enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile-specific use cases such as performance, caching, and offline access. • Own end-to-end technical More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
e.g., multiple domains, hybrid environments, B2B/B2C). In-depth understanding of Conditional Access, including policy design, implementation, and troubleshooting. Strong knowledge of MFA, SSO, OAuth, SAML, and OpenID Connect. Experience with Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Purview is a plus. Familiarity with PowerShell scripting for automation and reporting. For more information, please apply More ❯
CISSP, OSCP, GWAPT, CEH or CSSLP are a plus. Experience with Infrastructure-as-Code security (Terraform, CloudFormation is desirable. Knowledge of API security best practices and standards (OAuth, JWT, OpenID) is desirable. Familiarity with DevSecOps principles and security automation in CI/CD pipelines is desirable. More ❯
mix of modern and legacy tech is key Data Handling JSON serialization/deserialization DTOs and model binding Security API authentication and authorization best practices Knowledge of OAuth2, JWT, OpenIDConnect Secure coding practices for exposed endpoints Integration & Communication Consuming third-party APIs (REST/SOAP) Async/await, tasks, and non-blocking design Database Integration Hands-on with More ❯
practices. Proven capability in architecting and deploying Google Kubernetes Engine (GKE) clusters, including service mesh, autoscaling, workload identity, and observability. Solid understanding of GCP security, identity federation (SAML/OIDC), RBAC, Zero Trust networking, and VPC Service Controls. Experience leading cloud migration projects, including DNS, traffic switching, disaster recovery, and designing secure VPC networks with hybrid connectivity. Ideally have experience More ❯
Experience The ideal candidate will have experience with: Endpoint lifecycle: Device imaging, MDM-protocol enforcement Identity & access: LDAP/Kerberos administration, federation with SAML 2.0/OAuth 2.0/OIDC Network & Wi-Fi: Configure VLANs, monitoring, management Firewall & security: Policy management Automation & DevOps: Any scripting or Infrastructure as Code experience is a plus We do not expect you to be More ❯