Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
Maidstone, Kent, United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
expert: Setting up, configuring and updating the Azure suite of tools including InTune, Azure Key Vault, Defender, email security, sharepoint security etc Embrace a zero-trust approach: Patch management, emerging security trends? You'll be a master, integrating cutting-edge tools like Zscaler and CrowdStrike to create an more »
well as having accomplished them as an individual contributorAbout Rubrik:Rubrik (NYSE: RBRK) is on a mission to secure the world’s data. With ZeroTrust Data Security, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning more »
Experience with directory services (e.g., Active Directory, LDAP), SSO technologies, and federation protocols (SAML, OAuth, OIDC). Strong understanding of related technological approaches (e.g. ZeroTrust, Least Privilege, ) Familiarity with regulatory compliance and industry standards related to identity and access management. Exceptional analytical and problem-solving skills, with more »
Design and implement an integrated set of TMS-related syst ems.Research and recommend data tools and technologies to enhance system efficiency and integration, considering ZeroTrust Architecture, Information Security, and Identity and Access Management princip les.Develop and maintain integration principles, standards, policies, and procedures to ensure secure, high more »
AD, PKI and certificates, encryption, SSO/MFA, PAM, etc), as well as the ability to learn new ways of thinking and technologies (e.g., ZeroTrust, Mitre ATT&CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, and access provisioning more »
encryption products. You will support our research efforts around IoT Security, the Identity of Things (IDoT), Machine-to Machine (M2M) communication security and authentication, zero-trust networks and zero-knowledge systems. This role offers the opportunity for significant learning and professional development, whilst contributing significantly to our … into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
ensuring least privilege controls are in place. Core Networking knowledge (VLANS/TCP/IP) Exposure to ZTS, Micro-segmentation (including VMWare NSX) and zerotrust architecture principles. An understanding of Operational Technology (OT) used in a manufacturing environment including ICS/Warehouse automation PLCs. Working in a more »
Management ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape or Ansible ● Experience with Public Cloud Security ● Experience with ZeroTrust Platforms WHAT'S ON OFFER? ● You'll be joining an organisation that is truly shaping the future of the sector in which more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Do you want to be part of something special? Do you want to run you own Technology Tower within an exceptional business? Do you want to work for a company with a clearly defined vision & strategy to set the industry more »
About ZscalerZscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler ZeroTrust Exchange is the company’s cloud-native platform that protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in … aligning closely with the Worldwide Channel & Alliances Sales Plan.Cultivate and nurture a robust network of strategic partners and influencers across the UKI region, fostering trust and alignment with Zscaler's innovative solutions.Collaborate closely with in-country, regional, and global Partner Business Managers to ensure seamless communication and consistent execution more »
and respond to cyber threats. Understanding of networking technology Cyber security service trends compliance requirements in enterprise organisations Core cyber security products including SIEM, ZeroTrust and NDR/XDR products. Core network routing and switching protocols. Knowledge of network performance and optimisation and services Please apply ASAP more »
documentation & presentations and marketing material as well as a quality service to all Excellent knowledge of Security products, especially Next Generation, virtual, FW, MDR, ZeroTrust etc. Dependable and professional Excellent knowledge and proficiency for ICT services, especially network, solutions, & security Good technical computer and software skills. Ability more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
Research and propose data tools and technologies to improve efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, ZeroTrust Architecture, Information Security, Identity and Access Management, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
propose data tools and technologies to improve the efficiency and delivery of an integrated set of systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to more »
Endpoint Security: Evaluate User Access Permissions: Review and potentially limit access to administrative tools like PowerShell and CMD, based on a least privilege principle. ZeroTrust Security Framework: ZeroTrust Investigation and Roadmap Definition: Research and develop a roadmap for implementing a ZeroTrustmore »
Senior Cloud Network Engineer – Hybrid Senior Cloud Network Engineer Azure, DevOps, ZeroTrust Network Access Financial Services Contract 6 months initially West End, London/Hybrid (2 days a week in the office) £550 per day outside IR35 My client is one of the world's leading investors … follows: Have broad responsibilities to engineer and secure their core Azure platform services across the global footprint. Go deep on Cloud Network engineering, adopting ZeroTrust Architecture principles. Engineer and maintain Cloud Secure Web Gateways to protect web-based threats and enforce policies. Engineer and administer Next-Gen … Open Source development and industry innovation. Know what the use of configuration management systems (like Ansible) are for. Senior Cloud Network Engineer Azure, DevOps, ZeroTrust Network Access Financial Services Contract 6 months initially West End, London/Hybrid (2 days a week in the office) £550 per more »
Understanding of the technical security measures required for enterprise IT environments as described above with an appreciation for the fundamental ‘defence in depth’ and ‘zerotrust’ approaches to IT security Working with multiple cloud-based solution providers and strong understanding of the security risks associated with cloud-based more »
and ensure system integrity. About You Skills and Competencies Essential: A bachelor’s degree in computer science or any related field Working familiarity with zero-trust designs Capable of designing and implementing Authentication & Authorization (AuthN) solutions across a variety of protocols including OpenID Connect, OAuth 2.0, SAML 2.0. more »
to the Buyer’s IT service and ensuring that designs justify this. Understanding the implications of design choices in highly secure micro-segmented and zero-trust architectures. • Providing assessments of design/technology options as part of design choices, clearly describing the criteria used, options analysis and final more »
and infrastructure related issues quickly and effectivelyProvision cloud resources based on capacity, computing and security requirementsAlways have best security practices top of mind, employing zerotrust and principle of least privilege across all critical systems and resourcesWork in tandem with development teams to manage and execute DevOps and more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »