and resilient network architectures across the enterprise. The ideal candidate will possess deep knowledge of : - Traditional network infrastructure – LAN; WAN; WIFI etc - Cybersecurity including ZeroTrust Architecture - Cloud Security Architecture - Be capable of aligning security controls with business objectives and compliance requirements. Key Responsibilities: Lead the design and … practices (e.g., NIST, ISO 27001, CIS). Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), network segmentation, and zerotrust network access (ZTNA). Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications. Lead architectural reviews … Security Architect or in a senior network security engineering role. Experience with Cisco LAN; WAN technologies Experience with Zscaler or equivalent to drive toward ZeroTrust In-depth knowledge of network protocols, routing, switching, DNS, DHCP, and encryption standards. Strong hands-on experience with network security solutions such More ❯
and resilient network architectures across the enterprise. The ideal candidate will possess deep knowledge of : - Traditional network infrastructure – LAN; WAN; WIFI etc - Cybersecurity including ZeroTrust Architecture - Cloud Security Architecture - Be capable of aligning security controls with business objectives and compliance requirements. Key Responsibilities: Lead the design and … practices (e.g., NIST, ISO 27001, CIS). Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), network segmentation, and zerotrust network access (ZTNA). Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications. Lead architectural reviews … Security Architect or in a senior network security engineering role. Experience with Cisco LAN; WAN technologies Experience with Zscaler or equivalent to drive toward ZeroTrust In-depth knowledge of network protocols, routing, switching, DNS, DHCP, and encryption standards. Strong hands-on experience with network security solutions such More ❯
and resilient network architectures across the enterprise. The ideal candidate will possess deep knowledge of : - Traditional network infrastructure – LAN; WAN; WIFI etc - Cybersecurity including ZeroTrust Architecture - Cloud Security Architecture - Be capable of aligning security controls with business objectives and compliance requirements. Key Responsibilities: Lead the design and … practices (e.g., NIST, ISO 27001, CIS). Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), network segmentation, and zerotrust network access (ZTNA). Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications. Lead architectural reviews … Security Architect or in a senior network security engineering role. Experience with Cisco LAN; WAN technologies Experience with Zscaler or equivalent to drive toward ZeroTrust In-depth knowledge of network protocols, routing, switching, DNS, DHCP, and encryption standards. Strong hands-on experience with network security solutions such More ❯
environments, including Exchange Online, SharePoint Online, OneDrive, Teams, and Microsoft Entra ID. Develop and maintain the enterprise security architecture strategy for M365, aligned with ZeroTrust principles and business requirements. Architect and implement security controls and frameworks using Microsoft security technologies such as Microsoft Defender XDR, Microsoft Purview … in Microsoft security technologies including Defender for Office 365, Microsoft Purview, Entra ID (formerly Azure AD), and Intune. Strong knowledge of security frameworks (e.g., ZeroTrust, NIST, ISO 27001, CIS), regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC More ❯
environments, including Exchange Online, SharePoint Online, OneDrive, Teams, and Microsoft Entra ID. Develop and maintain the enterprise security architecture strategy for M365, aligned with ZeroTrust principles and business requirements. Architect and implement security controls and frameworks using Microsoft security technologies such as Microsoft Defender XDR, Microsoft Purview … in Microsoft security technologies including Defender for Office 365, Microsoft Purview, Entra ID (formerly Azure AD), and Intune. Strong knowledge of security frameworks (e.g., ZeroTrust, NIST, ISO 27001, CIS), regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC More ❯
environments, including Exchange Online, SharePoint Online, OneDrive, Teams, and Microsoft Entra ID. Develop and maintain the enterprise security architecture strategy for M365, aligned with ZeroTrust principles and business requirements. Architect and implement security controls and frameworks using Microsoft security technologies such as Microsoft Defender XDR, Microsoft Purview … in Microsoft security technologies including Defender for Office 365, Microsoft Purview, Entra ID (formerly Azure AD), and Intune. Strong knowledge of security frameworks (e.g., ZeroTrust, NIST, ISO 27001, CIS), regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC More ❯
technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zerotrust architecture. Conduct risk assessments, gap analysis, and security impact analysis for M365 deployments and integrations. Collaborate with security operations and compliance teams More ❯
technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zerotrust architecture. Conduct risk assessments, gap analysis, and security impact analysis for M365 deployments and integrations. Collaborate with security operations and compliance teams More ❯
technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zerotrust architecture. Conduct risk assessments, gap analysis, and security impact analysis for M365 deployments and integrations. Collaborate with security operations and compliance teams More ❯
administer Microsoft Privileged Identity Management (PIM) solutions. Provide security leadership in areas of identity and access management, conditional access policies, and the implementation of ZeroTrust principles. Conduct security risk assessments, identify control gaps, and perform impact analyses on M365 deployments and integrations. Collaborate with security operations and More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zerotrust architecture. Conduct risk assessments, gap analysis, and security impact analysis for M365 deployments and integrations. Collaborate with security operations and compliance teams More ❯
pipelines to support automated cloud product lifecycles Understanding of cloud-based connectivity patterns Experience with SD-WAN technologies, such as Cisco Meraki Familiarity with zerotrust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across More ❯
pipelines to support automated cloud product lifecycles Understanding of cloud-based connectivity patterns Experience with SD-WAN technologies, such as Cisco Meraki Familiarity with zerotrust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across More ❯
pipelines to support automated cloud product lifecycles Understanding of cloud-based connectivity patterns Experience with SD-WAN technologies, such as Cisco Meraki Familiarity with zerotrust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across More ❯
pipelines to support automated cloud product lifecycles Understanding of cloud-based connectivity patterns Experience with SD-WAN technologies, such as Cisco Meraki Familiarity with zerotrust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across More ❯