South West London, London, United Kingdom Hybrid / WFH Options
Parliamentary Digital Service
iOS and Android. It is further responsible for the packaging, deployment and maintenance of applications to each of these operating systems, and can include both fully managed and bringyourowndevice scenarios. Print is also owned by Device Management - all print services across Parliament users. About Us UK Parliament is steeped in history and tradition. It is an important More ❯
Ilford, Essex, England, United Kingdom Hybrid / WFH Options
Reed
Enable agile delivery and automation. Microsoft 365 Suite – Support collaboration tools including SharePoint, Exchange, and Teams. End User Computing (EUC) Expertise Microsoft Intune – Manage devices securely across corporate and BYOD environments. Azure Device Management – Provision and monitor endpoints with Autopilot and Defender for Endpoint. Windows Autopilot & Endpoint Analytics – Enhance onboarding and user experience. Patch Management & Compliance Reporting – Maintain security and More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential skills/knowledge/experience Previous experience in a cybersecurity role, with a strong focus More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure BringYourOwnDevice (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You'll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
london (city of london), south east england, united kingdom
Quant Capital
This is a hands-on, technical role focused on MDM (Intune, Jamf, Workspace One), scripting (PowerShell, Bash/zsh, Python), and infrastructure automation. You’ll manage both corporate and BYOD environments, driving provisioning, compliance, and integration with wider IT systems. The role involves close collaboration with security, infrastructure, and support teams globally. What You'll Do: Administer mobile fleets using More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
london (city of london), south east england, united kingdom
RiverSafe
Role We are seeking an experienced Security Consultant with strong expertise in assessing business risks and designing secure, scalable solutions for BringYourOwnDevice (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies and identity access management Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure More ❯
administration, including Entra Connect and Intune. Phased implementation of Conditional Access policy changes, including management of user accounts experience and contribution to communications and training. CoreView Configuration Manager administration. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Management of EntraID services, including EntraID Connect, Entra Cloud Sync, Conditional Access, MFA, App … on experience in Microsoft 365, Azure, and EntraID/identity management . Proven experience implementing and managing: SSO, MFA, Conditional Access, B2B/B2C, and passwordless authentication Intune/BYODdevice management , including MAM/App Protection, Apple Business Manager, Android Enterprise Certificate and secret lifecycle management M365 governance & compliance tools (Purview, retention policies, sensitivity labels, e-Discovery) Exposure to More ❯
administration, including Entra Connect and Intune. Phased implementation of Conditional Access policy changes, including management of user accounts experience and contribution to communications and training. CoreView Configuration Manager administration. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Management of EntraID services, including EntraID Connect, Entra Cloud Sync, Conditional Access, MFA, App … on experience in Microsoft 365, Azure, and EntraID/identity management . Proven experience implementing and managing: SSO, MFA, Conditional Access, B2B/B2C, and passwordless authentication Intune/BYODdevice management , including MAM/App Protection, Apple Business Manager, Android Enterprise Certificate and secret lifecycle management M365 governance & compliance tools (Purview, retention policies, sensitivity labels, e-Discovery) Exposure to More ❯
administration, including Entra Connect and Intune. Phased implementation of Conditional Access policy changes, including management of user accounts experience and contribution to communications and training. CoreView Configuration Manager administration. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Management of EntraID services, including EntraID Connect, Entra Cloud Sync, Conditional Access, MFA, App … on experience in Microsoft 365, Azure, and EntraID/identity management . Proven experience implementing and managing: SSO, MFA, Conditional Access, B2B/B2C, and passwordless authentication Intune/BYODdevice management , including MAM/App Protection, Apple Business Manager, Android Enterprise Certificate and secret lifecycle management M365 governance & compliance tools (Purview, retention policies, sensitivity labels, e-Discovery) Exposure to More ❯
london (city of london), south east england, united kingdom
AVI-SPL
administration, including Entra Connect and Intune. Phased implementation of Conditional Access policy changes, including management of user accounts experience and contribution to communications and training. CoreView Configuration Manager administration. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Management of EntraID services, including EntraID Connect, Entra Cloud Sync, Conditional Access, MFA, App … on experience in Microsoft 365, Azure, and EntraID/identity management . Proven experience implementing and managing: SSO, MFA, Conditional Access, B2B/B2C, and passwordless authentication Intune/BYODdevice management , including MAM/App Protection, Apple Business Manager, Android Enterprise Certificate and secret lifecycle management M365 governance & compliance tools (Purview, retention policies, sensitivity labels, e-Discovery) Exposure to More ❯
Exchange 2016/2019/SE configuration, administration, and support, including experience with upgrades to Exchange 2019/SE. Mimecast configuration, administration, and support. Valimail configuration, administration, and support. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Identify and champion opportunities for automation. WHAT WE'RE LOOKING FOR: Minimum … managing email security and continuity platforms Working knowledge of DNS, SPF, DKIM, and DMARC configuration and management, ideally using tools such as Valimail . Strong understanding of Intune for BYOD and corporate device management , Demonstrated ability to identify, design, and implement automation to improve operational efficiency (e.g., via PowerShell, Logic Apps, or Power Automate). Relevant Microsoft certifications such as More ❯
Exchange 2016/2019/SE configuration, administration, and support, including experience with upgrades to Exchange 2019/SE. Mimecast configuration, administration, and support. Valimail configuration, administration, and support. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Identify and champion opportunities for automation. WHAT WE’RE LOOKING FOR: Minimum … managing email security and continuity platforms Working knowledge of DNS, SPF, DKIM, and DMARC configuration and management, ideally using tools such as Valimail . Strong understanding of Intune for BYOD and corporate device management , Demonstrated ability to identify, design, and implement automation to improve operational efficiency (e.g., via PowerShell, Logic Apps, or Power Automate). Relevant Microsoft certifications such as More ❯
Exchange 2016/2019/SE configuration, administration, and support, including experience with upgrades to Exchange 2019/SE. Mimecast configuration, administration, and support. Valimail configuration, administration, and support. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Identify and champion opportunities for automation. WHAT WE’RE LOOKING FOR: Minimum … managing email security and continuity platforms Working knowledge of DNS, SPF, DKIM, and DMARC configuration and management, ideally using tools such as Valimail . Strong understanding of Intune for BYOD and corporate device management , Demonstrated ability to identify, design, and implement automation to improve operational efficiency (e.g., via PowerShell, Logic Apps, or Power Automate). Relevant Microsoft certifications such as More ❯