Permanent Identity Access Management Jobs in Belfast

2 of 2 Permanent Identity Access Management Jobs in Belfast

Product Security Engineer

Belfast, United Kingdom
Smarsh, Inc
engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in application security … from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code & Architecture Review … GitHub Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & access management (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect for Network and Cloud

Belfast, Northern Ireland, United Kingdom
VANRATH
operation and configuration of the Firm's cloud security toolsets, including the management of CNAPP (Cloud-Native Application Protection Platform) and CASB (Cloud Access Security Broker) technologies. *No Sponsorship will be offered for this role. Key Responsibilities: · Cloud Security Architecture: Design and implement cloud-native security … and troubleshooting network security, including security groups, network ACLs, and load balancers in cloud environments. · IAM Solutions: Solid understanding of Identity and Access Management (IAM) solutions, with experience in Microsoft Entra ID being highly desirable. · Risk Assessment: Strong application and network security risk assessment More ❯
Posted: