Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk assessments, gap analysis, and security impactanalysis for M365 deployments and integrations. Collaborate with security operations and compliance teams to monitor, investigate, and remediate threats More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
of security architecture to support datacentre decommissioning and workload migration (e.g., to cloud, colocation, or hybrid environments) Conduct risk assessments, threat modelling, and security impactanalysis for migrated applications, data, and infrastructure Define and implement security controls to protect data in transit and at rest throughout the transition More ❯
bedford, east anglia, united kingdom Hybrid / WFH Options
Advanced Resource Managers
of security architecture to support datacentre decommissioning and workload migration (e.g., to cloud, colocation, or hybrid environments) Conduct risk assessments, threat modelling, and security impactanalysis for migrated applications, data, and infrastructure Define and implement security controls to protect data in transit and at rest throughout the transition More ❯
luton, bedfordshire, east anglia, united kingdom Hybrid / WFH Options
Advanced Resource Managers
of security architecture to support datacentre decommissioning and workload migration (e.g., to cloud, colocation, or hybrid environments) Conduct risk assessments, threat modelling, and security impactanalysis for migrated applications, data, and infrastructure Define and implement security controls to protect data in transit and at rest throughout the transition More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
of security architecture to support datacentre decommissioning and workload migration (e.g., to cloud, colocation, or hybrid environments) Conduct risk assessments, threat modelling, and security impactanalysis for migrated applications, data, and infrastructure Define and implement security controls to protect data in transit and at rest throughout the transition More ❯