london, south east england, united kingdom Hybrid / WFH Options
TalentHawk
to IAM processes. Compliance & Security: Ensure IAM solutions adhere to CAF, eCAF, NIST, and other regulatory frameworks. Conduct access audits, identity risk assessments, and compliance reporting. Work closely with cybersecurity, risk, and compliance teams to align IAM strategies with regulatory requirements. Collaboration & Documentation: Partner with OT, cybersecurity, compliance, and risk teams to define policies and access controls. Develop IAM runbooks … Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and Access Manager (CIAM) Preferred Industry Experience: OT cybersecurity best practices Hybrid cloud identity management for Azure & AWS Please note - Candidate must have SC Clearance for this position. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TalentHawk
to IAM processes. Compliance & Security: Ensure IAM solutions adhere to CAF, eCAF, NIST, and other regulatory frameworks. Conduct access audits, identity risk assessments, and compliance reporting. Work closely with cybersecurity, risk, and compliance teams to align IAM strategies with regulatory requirements. Collaboration & Documentation: Partner with OT, cybersecurity, compliance, and risk teams to define policies and access controls. Develop IAM runbooks … Access Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified Identity and Access Manager (CIAM) Preferred Industry Experience: OT cybersecurity best practices Hybrid cloud identity management for Azure & AWS Please note - Candidate must have SC Clearance for this position. More ❯
Improvement & Innovation: Identify opportunities to enhance IAM strategies, streamline workflows, and implement automation to improve efficiency and security posture MINIMUM JOB REQUIREMENTS Education Bachelor's degree in information technology, Cybersecurity, Computer Science, or a related field (or equivalent work experience) Work Experience 5+ years of experience in IAM, with a focus on CyberArk PAM, Azure Entra, and PingFederate 3+ years … of experience in security, cloud environments, or IT infrastructure 2+ years of experience in a senior engineer role within IAM or Cybersecurity Knowledge/Skills/Abilities In-depth knowledge of IAM principles and best practices. Deep expertise in IAM platforms, particularly CyberArk PAM, Active Directory, Azure Entra, and PingFederate Strong understanding of identity security principles and hybrid based IAM … risks and recommend IAM solutions to improve enterprise security posture Knowledge of ITDR methodologies, threat detection, and response strategies PREFERRED JOB REQUIREMENTS Education Bachelor's degree in information technology, Cybersecurity, Computer Science, or a related field Certification/Licensure Additional certifications such as CISSP, CCSP, or Azure Solutions Architect Expert Work Experience 5+ years of experience in IAM with increasing More ❯
will have the opportunity to shape everything from our technical architecture and services to our company culture, while working on innovative detection engineering challenges. Core Requirements 5+ years in cybersecurity, 3+ years focusedon detection engineering Proven ability to operationalise threat intelligence into actionable, high-fidelity detections Demonstratable experience with detection-as-code using multiple detection languages - Sigma, YAML, SPL, KQL More ❯
About Bridewell One of the most exciting prospects in the UK cybersecurity sector today, Bridewell is a leading cybersecurity services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential services and provide end-to-end cybersecurity capabilities that help More ❯
Act as the first point of contact for technical queries across the business. Compliance & Risk Management Ensure adherence to IT compliance standards and conduct regular audits. Identify and mitigate cybersecurity threats and vulnerabilities. Access Control Manage access control policies and permissions to safeguard sensitive data. Additional Duties Support users with software and hardware issues as needed. Assist with wider IT … initiatives to support business goals. Key Skills and Qualifications Strong knowledge of Microsoft 365 administration and SharePoint development Experience with Azure Active Directory (AD) and Power Platform Familiarity with cybersecurity principles and training Skilled in device management (Intune or equivalent) Excellent troubleshooting skills for software, hardware, and network systems Experience in project management and network diagnostics Understanding of AI-driven More ❯
Brook Road Industrial Estate, Rayleigh, Essex, England, United Kingdom
A1 Personnel Employment Agency Ltd
Act as the first point of contact for technical queries across the business. Compliance & Risk Management Ensure adherence to IT compliance standards and conduct regular audits. Identify and mitigate cybersecurity threats and vulnerabilities. Access Control Manage access control policies and permissions to safeguard sensitive data. Additional Duties Support users with software and hardware issues as needed. Assist with wider IT … initiatives to support business goals. Key Skills and Qualifications Strong knowledge of Microsoft 365 administration and SharePoint development Experience with Azure Active Directory (AD) and Power Platform Familiarity with cybersecurity principles and training Skilled in device management (Intune or equivalent) Excellent troubleshooting skills for software, hardware, and network systems Experience in project management and network diagnostics Understanding of AI-driven More ❯
Westbrook, Warrington, Cheshire, England, United Kingdom
Inspired Search Ltd
s degree in Computer Science, IT, or related field (or equivalent experience). AWS Certifications (Solutions Architect, SysOps Administrator, Security Specialty – desirable). ITIL Foundation certification – desirable. Knowledge of CyberSecurity solutions and standards (Cyber Essentials+, ISO27001). Working Relationships Internal: IT Support Team Digital businesses (3 key entities) Infrastructure & Security Teams Business Communication & Messaging Teams Project Managers & Technical Leads More ❯
essential. Strong technical knowledge of Microsoft 365, Azure Active Directory, and Windows Server environments. Hands-on experience with Microsoft Endpoint Manager, Windows desktop support, and network administration. Understanding of cybersecurity standards and frameworks (e.g. Cyber Essentials, ISO27001). Excellent communication, problem-solving, and organisational skills. Strong understanding of IT governance, risk, and controls. Experience managing IT security and continuity More ❯
Ipswich, Suffolk, East Anglia, United Kingdom Hybrid / WFH Options
Reed Technology
essential. Strong technical knowledge of Microsoft 365, Azure Active Directory, and Windows Server environments. Hands-on experience with Microsoft Endpoint Manager, Windows desktop support, and network administration. Understanding of cybersecurity standards and frameworks (e.g. Cyber Essentials, ISO27001). Excellent communication, problem-solving, and organisational skills. Strong understanding of IT governance, risk, and controls. Experience managing IT security and continuity More ❯
Nashville, Tennessee, United States Hybrid / WFH Options
DCI Donor Services
infrastructure, and VoIP telephony systems. This role ensures seamless operation and optimal performance of all network components, including routers, switches, VPNs, and firewalls, while actively protecting the organization from cybersecurity threats. Additionally, the administrator will manage and support VoIP services, ensuring clear and reliable communication across the organization. A critical part of this role is identifying vulnerabilities, troubleshooting network and … manage network security controls, including firewalls, VPNs, and intrusion detection/prevention systems (IDS/IPS) Monitor network traffic for anomalies and respond to security incidents in coordination with cybersecurity teams. Enforce access controls, segmentation, and secure configurations to protect sensitive data and systems. Ensure compliance with organizational security policies, industry standards, and regulatory requirements. Conduct periodic security audits, vulnerability … assessments, and penetration tests, partnering with consultants/third parties where necessary Respond to and mitigate cybersecurity incidents in coordination with incident response protocols VoIP and Telephony Administration Administer and support VoIP systems, including call routing, voicemail, conferencing, and auto attendants. Configure and maintain Session Border Controllers (SBCs), SIP trunks, and telephony gateways. Monitor call quality and troubleshoot VoIP-related More ❯
implementing, and managing Microsoft Windows and Hyper-V environments, including Dell EMC SAN. MCSE and CCNA certified. Expert in IT security protocols, with a proven track record in deploying cybersecurity measures and maintaining robust network defence strategies. Strong understanding of IT security compliance, risk management, and adherence to global cybersecurity regulations. Proven project management experience, with the ability to lead More ❯
clusters. Active SC clearance or eligibility to obtain it. Strong problem-solving skills for health emergency contexts Desirable Skills & Experience: Experience with cloud-based HPC (e.g., Azure, AWS). Cybersecurity certification (e.g., CISSP). Background in public health or biosecurity. * Experience mentoring teams Next Steps: Send your most recent CV to: #HPCEngineer #HPC #HighPerformanceComputing #SecurityCleared More ❯
objectives, communicate IT strategies effectively, and manage vendor relationships. Projects : Oversee major IT initiatives, ensuring successful delivery through robust project management methodologies. Risk & Security : Implement IT risk management and cybersecurity strategies to safeguard assets, data, and operations. About You We are looking for a dynamic leader with the ability to balance big-picture strategy with hands-on execution. Essential skills … and non-technical stakeholders. Strong leadership, motivational, and problem-solving abilities. Useful additional expertise (advantageous): Experience with SAN servers, SQL, Microsoft Teams, SCCM/SCOM, RMM/MDM tools. Cybersecurity certifications and knowledge (CE+, ISO 27001, etc.). Advanced networking expertise (QoS, VLANs, MPLS, wireless AP configuration). Previous security clearance. What we offer in return Competitive salary package Car More ❯
objectives, communicate IT strategies effectively, and manage vendor relationships. Projects: Oversee major IT initiatives, ensuring successful delivery through robust project management methodologies. Risk & Security: Implement IT risk management and cybersecurity strategies to safeguard assets, data, and operations. About You We are looking for a dynamic leader with the ability to balance big-picture strategy with hands-on execution. Essential skills … technical and non-technical stakeholders. Strong leadership, motivational, and problem-solving abilities.Useful additional expertise (advantageous): Experience with SAN servers, SQL, Microsoft Teams, SCCM/SCOM, RMM/MDM tools. Cybersecurity certifications and knowledge (CE+, ISO 27001, etc.). Advanced networking expertise (QoS, VLANs, MPLS, wireless AP configuration). Previous security clearance. What we offer in return Competitive salary package Car More ❯
formal threat-sharing, analysis, and analytical reporting for its members. This is a diverse, global team in a fast-paced environment. Senior IAs deliver insight and greater understanding of cybersecurity, geopolitical, socio-economic, and cyber-enabled threats faced by the global financial system. Senior IAs must understand and communicate effectively about threat actors' capabilities, intent, and drivers, connecting these insights … environment able to collaborate effectively across time zones (EMEA, Americas, APAC). KEY QUALIFICATIONS Intelligence Analysis Skills - 7 to 10 years of intelligence analysis experience with an understanding of cybersecurity, geopolitical, and economic triggers that influence the threat landscape. Analytical Writing Proficiency - Skilled in producing clear, well-structured analytical and impactful reports with a strong understanding of core intelligence principles … intelligence products for member reporting. EDUCATION AND EXPERIENCE Bachelor's degree or equivalent practical experience. 7 years of relevant analytical experience is required. 3-5 years of experience in cybersecurity with a focus on strategic analysis is preferred. Knowledge of network intrusion, malware, and vulnerabilities, as well as cybercrime, economic crime, or anti-money laundering threat trends, is an asset. More ❯
technology estate (Azure & AWS) across Windows and Linux, where performance, scalability, and resilience are critical. You’ll work closely with an Infrastructure Team Lead and senior leadership, contributing to cybersecurity posture and disaster-recovery programs while improving DevOps practices. This is an opportunity to work across a wide range of technologies, contribute to strategic projects, and make an immediate impact More ❯
technology estate (Azure & AWS) across Windows and Linux, where performance, scalability, and resilience are critical. You’ll work closely with an Infrastructure Team Lead and senior leadership, contributing to cybersecurity posture and disaster-recovery programs while improving DevOps practices. This is an opportunity to work across a wide range of technologies, contribute to strategic projects, and make an immediate impact More ❯
technology estate (Azure & AWS) across Windows and Linux, where performance, scalability, and resilience are critical. You’ll work closely with an Infrastructure Team Lead and senior leadership, contributing to cybersecurity posture and disaster-recovery programs while improving DevOps practices. This is an opportunity to work across a wide range of technologies, contribute to strategic projects, and make an immediate impact More ❯
london (city of london), south east england, united kingdom
Mondrian Alpha
technology estate (Azure & AWS) across Windows and Linux, where performance, scalability, and resilience are critical. You’ll work closely with an Infrastructure Team Lead and senior leadership, contributing to cybersecurity posture and disaster-recovery programs while improving DevOps practices. This is an opportunity to work across a wide range of technologies, contribute to strategic projects, and make an immediate impact More ❯
technology estate (Azure & AWS) across Windows and Linux, where performance, scalability, and resilience are critical. You’ll work closely with an Infrastructure Team Lead and senior leadership, contributing to cybersecurity posture and disaster-recovery programs while improving DevOps practices. This is an opportunity to work across a wide range of technologies, contribute to strategic projects, and make an immediate impact More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
TXP Technology x People
delivering complex tech projects to external clients, ideally in Pensions or Financial Services. Expertise in at least two of the following: Cloud (Azure/AWS), Application Development, Data & AI, CyberSecurity, or Legacy Modernisation. Deep understanding of Agile methodologies (Scrum, Kanban, SAFe). Strong financial acumen and ability to manage budgets and profitability. Excellent communication, negotiation, and leadership skills. Confidence More ❯
the go-to escalation point for critical issues, offering hands-on support and troubleshooting expertise. Project Support: Contribute to project feasibility and planning, translating business needs into technical solutions. Cybersecurity & Compliance: Lead the development of robust security practices and ensure alignment with regulatory frameworks (e.g., GDPR, HIPAA, ISO 27001). Continuous Improvement: Drive system enhancements, automation opportunities, and cross-team … workplace technologies. Familiarity with ERP systems (e.g., SAP) and system integrations. Scripting/automation skills (e.g., PowerShell, Python) and experience with version control (e.g., Git). Solid understanding of cybersecurity and data protection standards. Excellent communication and influencing skills-able to bridge technical and non-technical audiences. Strategic mindset with a practical, hands-on approach. Why Join Us? You'll More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯
such as Risk Control and Self Assessments (RCSAs), Process Level Assessments (PLA), Exceptions, Applications, Targeted Risk Assessments and recommend on risk mitigation activities. Influence leaders within Enterprise Data, Compliance, CyberSecurity, second line risk organizations, and Internal Audit on key technology risks and actions needed Conduct periodic risk reviews with the executives and support reporting for risk metrics Develop risk More ❯