Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
london (city of london), south east england, United Kingdom
Eames Consulting
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
delivering a complex Digital Identity Governance programme. Required Experience: Active SC Clearance and recent Central Government projects. Enterprise Identityandaccessmanagement with a focus on Identity Governance Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. Software deployment and change management process. Hands-on agile software development and deployment delivery model. For more information, please apply below or contact me directly. Contact: 02077806706 ------------------------ IAM more »
london (city of london), south east england, United Kingdom
Anson McCade
delivering a complex Digital Identity Governance programme. Required Experience: Active SC Clearance and recent Central Government projects. Enterprise Identityandaccessmanagement with a focus on Identity Governance Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. Software deployment and change management process. Hands-on agile software development and deployment delivery model. For more information, please apply below or contact me directly. Contact: 02077806706 ------------------------ IAM more »
well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat managementand will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … an outstanding benefits package, which includes pension schemes, discounted gym memberships, a cycle-to-work scheme, access to home furnishings and electronics, access to Employee Assistance Program (EAP), discounts at various high street retailers, eligibility for the Blue Light Card, the opportunity to apply for low … anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identityandaccessmanagement) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
london, south east england, United Kingdom Hybrid / WFH Options
Catch Resource Management
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »
Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … performance • Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a more »
Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … performance • Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
software-defined network and security services. Practical experience of other Zscaler products such as ZDX, Cloud & Branch Connector, Risk360. Knowledge and understanding of Identity & AccessManagement services and understanding of identity-based, adaptive trust architectures for securing access to services. more »
software-defined network and security services. Practical experience of other Zscaler products such as ZDX, Cloud & Branch Connector, Risk360. Knowledge and understanding of Identity & AccessManagement services and understanding of identity-based, adaptive trust architectures for securing access to services. more »
using Go or Kotlin for IAM tasks. Implement and manage SCIM provisioning for automated user lifecycle management Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. Configure and manage access controls to ensure secure and role-based access to resources. For more information or to apply please reach out to Luke Finn on +44 203 053 3723/luke@next-ventures.com more »