the nature of our, work successful candidates for this role will be required to go through Government SC clearance prior to starting with us. https://www.gov.uk/guidance/security-vetting-and-clearance Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and More ❯
Guildford, Surrey, South East Hybrid / WFH Options
BAE Systems
the nature of our, work successful candidates for this role will be required to go through Government SC clearance prior to starting with us. https://www.gov.uk/guidance/security-vetting-and-clearance What are the next steps? CV Submission & Review Digital Assessment Live Interview Why BAE Systems More ❯
this. We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA For more information please visit our website: https://www.baesystems.com/en/cybersecurity/national-security Help us secure a connected world. Apply now and be inspired. Life at BAE Systems More ❯
sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication, including the ability to implement data links between internal and external LDAPS, JDBC, SOAP, HTTPS and other data sources Experience in implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in More ❯
integration with threat sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication. Implementing PingIDM data links between PingDS and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Designing and implementing PingDS schemas with custom managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering More ❯
integration with threat sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication. Implementing PingIDM data links between PingDS and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Designing and implementing PingDS schemas with custom managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
integration with threat sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication. Implementing PingIDM data links between PingDS and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Designing and implementing PingDS schemas with custom managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering More ❯
growing UK technology company. We work in partnership with UK government customers and commercial providers to deliver research, technology, products and services in the secure communications sector. We provide a stimulating working environment, with opportunities to be involved in a variety of projects and services that aim to deliver and … continually evolve secure mobile services for our customers. About the role As a Service Operations Engineer at Amiosec, you will monitor production infrastructure for faults and issues, including creation and management of security-based alerts, day to day management, etc. Working hours are Monday – Friday, 7.5 hours per day on … NTP, DHCP, ISO model, TCP/IP, TLS, OpenSSL. Basic to intermediate level of scripting skills e.g. Python, Bash Basic understanding of HTTP/HTTPS Webservers and knowledge of SQL Databases. Physical server hardware support e.g. disk, memory replacement, iDrac or iLo. Experience with or knowledge of Security Monitoring tools More ❯
Deployment (CI/CD) pipelines using Azure DevOps, Jenkins, or similar tools. Knowledge of directory services, LDAP, and databases. Familiarity with web protocols (HTTP, HTTPS, REST, SOAP) and security standards (OAuth, SAML, JWT). Soft Skills: Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to work … Experience with monitoring and logging tools like Azure Monitor, Log Analytics, and Application Insights for performance and reliability management. Familiarity with web protocols (HTTP, HTTPS, REST, SOAP) and security standards (OAuth, SAML, JWT). If you're interested please get in touch ASAP More ❯
qualifications, capabilities and skills: 7+ years of hands-on experience in installation, migration and decommission suite of Broadcom (erstwhile Bluecoat) devices including Proxy SG, Secure Web Gateway (ISG), Symantec Content Analysis Systems (CAS), SSL Visibility appliances and Symantec Management Center (SMC). Experience with other SaaS based Secure Gateway vendor … Ability to build, test and deploy proxy-based security solutions. Good understanding of network infrastructure, network security concepts and application layer protocols (http/https) and vulnerability mitigation. Good understanding of REST API and container-based deployment models. Understanding of version and revision control practices and procedures. Proficient in use More ❯
language (Python, Java, Scala, Clojure, etc.). In-depth understanding of data structures and algorithmic designs. Knowledge of computer networking concepts (TCP/IP, HTTPS, DNS, etc.). Understanding of software development methodologies (e.g., Agile, Waterfall). Familiarity with Git-based version control systems (e.g., GitHub, GitLab). Basic knowledge … Flexible Downtime: Generous time off helps keep you energized. Continuous Learning: Access a wealth of resources to grow your career. Invest in Your Future: Secure your financial future through competitive pay and retirement planning. Family Friendly Perks: Benefits for your partners and children. Beyond the Basics: Small perks can make More ❯
Role: Java API Developer Location: Northampton Duration: 6 Months Day rate: £368 inside IR35 Role Description: Design, develop, and maintain robust and scalable Java-based applications. Collaborate with cross-functional teams to define, design, and ship new features. Implement and More ❯
specializing in ForgeRock and PingOne Identity Cloud solutions. The ideal candidate will possess deep technical expertise, strong leadership capabilities, and a passion for delivering secure and scalable identity solutions. Key Responsibilities: Lead the design, setup, configuration, and deployment of PingOne Identity Cloud environments. Implement and manage ForgeRock solutions including OpenAM … Python, or JavaScript to extend and automate IAM functionalities. Manage and maintain directory services (LDAP) and database integrations. Ensure compliance with web protocols (HTTP, HTTPS, REST, SOAP) and security standards (OAuth, SAML, JWT). Provide technical leadership, mentorship, and support to team members. Required Skills and Qualifications: 15+ years of More ❯
london, south east england, United Kingdom Hybrid / WFH Options
KBC Technologies Group
specializing in ForgeRock and PingOne Identity Cloud solutions. The ideal candidate will possess deep technical expertise, strong leadership capabilities, and a passion for delivering secure and scalable identity solutions. Key Responsibilities: Lead the design, setup, configuration, and deployment of PingOne Identity Cloud environments. Implement and manage ForgeRock solutions including OpenAM … Python, or JavaScript to extend and automate IAM functionalities. Manage and maintain directory services (LDAP) and database integrations. Ensure compliance with web protocols (HTTP, HTTPS, REST, SOAP) and security standards (OAuth, SAML, JWT). Provide technical leadership, mentorship, and support to team members. Required Skills and Qualifications: 15+ years of More ❯
not essential. Essential: Experience in software development in Python Essential: Experience with at least one ML framework: TensorFlow, Pytorch. Ability to work in a secure environment is essential. Desirable: Experience with one or more graph machine learning packages (PyTorch-Geometric, PyKeen etc.) and knowledge graph toolkits (Neo4j) Security Clearance Only … the nature of our work successful candidates for this role will be required to go through Government SC clearance prior to starting with us. https://www.gov.uk/guidance/security-vetting-and-clearance Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and More ❯
We help companies stay secure while moving fast. Built by engineers for engineers, The Teleport Access Platform delivers on-demand, least privileged access to infrastructure based on cryptographic identity and zero trust, with built-in identity security and policy governance, making the happy path for engineers the secure path. Teleport … much complexity, too many network boundaries, and too little trust. Complexity slows engineers down and leads to human errors. Complex systems can't be secure despite the red tape of bureaucracy. We make trusted computing simple. This gives engineers the freedom to move and build a better future. Why Teleport … be joining the engineering team of Teleport, unified access plane for SSH, Kubernetes and Database infrastructure. Nasdaq, SumoLogic and Samsung Electronics trust Teleport to secure access to their infrastructure. Teleport is an open source project, written in Golang with web-based UIs in JavaScript with React. This is a hybrid More ❯
The IPO is a modern organisation which depends on its IT services to operate and innovate effectively. To provide up to date services to our customers systems need to be developed, improved, and maintained. This position plays a pivotal role More ❯
Defra, the UK government department, is responsible for safeguarding the natural environment, supporting the food and farming industry, and sustaining a thriving rural economy. The department's broad remit impacts daily life, from the food we eat to the air More ❯
Discover a career in your hands at HMRC. Whether you're seeking purpose, growth, or a workplace that gives you a true sense of belonging, hear from some of our employees as they share their story about what it's More ❯
PingAM custom authentication trees. This includes integration with risk engines and behavioral biometrics (e.g., ThreatMetrix, BioCatch), implementing adaptive and step-up authentication, and establishing secure data connections using LDAPS, JDBC, SOAP, HTTPS, and other protocols. Desirable Skills: Previous success in configuring PingGateway single sign-on routes, dynamic proxies, and filters More ❯
PingAM custom authentication trees. This includes integration with risk engines and behavioral biometrics (e.g., ThreatMetrix, BioCatch), implementing adaptive and step-up authentication, and establishing secure data connections using LDAPS, JDBC, SOAP, HTTPS, and other protocols. Desirable Skills: Previous success in configuring PingGateway single sign-on routes, dynamic proxies, and filters More ❯
PingAM custom authentication trees. This includes integration with risk engines and behavioral biometrics (e.g., ThreatMetrix, BioCatch), implementing adaptive and step-up authentication, and establishing secure data connections using LDAPS, JDBC, SOAP, HTTPS, and other protocols. Desirable Skills: Previous success in configuring PingGateway single sign-on routes, dynamic proxies, and filters More ❯
PingAM custom authentication trees. This includes integration with risk engines and behavioral biometrics (e.g., ThreatMetrix, BioCatch), implementing adaptive and step-up authentication, and establishing secure data connections using LDAPS, JDBC, SOAP, HTTPS, and other protocols. Desirable Skills: Previous success in configuring PingGateway single sign-on routes, dynamic proxies, and filters More ❯
sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication, including the ability to implement data links between internal and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Some other highly desirable skills include: Experience in implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing … technology trends and innovations and actively contribute to the organization's technology communities to foster a culture of technical excellence and growth. Adherence to secure coding practices to mitigate vulnerabilities, protect sensitive data, and ensure secure software solutions. Implementation of effective unit testing practices to ensure proper code design, readability More ❯
sensors (ThreatMetrix, BioCatch, etc.), adaptive authentication and step-up authentication, including the ability to implement data links between internal and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Some other highly desirable skills include: Experience in implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing … technology trends and innovations and actively contribute to the organization's technology communities to foster a culture of technical excellence and growth. Adherence to secure coding practices to mitigate vulnerabilities, protect sensitive data, and ensure secure software solutions. Implementation of effective unit testing practices to ensure proper code design, readability More ❯