on your extensive Apple expertise, you will deliver advanced 3rd line support, contribute to solution design, and mentor junior Mac Engineers. You will also help shape endpoint architecture, support ZeroTrust Security adoption, and ensure the timely resolution of business-critical issues. In this role, you will: Provide expert 3rd line and escalation support for macOS environments. Mentor … JAMF (legacy). Contribute to project delivery and support the EUC technology roadmap. Drive service improvements, automation, and process optimisation. Ensure secure, compliant, and user-centred support aligned to ZeroTrust principles. This is a high-impact contract role where your expertise will make an immediate difference in delivering resilient and secure services across government and enterprise environments. … multi-disciplinary teams. Strong knowledge of Apple Business Manager, ADE, VPP, and device lifecycle management. Proficiency in Bash scripting and automation for secure, auditable environments. Background in endpoint security, ZeroTrust, access control, and vulnerability management. Demonstrable experience in large-scale projects such as hardware refreshes, migrations, or UEM deployments. Current SC clearance required. Desirable skills: API integration More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯