Luton, England, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Luton, south east england, united kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
Luton, south west england, united kingdom Hybrid / WFH Options
Advanced Resource Managers
with infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerabilitymanagement Your skillset may include: Proven experience as a Security Architect supporting major infrastructure transformation … with cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation, communication, and stakeholder engagement More ❯
and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency … in scripting (e.g., Bash, Python) for secure automation. Familiarity with vulnerabilitymanagement tools such as OpenSCAP and Nessus. Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what we More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
and intrusion detection. Knowledge of networking fundamentals, especially from a security perspective. Experience working in highly governed environments with tight SLAs. Skilled in patch management and system update procedures. It would be great if you had: Experience with secure environments and familiarity with JSP 440 and SCIDA requirements. Proficiency … in scripting (e.g., Bash, Python) for secure automation. Familiarity with vulnerabilitymanagement tools such as OpenSCAP and Nessus. Exposure to Red Hat deployment tools and secure system state management. If you are interested in this role but not sure if your skills and experience are exactly what were More ❯
Technical Skills: Solid grasp on Linux OS fundamentals, solve problems and performance tuning Good understanding of HPC infrastructure and applications Exposure to HPC workload management tools like IBM Spectrum LSF Strong scripting skills (Bash, Shell, Python, Perl, etc.) Experience with cloud technologies in AWS and/or Google Cloud … understanding and experience in infrastructure and application monitoring and alerting tools Good understanding about remote display and interactive technologies like ETX Solid skills with VulnerabilityManagement and security patching of constantly evolving environment Skills and attitude on automating common repetitive tasks Relevant experience in a distributed team Working More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
and SD-WAN. Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP). Experience with security information and event management (SIEM), threat intelligence, and vulnerability management. Excellent communication and documentation skills, with the ability to influence and educate stakeholders. Relevant certifications strongly preferred More ❯
with infrastructure, network, cloud, and application teams to embed security by design in the migration process. Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management. Review and Lead Security Tooling modernisation i.e. leveraging Microsoft native capabilities Provide guidance on the … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.). Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration. Experience with security governance, risk, and compliance in regulated environments. Strong documentation, communication, and stakeholder engagement More ❯
with infrastructure, network, cloud, and application teams to embed security by design in the migration process. Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management. Review and Lead Security Tooling modernisation i.e. leveraging Microsoft native capabilities Provide guidance on the … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.). Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration. Experience with security governance, risk, and compliance in regulated environments. Strong documentation, communication, and stakeholder engagement More ❯
with infrastructure, network, cloud, and application teams to embed security by design in the migration process. Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management. Review and Lead Security Tooling modernisation i.e. leveraging Microsoft native capabilities Provide guidance on the … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.). Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration. Experience with security governance, risk, and compliance in regulated environments. Strong documentation, communication, and stakeholder engagement More ❯
with infrastructure, network, cloud, and application teams to embed security by design in the migration process. Oversee security tool integration, including identity and access management, logging/monitoring (SIEM), encryption, and vulnerability management. Review and Lead Security Tooling modernisation i.e. leveraging Microsoft native capabilities Provide guidance on the … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.). Solid knowledge of identity and access management (IAM), encryption, network security, and secure workload migration. Experience with security governance, risk, and compliance in regulated environments. Strong documentation, communication, and stakeholder engagement More ❯
cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third … services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with More ❯
watford, hertfordshire, east anglia, united kingdom
ECS Resource Group
cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third … services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with More ❯
cloud services . Support day-to-day operations of Azure IaaS/PaaS , Microsoft 365 , Exchange Online , and related platforms. Administer and improve endpoint management via Intune , SCCM , and Autopilot. Ensure security compliance through MFA , Microsoft Defender , and proactive vulnerability management. Collaborate with internal support teams and third … services . Experience managing Windows Server environments , Active Directory , GPOs , Hyper-V , and networking (DNS, DHCP, VPN, firewalls) . Skilled in endpoint and device management tools such as Intune , SCCM , and Jamf (for macOS) . Scripting and automation ability (e.g., PowerShell ). Understanding of ITIL principles and familiarity with More ❯