will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate … security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value … Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate … security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value … Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors More ❯
scalable and maintainable infrastructure that supports software delivery pipelines and application requirements while establishing and following DevOps best practices within the organisation. AWS Service Management : Deploy and manage core AWS services including EC2, S3, VPC, and ECS to support application deployment and operations. CI/CD Pipeline Development : Build … and delivery. Container Orchestration : Work with Docker containers and manage deployments on Amazon ECS, implementing auto-scaling and load balancing solutions. Security and Access Management : Implement AWS security best practices, including IAM permissions, AWS Organizations, Secrets Manager for credentials, and security groups to ensure secure cloud resources. Cloudflare … Integration : Configure and maintain Cloudflare services for DNS management, CDN, and DDoS protection to enhance security and performance. Monitoring and Optimization : Implement monitoring solutions using AWS CloudWatch and related tools to ensure system health and performance while optimizing resource utilization. Documentation and Knowledge Sharing : Create and maintain documentation for More ❯
scalable and maintainable infrastructure that supports software delivery pipelines and application requirements while establishing and following DevOps best practices within the organisation. AWS Service Management : Deploy and manage core AWS services including EC2, S3, VPC, and ECS to support application deployment and operations. CI/CD Pipeline Development : Build … and delivery. Container Orchestration : Work with Docker containers and manage deployments on Amazon ECS, implementing auto-scaling and load balancing solutions. Security and Access Management : Implement AWS security best practices, including IAM permissions, AWS Organizations, Secrets Manager for credentials, and security groups to ensure secure cloud resources. Cloudflare … Integration : Configure and maintain Cloudflare services for DNS management, CDN, and DDoS protection to enhance security and performance. Monitoring and Optimization : Implement monitoring solutions using AWS CloudWatch and related tools to ensure system health and performance while optimizing resource utilization. Documentation and Knowledge Sharing : Create and maintain documentation for More ❯
warrington, cheshire, north west england, United Kingdom
The Citation Group
scalable and maintainable infrastructure that supports software delivery pipelines and application requirements while establishing and following DevOps best practices within the organisation. AWS Service Management : Deploy and manage core AWS services including EC2, S3, VPC, and ECS to support application deployment and operations. CI/CD Pipeline Development : Build … and delivery. Container Orchestration : Work with Docker containers and manage deployments on Amazon ECS, implementing auto-scaling and load balancing solutions. Security and Access Management : Implement AWS security best practices, including IAM permissions, AWS Organizations, Secrets Manager for credentials, and security groups to ensure secure cloud resources. Cloudflare … Integration : Configure and maintain Cloudflare services for DNS management, CDN, and DDoS protection to enhance security and performance. Monitoring and Optimization : Implement monitoring solutions using AWS CloudWatch and related tools to ensure system health and performance while optimizing resource utilization. Documentation and Knowledge Sharing : Create and maintain documentation for More ❯
doncaster, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
wakefield, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
bradford, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
sheffield, south yorkshire, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
warrington, cheshire, north west england, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
preston, lancashire, north west england, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
bolton, greater manchester, north west england, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Your work will directly impact our global user base Focusing on Automation. Developing automated, scalable security solutions. Efficiency is key Administering HashiCorp Vault for secretsmanagement Performing threat modeling and analysis to identify and mitigate security risks Managing PKI, TLS, and GPG infrastructure Applying cryptography and security design … principles to cloud environments Documenting playbooks, procedures, and architecture Providing subject matter expertise to software development groups to assist in cryptography and key management/authentication API. We are excited if you have Passion for cybersecurity with an effective and passionate drive to protect digital assets. Experience implementing custom … one public cloud provider (AWS, GCP, or Azure) Experience managing PKI/X.509 certificate infrastructure. Extensive experience supporting and implementing TLS/SSL certificate management systems Proficient with Token-based authentication services, Perfect Forward Security (PFS), Apache, Nginx, HAProxy Solid knowledge of Linux security and system operations. Benefits Roku More ❯
succeed as a Run & Operations Engineer, you should have experience with: C-CURE/Genetec Expertise - Hands-on experience with access control and security management systems. Infrastructure Knowledge - Understanding of Networks, Databases, aPaaS, and Windows environments. Operational Experience - Managing and optimizing operational processes with a strong technical foundation. Additional … Physical Security products and services, including mobile building access. Excellent communication and presentation skills. You may be assessed on key skills such as risk management, controls, change management, business acumen, strategic thinking, and digital technology, alongside role-specific technical skills. This role is based in Knutsford, United Kingdom. … Accountabilities Provide expertise on security systems and engineering patterns. Develop and implement protocols, algorithms, and software to protect data and systems. Manage and secure secrets, ensuring proper generation, storage, and usage. Conduct audits to identify vulnerabilities and support responses to security breaches. Advance cryptographic technologies and techniques to support More ❯
expertise on security systems and engineering patterns. Develop and implement protocols, algorithms, and software applications to protect sensitive data and systems. Manage and protect secrets, ensuring they are securely generated, stored, and used. Conduct audits to monitor, identify, and assess vulnerabilities in the bank's infrastructure/software and … developers and security teams, to ensure cryptographic solutions align with business objectives, security policies, and regulatory requirements. Develop, implement, and maintain Identity and Access Management solutions and systems. Assistant Vice President Expectations Advise and influence decision making, contribute to policy development, and ensure operational effectiveness. Collaborate with other functions More ❯