Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Stott and May
monitoring systems. Skills, Knowledge & Experience Strong experience with Microsoft Azure PaaS solutions. Expertise in CCaaS and MS Dynamics 365 . Proven capability in Azure infrastructure engineering , including authentication methods (SAML/OIDC), compute and network design. Experience integrating Azure and AWS tenants. Demonstrated leadership skills on previous engagements. (Desirable) Knowledge of architecture and technologies in the aviation domain. Person Specification More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. custodian. Understanding of purpose and effectiveness of penetration tests or IT Health Checks. Communication and More ❯
huntingdonshire, east anglia, united kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. custodian. Understanding of purpose and effectiveness of penetration tests or IT Health Checks. Communication and More ❯
cambridge, east anglia, united kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
firewalls, mail gateways, load balancers, antivirus, IPS, IDS, Diodes) Understanding of Protective Monitoring systems (SIEM/SOC) and the principles of their deployment. Understanding of authentication and authorisation technologies (SAML, LDAP, PKI, etc) Understanding of encryption and protocols and structures in support of deployment, e.g. custodian. Understanding of purpose and effectiveness of penetration tests or IT Health Checks. Communication and More ❯