Ilford, Essex, England, United Kingdom Hybrid / WFH Options
Reed
Enable agile delivery and automation. Microsoft 365 Suite – Support collaboration tools including SharePoint, Exchange, and Teams. End User Computing (EUC) Expertise Microsoft Intune – Manage devices securely across corporate and BYOD environments. Azure Device Management – Provision and monitor endpoints with Autopilot and Defender for Endpoint. Windows Autopilot & Endpoint Analytics – Enhance onboarding and user experience. Patch Management & Compliance Reporting – Maintain security and More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
and enforcement. Partner with cyber and ISRM teams to integrate secure access into incident response, threat detection, and policy governance workflows. Support enforcement of access policies for third-party, BYOD, and contractor devices using secure, scalable methods. Collaboration & User Experience: Work closely with cyber, architecture, and global network teams to deliver consistent, aligned remote access capabilities. Act as a champion More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You'll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
london (city of london), south east england, united kingdom
Quant Capital
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
devices. This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. Youll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. Administer mobile fleets using MDM/UEM tools Automate workflows and policy enforcement Troubleshoot OS, network, and app issues Support More ❯
misconfigurations based on a risk-based assessment. Utilize Microsoft Entra ID Protection to identify and respond to compromised credentials and other identity-based risks. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯