delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … enterprise PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identitymanagement platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key managementMore ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. You’ll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering … scalable solutions to complex mission systems. Key Responsibilities: • Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems • Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures • Provide technical guidance on Active Directory integration, federation services, and certificate-based … enterprise PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous • Strong understanding of Active Directory, federation and identitymanagement platforms, and certificate-based access controls • Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments • Knowledge of certificate auto-enrolment, key managementMore ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerability management Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to make a … are embedded throughout Supporting the secure design of products and infrastructure, providing input early in the SDLC Maintaining and improving physical security systems including access control and CCTV Managing identity, access controls, and endpoint protection tools Writing clear, actionable reports for both technical and executive audiences, including regular updates on the security landscape Aligning with frameworks such as ISO … role (ideally 2-3+ years), ideally across cloud and hybrid environments Strong penetration testing experience with confidence to act on the findings A solid grasp of access controls, identitymanagement, and cloud security (especially AWS) Familiarity with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO 27001, PCI-DSS, and GDPR More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
design, implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identitymanagement activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the … for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, Vulnerability Management, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive feedback. Candidates More ❯
or Site Reliability Engineering Strong Kubernetes expertise and proven experience managing production-grade clusters Proficiency across at least one major cloud platform (AWS, Azure, or GCP) Understanding of networking, identitymanagement, and secure cloud operations Familiarity with Agile delivery and working within multi-disciplinary, secure environments Eligible for UK Security Clearance (SC or DV) Why Join? Youll be More ❯
or Site Reliability Engineering • Strong Kubernetes expertise and proven experience managing production-grade clusters • Proficiency across at least one major cloud platform (AWS, Azure, or GCP) • Understanding of networking, identitymanagement, and secure cloud operations • Familiarity with Agile delivery and working within multi-disciplinary, secure environments • Eligible for UK Security Clearance (SC or DV) Why Join? You’ll More ❯
high-level security clearance. Essential experience: Several years in an infrastructure or systems engineering role. Strong knowledge of Microsoft environments (Windows Server, Azure). Familiarity with virtualisation, networking, and identity management. Solid understanding of IT security standards and practices. Clear communication skills and ability to work across technical and non-technical teams. Desirable experience: Industry certifications in Microsoft, cloud More ❯
will own and build our IT operations in the UK, supporting both office and production environments. This is a hands-on, multi-domain role that covers infrastructure, network, endpoints, identitymanagement, IT support, and security compliance. As the UK-based point of contact for IT, you will be responsible for designing, implementing, and operating systems that are secure … technical issues, both reactive and proactive. Collaborate with Corporate IT and the CISO on global initiatives, security policies, and process standardization. Establish processes, documentation, and workflows for onboarding, device management, and service delivery. Automate recurring operational tasks wherever possible. Evaluate and recommend new technologies to improve reliability, efficiency, and security. Identify dependencies and potential single points of failure, and … experience as a Sysadmin/Systems Engineer covering multiple IT domains: networking, servers, endpoints, IAM, support, and SaaS tooling. Hands-on experience with Okta (or similar), Google Workspace, endpoint management systems, and server environments. Experience in regulated or high-security environments is a strong advantage. Ability to work independently and make operational/architectural decisions. Strong problem-solving, prioritisation More ❯
will own and build our IT operations in the UK, supporting both office and production environments. This is a hands-on, multi-domain role that covers infrastructure, network, endpoints, identitymanagement, IT support, and security compliance. As the UK-based point of contact for IT, you will be responsible for designing, implementing, and operating systems that are secure … technical issues, both reactive and proactive. Collaborate with Corporate IT and the CISO on global initiatives, security policies, and process standardization. Establish processes, documentation, and workflows for onboarding, device management, and service delivery. Automate recurring operational tasks wherever possible. Evaluate and recommend new technologies to improve reliability, efficiency, and security. Identify dependencies and potential single points of failure, and … experience as a Sysadmin/Systems Engineer covering multiple IT domains: networking, servers, endpoints, IAM, support, and SaaS tooling. Hands-on experience with Okta (or similar), Google Workspace, endpoint management systems, and server environments. Experience in regulated or high-security environments is a strong advantage. Ability to work independently and make operational/architectural decisions. Strong problem-solving, prioritisation More ❯
point-based tiered, and personalized structures . • Integrate solutions with POS systems, e-commerce platforms, and mobile apps for seamless customer experience. • Define architecture for marketing automation platforms, campaign management systems, and CRM solutions. • Design API-driven architectures for integrating third-party marketing platforms, ad networks, and analytics tools. Leverage cloud-native technologies (AWS/GCP) for scalability, performance … IBM e - commerce/Ocado ecommerce is plus • Good experience in working with DevOps teams to enhance CI/CD pipelines and ensure smooth deployments. • Define best practices for identitymanagement, authentication etc. Desirable skills/knowledge/experience: • Togaf certified • Healthcare industry experience, preferably within the payer space as a Java Solution Architect. • Experience with CRM, Member … all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998. We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role. As a Disability Confident Employer, we offer More ❯