Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Essential Employment
Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit More ❯
meeting room setups, endpoint management for desktops, laptops, mobile devices and tablets, as well as network issues. They also handle printing support for MFD Uniflow systems, possess expertise in Azure and Entra environments, administer multi-factor authentication, and are proficient in Windows 11 and Microsoft 365. Adecco acts as an employment agency for permanent recruitment and an employment business More ❯
compliance. Technical Review and Oversight Lead or oversee reviews of system architectures, applications, cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM/PAM implementations and M365/Azure/Active Directory configurations. Conduct or oversee penetration testing, vulnerability assessments, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and More ❯
external; ability to apply this knowledge appropriately to diverse situations. Demonstrable knowledge of the tools and techniques used for securing cloud and infrastructure environments in complex hybrid environments using Azure and AWS. Skills and Experience Essential Proven knowledge of the processes, tools and techniques of information security management, ability to deploy and monitor information security systems, as well as More ❯