Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable and developer-friendly. Cloud Security Collaboration : Work alongside infrastructure teams to ensure secure configuration of AWS and Azure environments, with a focus on IAM, network security, encryption, and observability. Architecture & Design Reviews : Provide input and recommendations to ensure new services … focus. Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secretsmanagement, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis More ❯
of our banking clients is looking for a Security Architect based in Sheffield Security Architect Sheffield - hybrid travel £550/day inside IR35 6+ months contract Strong experience in SecretsManagement, designing or implementing Workload Identity Frameworks, Federated Identity Management, PAM etc More ❯
other supporting systems it will need to integrate with as part of the end-to-end journey. Project Overview: Our client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, SecretsManagement and API Security is done across the bank. One of … the pillars of that programme is Privileged Access Management (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line … senior leadership & stakeholders. Job Responsibilities/Objectives: You will be responsible for leading the end-to-end design and delivery of secure, scalable architecture solutions within the Privileged Access Management (PAM) programme, ensuring alignment with business requirements, security principles, and architectural standards while providing technical thought leadership, managing design teams across onshore and offshore locations, and driving governance, risk More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Solution Architect- PAM Location: Hybrid-Sheffield, UK (3Days/Week Onsite) Duration: 6months+ 550GBP/Day Inside IR35 Project Overview CLIENT is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, SecretsManagement and API Security is done across the bank. One of … the pillars of that programe is Privileged Access Management (PAM). CLIENT is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to progress … required quality and standard. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
Solution Architect- PAM Location: Hybrid-Sheffield, UK (3Days/Week Onsite) Duration: 6months+ 550GBP/Day Inside IR35 Project Overview CLIENT is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, SecretsManagement and API Security is done across the bank. One of … the pillars of that programe is Privileged Access Management (PAM). CLIENT is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to progress … required quality and standard. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation programmes. Skilled … in Identity & Access Management (IAM), including secretsmanagement (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications Masters More ❯
Sheffield 3 days in the office is mandatory End Date: 30th November (renewal end of Nov) £567 Project Overview: The client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, SecretsManagement and API Security is done across the bank. One of … the pillars of that programme is Privileged Access Management (PAM). The client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to … end-to-end journey. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture and identity & access management to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful architecture for large-scale enterprise systems. … guidance. Key Skills & Expertise Cybersecurity expertise in one or more domains: Security Operations, Threat & Vulnerability, IAM, Cryptography, Infrastructure, Application, Data, or Cloud. Strong understanding of cybersecurity practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & Access Management and SecretsManagement (HashiCorp Vault preferred). Knowledge of Privileged Access … Management (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identity management . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of More ❯
Derbyshire, Burton upon Trent, Staffordshire, United Kingdom
Amtis Professional Ltd
certification: Microsoft Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secretsmanagement for containerized applications Azure Policy for Kubernetes: Implement governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid … grasp of cloud security best practices, identity and access management, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
Burton-On-Trent, Staffordshire, West Midlands, United Kingdom
Amtis Professional Ltd
certification: Microsoft Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secretsmanagement for containerized applications Azure Policy for Kubernetes: Implement governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid … grasp of cloud security best practices, identity and access management, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
impact, and recommended remediation steps: including executive summaries and technical findings. Validate remediations and conduct retesting cycles. Track and manage issues via Jira workflows and developer tickets. Advise on secretsmanagement, IAM, and secure deployment practices. Educate development and operations teams on security best practices and emerging threats. Your Profile Essential skills/knowledge/experience: Strong application More ❯
and Singer. Message Brokers, streaming data processors, such as Apache Kafka Object Storage, such as S3, MinIO, LakeFS CI/CD Pipeline, Integration, ideally Azure DevOps Python Scripting API Management Solutions Automation Key Skills Experience in the Design/Configuration/Usage in a number of the following - Low-code Platforms, such as Power Platform, Appian, UiPath, Blue Prism … IaC code tooling, including Terraform, Ansible, Harbor SCA/IAST/DAST tooling, e.g. Black Duck, Coverity, Codesight, JFrog, Snyk Automated Test tooling, ideally Selenium/Robot Framework Test Management Tooling ideally Azure Test Plans Secure SecretsManagement, ideally Azure DevOps and Hashicorp Vault More ❯
IaC code tooling , including Terraform, Ansible, Harbor SCA/IAST/DAST tooling, e.g. Black Duck, Coverity, Codesight, JFrog, Snyk Automated Test tooling , ideally Selenium/Robot Framework Test Management Tooling ideally Azure Test Plans Secure SecretsManagement, ideally Azure DevOps and Hashicorp Vault Version control with Git General Software Development Background Strong problem-solving and analytical More ❯
IaC code tooling , including Terraform, Ansible, Harbor SCA/IAST/DAST tooling, e.g. Black Duck, Coverity, Codesight, JFrog, Snyk Automated Test tooling , ideally Selenium/Robot Framework Test Management Tooling ideally Azure Test Plans Secure SecretsManagement, ideally Azure DevOps and Hashicorp Vault Version control with Git General Software Development Background Strong problem-solving and analytical More ❯
IaC code tooling, including Terraform, Ansible, Harbor SCA/IAST/DAST tooling, e.g. Black Duck, Coverity, Codesight, JFrog, Snyk Automated Test tooling, ideally Selenium/Robot Framework Test Management Tooling ideally Azure Test Plans Secure SecretsManagement, ideally Azure DevOps and Hashicorp Vault Version control with Git General Software Development Background Strong problem-solving and analytical More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nominet
. Proficiency in Java is essential, with Go, Python, or similar languages Experience with front-end frameworks (ideally Angular, React, or similar). Secure coding practices and identity/secrets management. Strong version control (Git) and testing practices (integration, automation). Problem-solving, collaboration, and growth mindset. Nice to have: Containerisation and orchestration (Docker, Kubernetes). Infrastructure as Code More ❯
infrastructure-as-code (Terraform, Helm) Understanding of security frameworks (ISO 27001, NIST, CIS Benchmarks) Bonus Points Certifications: AWS Security Specialty, CISSP, or CKS Experience with zero-trust architectures or secretsmanagement (Vault, AWS KMS) Contributions to open-source security tools or DevSecOps communities With Myn, you gain a trusted partner dedicated to helping people excel in their careersconnecting More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
observability: metrics, logs and traces using Azure Monitor/Log Analytics/Application Insights, plus Datadog/Grafana where appropriate. Embed security by design: Azure Policy, Defender for Cloud, secretsmanagement with Key Vault, SBOM and image scanning, policy-as-code and least privilege IAM. Drive reliability using SRE practices: define SLIs/SLOs, error budgets, capacity planning … and lead/coordinate incident response when required. About you Strong hands-on experience with Microsoft Azure core services (networking, compute, storage) and platform services (AKS, App Services, API Management, Event Hub/Service Bus). Proficiency with Infrastructure as Code: Terraform (essential) and/or Bicep (optional); module design, versioning and testing. Solid CI/CD background using … Azure DevOps or GitHub Actions (pipelines, environments, approvals, templates), including build and release strategies. Kubernetes experience in production (AKS): cluster operations, node pools, networking (CNI), ingress, secrets, RBAC and workload identity. Experience with GitOps, and container build pipelines (e.g., ACR, OPA policies, image scanning). Working knowledge of observability tooling (Azure Monitor, Log Analytics, Application Insights, Datadog/Grafana More ❯
Employment Type: Permanent, Part Time, Work From Home
high-quality, adaptable software solutions while reducing total cost of ownership. Manage vendor and internal resources, driving career development, engagement, and performance excellence. Partner with infrastructure, security, and application management teams to enable smooth delivery and continuous improvement. Experience & Skills: 15+ years in leading engineering teams in Corporate/Investment Banking, ideally across Risk, Finance, and Regulatory Reporting systems. … Expertise in microservices architecture, system integration, DevOps, DevSecOps, cloud (Azure), and on-premises platforms. Proven experience in Agile and Waterfall methodologies, IT controls, vendor management, and strategic value delivery. Strong leadership, strategic thinking, commercial acumen, and global stakeholder management skills. Passionate about diversity, inclusion, sustainability, and fostering a high-performing team culture. Technical Competencies: Languages: .Net, C#, Java …/Frontend: Java 21, Spring Boot 3.x, Angular 15+, React 18+, REST APIs CI/CD & DevSecOps: Jenkins, GitHub/GitLab/BitBucket, SonarQube, Prometheus, Grafana, ELK Stack Security & SecretsManagement: OAuth2/OpenID Connect, HashiCorp Vault, CyberArk This is a high-impact leadership role offering the opportunity to shape the bank's engineering capability and deliver transformational More ❯
Employment Type: Full-Time
Salary: £100,000 - £130,000 per annum, Inc benefits
Birmingham, West Midlands, England, United Kingdom
Revybe IT Recruitment Ltd
AKS), Terraform, Azure DevOps. Develop, deploy, and manage containerized applications using AKS. Ensure high availability and scalability of microservices. Implement best practices for container orchestration and monitoring. Implement automated secretsmanagement workflows. Design and maintain CI/CD pipelines using Azure DevOps. Automate testing, building, and deployment processes. Integrate with other tools and services for seamless workflows. Develop More ❯
and manage containerized applications in AKS, ensuring they’re scalable and resilient Build and maintain CI/CD pipelines using Azure DevOps, automating testing, builds, and deployments Implement secure secretsmanagement workflows and cloud security best practices Develop reusable Terraform modules to support consistent infrastructure as code Write scripts and automation tools using PowerShell, Bash, and Azure CLI More ❯