Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management … remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active … with internal teams (IT, security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with … real-time, collaborating with cross-functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities … Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross More ❯
IdentityandAccessManagement (IAM) & Security Expert We are looking for a hard-working candidate who can design and deliver excellent IAM solutions to a range of major private & public sector clients. You should be able to follow set procedures and be able to More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of … IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to More ❯
industry, we develop high-quality solutions that are offered both on-premises and as SaaS solutions. Our products focus on IdentityandAccessManagement processes, with the goal of simplifying configuration andmanagement for our customers. End users appreciate our solutions for … must be able to confidently deliver training sessions to engineers of varying levels of expertise; Develop and grow your own knowledge about our access control solutions by testing new functionalities, integrations and providing input for their documentation; Participate in and/or leads complex projects together with business … of a presentation/pitch team and delivering compelling product demonstrations; Advise and provide product or selling information to external stakeholders up to management level; Develop strong relationships with end-users and business partners to continuously improve collaboration; Assist and participate in events. Your team In the role More ❯
in Agile teams, public sector (GDS), dealing with stakeholders across technical teams, business change teams and end users. Experience in IdentityandAccessmanagement is desirable. Roles and Responsibilities Elicit and define business requirements with stakeholders, Working with the developers, produce well-crafted user … ensure alignment with stakeholder expectations, Research, gather requirements, analysis, process design, user story creation for topics such as: Customer experience/user journey Identity lifecycle (joiner, mover, leaver) Lifecycle automation – HR driven data integration Contractor registration Accessmanagement processes (request, approve, review, revoke) Service More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic … techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This More ❯
to modern cloud-based integration solutions. Collaborate with stakeholders to gather requirements and deliver high-quality, scalable solutions. Promote best practices in data management, integration testing, and change management. Support Identity & AccessManagement systems and provide MDM (Master Data Management … technical users. Ability to prioritise tasks, meet deadlines, and work independently or in a team environment. Desirable: Knowledge of BizTalk , Azure DevOps , API Management , JavaScript , HTML , or ASP.NET . Familiarity with systems such as SITS, Unit4, Dynamics CRM, Blackboard/Canvas, CMIS, or Sitecore. Experience working in large More ❯
storage and endpoint solutions. Working as the Senior Infrastructure Engineer/Network Support Technician youll lead on project workstreams, contribute to critical incident management, and be a go-to expert for more complex technical challenges. Your insight and experience will help shape the way the organisation deliver services … Youll have hands-on experience managing cloud and hybrid systems, networks, storage and virtualised platforms, alongside solid knowledge of Microsoft 365, Azure, and endpoint management tools such as Intune. Youll also be a clear communicator and proactive problem solver, able to stay calm under pressure and comfortable working … Experience of virtualised Windows Server platforms and components i.e. Hyper-V, VMWare In depth understanding of Active Directory, Azure AD, IdentityandAccessManagement, account risk managementand role-based access tools Experience in deploying and managing network switches, WiFi More ❯
best-in-class security operations across the business. 🔍 Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerability management efforts and support remediation in collaboration with IT teams. … external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement identityandaccessmanagement solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations More ❯
Amersham, England, United Kingdom Hybrid / WFH Options
Anson McCade
Strong expertise in Microsoft 365 (Exchange, SharePoint, Intune, Entra ID, Security & Compliance). In-depth knowledge of Azure infrastructure , including identityandaccessmanagement (Azure AD, Azure AD Connect, MFA, Conditional Access). Solid background in managing and supporting on-premises infrastructure More ❯
Databricks and Data Warehouse solutions (must have). Expertise in integration architecture and design patterns. Protocols and formats SOA, Rest, JSON, XML, etc. IdentityandAccess management. Cloud to Cloud integration & Cloud to On Premise integration. Front End and Back End integrations, network and infrastructure managementMore ❯