architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
OT/ICS Systems Security: Proven experience in securing Operational Technology and Industrial Control Systems (e.g., SCADA, HMI, PLC). IdentityandAccessManagement: In-depth knowledge of identityandaccess management. Threat Mitigation: Familiar with common cybersecurity threats andmore »