|
4 of 4 Secrets Management Jobs in East Yorkshire
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom The Citation Group
scalable and maintainable infrastructure that supports software delivery pipelines and application requirements while establishing and following DevOps best practices within the organisation. AWS Service Management : Deploy and manage core AWS services including EC2, S3, VPC, and ECS to support application deployment and operations. CI/CD Pipeline Development : Build … and delivery. Container Orchestration : Work with Docker containers and manage deployments on Amazon ECS, implementing auto-scaling and load balancing solutions. Security and Access Management : Implement AWS security best practices, including IAM permissions, AWS Organizations, Secrets Manager for credentials, and security groups to ensure secure cloud resources. Cloudflare … Integration : Configure and maintain Cloudflare services for DNS management, CDN, and DDoS protection to enhance security and performance. Monitoring and Optimization : Implement monitoring solutions using AWS CloudWatch and related tools to ensure system health and performance while optimizing resource utilization. Documentation and Knowledge Sharing : Create and maintain documentation for More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom LHH
NiFi , Elastic ECK , and JFrog Artifactory . Develop and manage Helm Charts to standardise application deployment. Integrate with and manage HashiCorp Vault for secure secrets management and token-based authentication within pipeline workflows. Build and consume REST APIs to support automation and platform integration. Apply Infrastructure as Code … Automation: Proven experience with GitLab CI , Terraform , Ansible , Python , PowerShell , and REST API development/integration. Experience creating reusable automation scripts and maintaining configuration management best practices. Platform & Containerisation: Strong understanding of Kubernetes design, configuration, and operations in production environments. Experience managing applications with Helm Charts and supporting microservices … based architecture. Applications & Services: Direct experience deploying and supporting Apache NiFi , Elastic ECK (ElasticSearch on Kubernetes) , and Artifactory . Familiarity with container image management and application lifecycle support. Security & Infrastructure: Use of HashiCorp Vault for managing secrets, certificates, and access tokens. Solid working knowledge of Red Hat Enterprise More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom Signify Technology
infrastructure supports business goals Improve observability, incident response, and system reliability Help shape our cloud strategy, ideally with experience in AWS account and resource management Requirements: 5+ years of experience as a software engineer with a focus on infrastructure or DevOps Advanced skills in Python and experience writing production … projects from start to finish Solid understanding of cloud infrastructure, ideally with hands-on experience in AWS Strong knowledge of security best practices, including secrets management, access control, and compliance frameworks Comfortable working in a hybrid team environment (3 days a week onsite in London) Experience with Terraform More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur ( Secrets Management) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
|
|