Security Engineering, Architecture and Operations, driving and supporting improvements globally to our Information Protection Portfolio. You will be: Engaging collaboratively with application development, data protection, information security, and risk management teams to understand and implement data security solutions. Supporting vendor assessments, including proof of concepts & security technologies research Continuously improving data protection services based on input from a diverse … You can successfully interface and connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work well independently, as well as part of a geographically dispersed team bringing a sense of urgency to the tasks … and data-in-transit, data security techniques and methodologies Experience of using relevant DLP tools such as Symantec DLP, Zscaler CASB, MS Purview & similar Experience in managing DLP IM Management and have good understanding of end-to-end IM processes Experience of working with MS Defender and Intune. Experience of using relevant IRM/Data Classification/Data Discovery More ❯
OpenShift), CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secretsmanagement tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/ More ❯
CSF, OWASP SAMM), and compliance frameworks (SOC 2, ISO 27001, GDPR). Secure SDLC & DevSecOps - Build and maintain guardrails for static/dynamic analysis, container and IaC scanning, SBOM management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, network … segmentation, KMS, secretsmanagement, WAF, EDR, and zero-trust patterns. Identity & Access Management (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML), and privileged-access workflows. Monitoring, Detection & Response - Define audit logging, metrics, and telemetry requirements; integrate with SIEM/SOAR to deliver actionable alerts and playbooks for engineering-led incident … software teams, especially for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred, but not essential Certifications such as CISSP, CSSLP, AWS Certified Security. More ❯
a Cloud native environment and automation Experience designing, implementing and managing security capabilities at scale 5+ years AWS, 3+ years IAC (Terraform) and automation (Python) experience (WAF, IAC, SCPs, SecretsManagement, Kubernetes) 5-8 years of experience within Cloud Security Experience working within SaaS companies Experience with incident handling and on-call What's in it for you More ❯
can make complex simple If you want to build the cloud backbone of tomorrow's AI products, get in touch for more info. Keywords - EC2, S3, RDS, Lambda, Bedrock, Secrets Manager, CloudFront Elastic Kubernetes Service (EKS), AWS Glue, Simple Notification Service (SNS), CloudWatch AWS Solutions Architect - AI Startup Oscar Associates (UK) Limited is acting as an Employment Agency in More ❯
can make complex simple If you want to build the cloud backbone of tomorrow's AI products, get in touch for more info. Keywords - EC2, S3, RDS, Lambda, Bedrock, Secrets Manager, CloudFrontElastic Kubernetes Service (EKS), AWS Glue, Simple Notification Service (SNS), CloudWatch AWS Solutions Architect - AI Startup Oscar Associates (UK) Limited is acting as an Employment Agency in relation More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identity and access management (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable … data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and AI/ML workloads. Leverage automation frameworks and IaC to More ❯
a Cloud native environment and automation Experience designing, implementing and managing security capabilities at scale 5+ years AWS, 3+ years IAC (Terraform) and automation (Python) experience WAF, IAC, SCPs, SecretsManagement 5-8 years of experience within Cloud Security Experience working within SaaS companies Experience with incident handling and on-call What's in it for you Competitive More ❯
of our stack, eg Go, Typescript, react Terraform or other Infrastructure as Code tooling Exposure to Kafka, event driven architectures, or message queues Familiarity with HashiCorp Vault or other secretsmanagement tooling Deeper knowledge of CI/CD pipelines Experience in a start-up or scale-up environment You don't need to have done all of these More ❯
in AWS cloud security , particularly within Amazon Web Services (AWS) environments. Key Responsibilities: Design and deploy scalable, cloud-native security solutions leveraging AWS tools such as WAF, Shield Advanced, Secrets Manager, Inspector, Macie, GuardDuty, Detective, CloudTrail, and Security Hub. Implement Infrastructure as Code (IaC) using CloudFormation or Terraform to automate security configurations and infrastructure deployments. Optimize and manage security More ❯
Express, Nest Database:DynamoWill be a plus: PostgreSQL/MySQL/Mongo Experience with AWS:LambdaDynamoDB & App Sync (GraphQL)Will be a plus: Amplify, API Gateway, CloudFormation, Cognito, SQS, Secrets Manager, S3, CloudWatch, KMS Experience with webhooks Why Join MetaWealth : • Our company structure ensures that everyone has a voice and that their contribution is valued. • We have a collaborative More ❯
security engineering team of around 15 people, your role will include end-to-end responsibility for projects, tooling, and systems covering EDR, DLP, Secure Web Gateway, Email Security, and Secrets Management. The successful candidate will have considerable hands-on experience in security engineering within a medium-to-large regulated environment. Hybrid working is available (2 days in central London More ❯
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
London, West End, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯