scale. Join us for rewarding work that makes a difference across the UK. You'll solve some of the nation's highest-priority digital challenges, helping millions of people access services they need Role overview GDS is looking to recruit a Head of Security Architecture. This will involve engaging internally in GDS and across government on critical areas of … work. The Head of Security Architecture will be an experienced Security professional with extensive technical, strategic and management experience. The individual should have the appropriate level of experience and gravitas to brief the CISO and interact at C-level. As Head of Security Architecture in the GDS Information Security team, you'll be responsible for: delivering a security architecture … approaches, steps toward zero trust, etc. and other security concepts implementing the GDS Secure by Design principles in operational services leading the security component of cross-business initiatives on PrivilegedAccessManagement, including effective Identity solutions and use of PrivilegedAccess Workstations developing common, workable patterns for enterprise-level guardrails and application patterns enabling secure More ❯
Netskope SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration management and continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement … and supporting Identity and AccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of PrivilegedAccessManagement (PAM) solutions, including policy definition, Just-In-Time (JIT) access implementation, and proactive monitoring of privileged activity for security threats Our Infrastructure Stack: Cloud: AWS, Azure and GCP Networking More ❯
all major business systems, ensuring that products and services are resilient and can meet user needs. About the Role The Identity Manager will lead the university's identity and accessmanagement strategy, ensuring secure, compliant, and seamless access for staff, students, and partners. You will oversee authentication, Single Sign-On, and privilegedaccessmanagement … on-premises and cloud platforms, and collaborating with diverse teams to safeguard digital identities and support innovative service delivery. About the Candidate You have proven expertise in identity and accessmanagement, with experience managing IAM platforms and integrating cloud and enterprise systems. You are highly analytical, collaborative, and user-focused, with strong knowledge of IAM protocols and a More ❯
on key risks Coaching auditors and supporting them to realise their potential on the engagement The skills you'll need We're looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. You'll also need: In depth understanding of Infrastructure and Cyber Security risks, concepts, and technologies … level Auditing Public Cloud IaaS/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to assess and prioritise data effectively … quickly establishing what's important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way More ❯
data science, advanced analytics techniques, research and development, and innovation within one or more of the Cybersecurity sciences (e.g. network, endpoint and cloud security, cryptography, malware analysis, vulnerability assessment, privilegedaccessmanagement, anomaly/intrusion detection, incident response, or offensive security). The Principal Cybersecurity Analytics Engineer role is a key leadership, hands on technical role, contributing … collaboratively in a fast-paced environment, and an aptitude for picking up new tools and techniques on the job, building on existing skillsets as a foundation. You will have access to tailored professional development opportunities and a competitive pay and benefits package. This includes private healthcare for all UK-based employees, enhanced maternity and adoption pay and support when More ❯