on and implement appropriate security controls in line with design specifications. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO …/access principles. Experience defining security configurations and collaborating with engineers to apply them consistently across the entire IT estate. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
, patching, and device lifecycle strategies. 3. Security & Compliance Configure and manage security features like DLP, Safe Links, and Defender for Office 365. Enforce Zero Trust principles and privileged access management. 4. Administer email protection … systems (e.g., Proofpoint) and ensure compliance with DKIM, SPF, DMARC. 5. Automation & Optimization Automate onboarding/offboarding workflows using PowerShell and Azure Automation. 6. Optimize identityandaccessmanagement via Entra ID (Azure AD), Conditional Access, and SSO. 7. Support & Troubleshooting Provide Tier III support and act as escalation point for complex More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
bristol, south west england, united kingdom Hybrid/Remote Options
Europa Worldwide Group
for your convenience. Generous Time Off: Benefit from 25 days of annual leave. Enhanced Family Leave: Benefit from enhanced maternity, paternity, and adoption pay. Benefits portal: where you access a wide range of exclusive discounts, company benefits, wellbeing resources and much more. Wellbeing Focus: Access our employee wellbeing programme for your overall health and happiness. Referral … both on-prem and cloud environments (cloud being a key area of focus) Implementing, configuring, and regularly updating a wide range of security toolsets including EDR, SIEM, vulnerability management, IAM, and cloud security solutions Collaborating closely with IT, Development, and third-party teams to embed security into all aspects of our operations Conducting regular risk assessments, vulnerability scans … complex technical issues to both technical and non-technical audiences Hands-on experience configuring and managing tools in the cloud security space Experience working with IdentityandAccessManagement (IAM) solutions, including previous configuration work Proficiency in the day-to-day managementand monitoring of Endpoint Detection and Response (EDR) tooling Experience More ❯
Operations/Application Services Purpose of the Role : To ensure the reliable operation, maintenance, and upgrade of Windows-based COTS software, as well as to manage integrations with identity/authentication systems (e.g. Okta), IIS web servers, and supporting scripting to automate, monitor, and troubleshoot these systems. You will work as part of our Application Support/Platform … standards. Key Responsibilities: Support, maintain, and upgrade Windows-hosted COTS applications in production, UAT, development environments; coordinate patching, version upgrades, vendor interactions. Manage integrations with identityandaccessmanagement platforms (Okta or similar), including Single Sign-On (SSO), user provisioning, attribute mapping, and ensuring secure authentication flows. Operate and maintain IIS web servers (configuration … . Troubleshoot application issues, including performance, integrations (authentication/authorization), availability, and errors; work across teams (infrastructure, security, development, and vendor) to isolate root cause. Assist with release management: reviewing upgrades/patches, scripting or deploying changes, ensuring robust rollback options, coordinating with QA/UAT. Maintain thorough technical documentation including runbooks, change plans, operational procedures, escalation protocols. More ❯
Operations/Application Services Purpose of the Role : To ensure the reliable operation, maintenance, and upgrade of Windows-based COTS software, as well as to manage integrations with identity/authentication systems (e.g. Okta), IIS web servers, and supporting scripting to automate, monitor, and troubleshoot these systems. You will work as part of our Application Support/Platform … standards. Key Responsibilities: Support, maintain, and upgrade Windows-hosted COTS applications in production, UAT, development environments; coordinate patching, version upgrades, vendor interactions. Manage integrations with identityandaccessmanagement platforms (Okta or similar), including Single Sign-On (SSO), user provisioning, attribute mapping, and ensuring secure authentication flows. Operate and maintain IIS web servers (configuration … . Troubleshoot application issues, including performance, integrations (authentication/authorization), availability, and errors; work across teams (infrastructure, security, development, and vendor) to isolate root cause. Assist with release management: reviewing upgrades/patches, scripting or deploying changes, ensuring robust rollback options, coordinating with QA/UAT. Maintain thorough technical documentation including runbooks, change plans, operational procedures, escalation protocols. More ❯
variety of cloud security implementations. Initially the role will be focussed on IAM/IDAM project work. You'll need previous, specific experience working with IdentityandAccessManagement or related projects (IDAM, PAM etc), as well as broader experience across the security landscape: particular experience in cloud security would be highly advantageous. You More ❯
South East London, London, United Kingdom Hybrid/Remote Options
Anson Mccade
secure SDLC, API security and DevSecOps practices Conduct security risk assessments, architecture reviews and produce high-level and low-level security designs Advise engineering and product teams on identity, encryption, zero trust, network security and data protection approaches Work alongside client CISOs, architects and delivery teams, providing strategic security guidance Support bid work, proposals and shaping of security … Azure or GCP security architecture (certifications desirable) Hands-on experience embedding security into application design, APIs, CI/CD pipelines and DevOps workflows Knowledge of identityandaccessmanagement (OAuth2.0, OpenID Connect, SSO), encryption, container security (Docker, Kubernetes) and zero trust principles Strong stakeholder engagement skills able to influence technical and non-technical audiences More ❯
proposed solutions. Understand client requirements deeply and translate them into effective and innovative cloud solutions that address their specific needs within the defenceand national security context. Collaboration and Stakeholder Management Work closely with engineering, security, operations, and business development teams to ensure architectural alignment and successful execution of projects. Effectively communicate architectural decisions, strategies, and roadmaps to both … . Extensive experience with secure cloud architecture patterns, infrastructure-as-code (IaC), containerisation, and DevSecOpspractices. Strong understanding of networking principles, security protocols, encryption technologies, andidentityandaccessmanagement in cloud environments. Excellent understanding of software development lifecycles and agile methodologies. Soft Skills Exceptional leadership, communication (written and verbal), and presentation skills. Strong strategic More ❯
eligible for UK Security Clearance (e.g., lived in the UK for the past 5 years with no significant travel or criminal record). Bonus Skills Identityandaccessmanagement (IAM) experience Exposure to governance, risk, compliance, and operational security Penetration testing certifications (e.g., OSCP, CREST, TIGER) Active contributor to knowledge-sharing communities Get in More ❯
Duties: Manage incoming security requests and operational tickets, ensuring timely and effective resolution Execute day-to-day security tasks such as permission management, firewall rule updates, andaccess provisioning and deprovisioning Collaborate with internal teams to support identityandaccessmanagementand ensure adherence to security policies Maintain and improve More ❯
Duties: Manage incoming security requests and operational tickets, ensuring timely and effective resolution Execute day-to-day security tasks such as permission management, firewall rule updates, andaccess provisioning and deprovisioning Collaborate with internal teams to support identityandaccessmanagementand ensure adherence to security policies Maintain and improve More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. IdentityandAccessManagement (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
Guildford, England, United Kingdom Hybrid/Remote Options
Hawksworth
3rd parties to make surethey are fully operational/implemented and effective. This will include accountability for all Information Security risks and control owned by IT. Regulator reporting, Management of outsourced partners and their adherence to the control framework, Engages in projects, ensure overall compliance etc. About you. One or more of CISA, CISSP or CRISC Good working … tools and scripting languages (e.g., PowerShell, Python) for configuration and compliance checks. Knowledge of patch and vulnerability management tools and practices. Understanding of identityandaccessmanagement (IAM) principles and technologies. If you are ready for the next challenge and you have the above skills and experience and are able to work More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential.With over 25 years of experience and trusted by more than 350 institutions … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential. With over 25 years of experience and trusted by more than … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
knowledge of Microsoft technologies such as Windows Server and Microsoft Azure. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance … and controls in infrastructure delivery. Experience implementing monitoring, logging, and alerting toolsets. Understanding of data classification, encryption standards (e.g. at rest and in transit), and secure storage/access principles. ITIL Foundation Certificate Please send CV for full job description and an informal chat. Excellent opportunity to join a high-profile market leader More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Albany Beck
Infrastructure & Security Solutions Architect Location: London (Hybrid) About Albany Beck Albany Beck are a Management Consultancy focused on providing specialist talent and transformative solutions to Financial Services clients. We combine subject matter expertise with innovative delivery models that help clients scale efficiently, while offering meaningful, long-term career opportunities to our people. At Albany Beck, you’ll be … AWS) and on-premise hybrid infrastructure environments. Strong understanding of security frameworks (e.g. NIST, ISO 27001, CIS) and architectural best practices. Experience with network design, identityandaccessmanagement, endpoint protection, and cloud security controls. Strong stakeholder engagement and communication skills, with the ability to translate complex technical topics into actionable insights. More ❯