Monitor, Log Analytics, and Security Center . Expertise in database backup, recovery, and disaster recovery planning. Experience implementing security best practices, including RBAC, encryption, and auditing . Strong understanding of performance tuning techniques , including indexing strategies and query optimization. Familiarity with PowerShell scripting and Infrastructure as Code (IaC More ❯
Containers, lifecycle rules, access policies, secure access patterns. Azure Web Apps and additional cloud services where needed. Maintain and enhance IaC for RBAC, Entra ID (Azure AD), and secure external access. Support flexible deployments and environment replication across dev/test/prod. DevOps & Deployment Automation Build and More ❯
routing and switching, including protocols like BGP, OSPF, and MPLS. Deep understanding of network security principles (e.g., ACLs, firewalls, VPNs, 802.1x authentication, profiling, RBAC). Familiarity with network monitoring tools/protocols and logging pipelines (e.g., SNMP, Syslog, Netflow, ELK Stack, Grafana). Strong knowledge of cloud platforms (e.g. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Searchability NS&D
knowledge of containerisation (e.g., Kubernetes/Docker/OpenShift) Experience with Terraform, CI/CD pipelines, automation tooling Understanding of platform security, IAM, RBAC, and cloud governance Agile/DevSecOps environment experience a plus Must hold active SC or DV Clearance, or be fully UKSV DV eligible (sole British More ❯
to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identity and access management using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks such as; TOGAF Work More ❯
to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identity and access management using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks such as; TOGAF Work More ❯
to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identity and access management using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks such as; TOGAF Work More ❯
essential governance features such as metrics tracking, audit logs, security measures and role-basedaccess controls (RBAC), to ensure compliance, transparency and enterprise readiness across AI systems. Holistic Thinking: Think critically about the interactions between AI models and product components to ensure More ❯
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
Python, SQL, and Scala for data processing. Strong understanding of Azure networking, security, and IAM , including Azure Private Link, VNETs, Managed Identities, and RBAC . Deep knowledge of enterprise-scale data architecture patterns , including Lakehouse, Medallion Architecture, and hub-and-spoke models . Strong problem-solving skills and ability More ❯
based on the level of database access the user/groups require - Individual/Group/Rolebased (Security). Knowledge of cross connectivity to various data sources - SQL Server/Oracle/Access/Informix/Azure More ❯
using GitLab CI, Jenkins, or ArgoCD Create custom integrations, plugins, bots, and SSO/LDAP connectors Harden, secure, and monitor platforms with TLS, OAuth2, RBAC , and Zero Trust principles Optimise performance and scalability across cloud and on-prem environments Troubleshoot and support complex platform deployments Collaborate with DevOps, AppSec, and More ❯
using GitLab CI, Jenkins, or ArgoCD Create custom integrations, plugins, bots, and SSO/LDAP connectors Harden, secure, and monitor platforms with TLS, OAuth2, RBAC , and Zero Trust principles Optimise performance and scalability across cloud and on-prem environments Troubleshoot and support complex platform deployments Collaborate with DevOps, AppSec, and More ❯
using GitLab CI, Jenkins, or ArgoCD Create custom integrations, plugins, bots, and SSO/LDAP connectors Harden, secure, and monitor platforms with TLS, OAuth2, RBAC , and Zero Trust principles Optimise performance and scalability across cloud and on-prem environments Troubleshoot and support complex platform deployments Collaborate with DevOps, AppSec, and More ❯
efficiency , and resilience . Required Skills & Experience Proven hands-on experience managing and scaling GKE clusters in production environments. Solid understanding of Kubernetes architecture , RBAC, custom resources, and workload types. Strong IaC skills with Terraform (GCP provider) for managing Kubernetes and cloud infrastructure. Experience with CI/CD pipelines tailored More ❯
efficiency , and resilience . Required Skills & Experience Proven hands-on experience managing and scaling GKE clusters in production environments. Solid understanding of Kubernetes architecture , RBAC, custom resources, and workload types. Strong IaC skills with Terraform (GCP provider) for managing Kubernetes and cloud infrastructure. Experience with CI/CD pipelines tailored More ❯
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging More ❯
Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Project More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯