Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Senior IdentityAccessManagement (IAM) Consultant £65,000 - £75,000 (neg.) plus car allowance and bonus Leeds … or Manchester - Relaxed hybrid working Hays Technology are working with a global firm who are looking for an experienced Senior IdentityandAccessManagement Consultant. This role requires eligibility for SC clearance and does not provide visa sponsorship. The team you'll be working More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing … Security : Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and respond to security incidents, conducting … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, andMore ❯
and maintaining Infrastructure as Code (IaC) solutions to automate provisioning and configuration management Implementing security best practices, including identityandaccessmanagement (IAM), encryption, and compliance Working with development and application teams to improve culture and practices Maintaining documentation for infrastructure, processes … tools such as Terraform, ARM Templates, Ansible, or Kubernetes Possess experience with hybrid cloud and multi-cloud environments And have: Progressive computer systems managementand support experience, preferably in a multi-site enterprise-scale environment Experience with Microsoft Azure cloud services and solutions Experience in cloud infrastructure engineering More ❯
from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer facing … You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site … methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations - Significant experience in IT security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios More ❯
Senior Software Engineer - TypeScript, Node.js, AWS, Cybersecurity, Cloud Security, IDAM/IAM, MFA, Ping Identity, REST APIs, Investment Management - Central Manchester A global Investment Manager is seeking a Senior Engineer skilled in TypeScript and Node.js development on AWS to join their Security Architecture and Engineering team … engineering on AWS Backend development experience in Python is a plus Previous experience in security engineering and architecture is highly advantageous Knowledge of customer IDAM tools such as Ping Identity is beneficial Experience in finance is helpful but not essential If you are interested in Cybersecurity and building More ❯
no two days will be the same. Experience in SIEM, SOAR, or Managed Security Services is essential. Additional hands-on experience with DDoS, WAF, IDAM, EDR, MDM , or Vulnerability Management is highly desirable. They are also open to candidates from operational security backgrounds who wish to transition into More ❯