with analysing and understanding complex, custom ServiceNow environments Experience with design and implementation of Vault features including Data Classification, Data Anonymization, Data Discovery and ZeroTrust Access. Experience with implementing column level encryption, ACLs and other access controls e.g. data filtration. Experience running technical workshops, creating technical designs more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
Research and propose data tools and technologies to improve efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, ZeroTrust Architecture, Information Security, Identity and Access Management, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
propose data tools and technologies to improve the efficiency and delivery of an integrated set of systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
tools and technologies to improve the efficiency and delivery of an integrated set of Mobile applications systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
for cisco, fortinet, Juniper etc. Hardware/appliance: Experience with network hardware (e.g., routers, switches, firewalls) from vendors like Cisco, Juniper, etc. Modern Network : Zerotrust network and security architecture design experience. Monitoring tool and network tools: Experience with enterprise network monitoring and management tools. 3. Leadership Skills more »
to Cloud based technologies such as Azure and AWS Experience with Application Virtualization in a VDI environment Understand infrastructure security best-practices such as zero-trust, least-access, MFA, etc. Comprehensive practice in implementing and troubleshooting using the OSI networking model. At Cognizant you will experience an exciting more »
expert: Setting up, configuring and updating the Azure suite of tools including InTune, Azure Key Vault, Defender, email security, sharepoint security etc Embrace a zero-trust approach: Patch management, emerging security trends? You'll be a master, integrating cutting-edge tools like Zscaler and CrowdStrike to create an more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team we’re always looking to raise the bar, learn new things and more »
for the organization. Research and recommend data tools and technologies to boost efficiency and ensure data security, complying with GDPR, CISSP, NIST, ISO 27001, ZeroTrust Architecture, Information Security, and Identity and Access Management standards. Develop and uphold data principles, standards, policies, and procedures to maintain secure, high more »
Design and implement an integrated set of TMS-related syst ems.Research and recommend data tools and technologies to enhance system efficiency and integration, considering ZeroTrust Architecture, Information Security, and Identity and Access Management princip les.Develop and maintain integration principles, standards, policies, and procedures to ensure secure, high more »
supporting proper access management, enabling the organization, and supporting the business in a scalable, reliable and secure way. Demonstrable experience building solutions based on zero-trust principles. Proven experience configuring and rolling out the following services on the Azure Active Directory (AAD) Multi-factor authentication and Conditional Access more »
AD, PKI and certificates, encryption, SSO/MFA, PAM, etc), as well as the ability to learn new ways of thinking and technologies (e.g., ZeroTrust, Mitre ATT&CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, and access provisioning more »
encryption products. You will support our research efforts around IoT Security, the Identity of Things (IDoT), Machine-to Machine (M2M) communication security and authentication, zero-trust networks and zero-knowledge systems. This role offers the opportunity for significant learning and professional development, whilst contributing significantly to our … into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
encryption products. You will support our research efforts around IoT Security, the Identity of Things (IDoT), Machine-to Machine (M2M) communication security and authentication, zero-trust networks and zero-knowledge systems. This role offers the opportunity for significant learning and professional development, whilst contributing significantly to our … into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
Kanban, and Scrum methodologies.Expertise in leading diverse and inclusive teams.Cyber Security:Experience in architecting secure, cloud-based (AWS) applications, including CI/CD.Familiar with ZeroTrust Architecture, SBD, OWASP, NIST, CIS, and NCSC baselines.Strong foundation across the cybersecurity technology stack.Desirable:Prior experience working in agile delivery teams.Familiarity with more »
Manchester, Greater Manchester, United Kingdom Hybrid / WFH Options
Anson McCade
Kanban, and Scrum methodologies.Expertise in leading diverse and inclusive teams.Cyber Security:Experience in architecting secure, cloud-based (AWS) applications, including CI/CD.Familiar with ZeroTrust Architecture, SBD, OWASP, NIST, CIS, and NCSC baselines.Strong foundation across the cybersecurity technology stack.Desirable:Prior experience working in agile delivery teams.Familiarity with more »
ensuring least privilege controls are in place. Core Networking knowledge (VLANS/TCP/IP) Exposure to ZTS, Micro-segmentation (including VMWare NSX) and zerotrust architecture principles. An understanding of Operational Technology (OT) used in a manufacturing environment including ICS/Warehouse automation PLCs. Working in a more »
designing highly secure on-premise IT Infrastructure Experience in Networking (switching, Routing & Firewalls) Windows Technologies (SharePoint, Exchange, Skype) Knowledge of Secure by Design and ZeroTrust Principles Experience/Certification in TOGAF Eligible for Security Clearance (SC) Benefits: Salary up to £80,000 4pm finish on a Friday more »
security incidents by putting preventative measures in place. Technologies: Microsoft Azure Cloud MS Defender for Endpoint, Cloud, etc MS Sentinel Entra ID MS InTune ZeroTrust technology experience The above is a wish list and not a list of imperatives; if you are missing one or more of more »
Management ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape or Ansible ● Experience with Public Cloud Security ● Experience with ZeroTrust Platforms WHAT'S ON OFFER? ● You'll be joining an organisation that is truly shaping the future of the sector in which more »
and respond to cyber threats. Understanding of networking technology Cyber security service trends compliance requirements in enterprise organisations Core cyber security products including SIEM, ZeroTrust and NDR/XDR products. Core network routing and switching protocols. Knowledge of network performance and optimisation and services Please apply ASAP more »
and optimizing our security protocols. The ideal candidate will possess a strong technical background in identity management (IDM), Secure Access Service Edge (SASE), and ZeroTrust architecture (Z-Trust). Additionally, you should be adept at working within a DevSecOps framework and have hands-on experience with … on a common goal. to work in a complex, multi stakeholder environment in Azure cloud services and architectures. understanding of IDM, SASE, and Z-Trust principles and best practices. (RHEL) – at least 4 years. of configuration management tools such as Ansible and Terraform. skills- Python, Terraform, Bicep of version more »