Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
environments. Strong hands-on experience with Microsoft Azure services (e.g., Azure Virtual Network, Azure Kubernetes Service, Azure DevOps, Azure Monitor). Solid understanding of networking, identityandaccessmanagement (IAM), and security best practices in cloud environments. Experience in regulated industries, preferably financial services, with a strong grasp of compliance and governance requirements. Proficiency More ❯
skilled and experienced Google Cloud Technical Architecture Associate Manager to join the Google Cloud group within Accenture Technology in the UK. The group engineers and implements infrastructure, tools, access, and telemetry for systems that enable orchestration of Google-scale services. In this role, you will be responsible for leading the technical delivery of cloud solutions, primarily focused on … Code (Terraform), CI/CD pipelines, and scripting (Bash, Python, Perl, etc.) to automate routine tasks Strong understanding of cloud security best practices and tools (IdentityandAccessManagement, firewalls, encryption) Hands-on experience with networking across cloud and on-premise systems (TCP/IP, subnets, VPC, load balancing, DNS) Proven experience leading small … providing technical guidance and mentorship to junior team members Strong communication skills with the ability to articulate complex technical concepts to both internal and client technical, non-technical, andmanagement stakeholders Experience in site reliability engineering or IT production systems operations including troubleshooting and debugging live incidents Excellent problem-solving abilities with demonstrable examples of implementing technical innovation More ❯
models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, andaccess logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function on threat modelling, security reviews, and AI-specific control design. Enterprise Integration: Integrate with … enterprise IdentityandAccessManagement (IAM) systems, enforcing Role-Based Access Control (RBAC) and least privilege principles. Compliance Support: Conduct vulnerability scans, manage pen-test remediation, and assist in internal and regulatory audits (FCA, PRA). Required Knowledge & Experience: Proven experience delivering greenfield AI systems in production with secure-by-design architecture. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, andaccess logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function on threat modelling, security reviews, and AI-specific control design. Enterprise Integration: Integrate with … enterprise IdentityandAccessManagement (IAM) systems, enforcing Role-Based Access Control (RBAC) and least privilege principles. Compliance Support: Conduct vulnerability scans, manage pen-test remediation, and assist in internal and regulatory audits (FCA, PRA). Required Knowledge & Experience: Proven experience delivering greenfield AI systems in production with secure-by-design architecture. More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incident response and vulnerability management processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security … frameworks (e.g., NIST, CIS, ISO 27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identityandaccessmanagement, and network security. Excellent stakeholder engagement and documentation skills. If intrested please apply with the most up to date CV More ❯
Borehamwood, Hertfordshire, United Kingdom Hybrid / WFH Options
Interaction Recruitment
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO Our Team Together we engineer and build the infrastructure, tools, accessand telemetry for systems that enable orchestration of Google-scale services. Join us and help build what matters. We are seeking a Google Cloud Technical Architecture Manager to join … networking) to enable scalable and secure Google Cloud adoption Strong communication skills with the ability to articulate complex technical concepts to both internal and client technical, non-technical andmanagement stakeholders Set yourself apart: Proven experience leading small technical teams to deliver outcomes in a project setting, providing technical guidance and mentorship to junior team members Experience with … CI/CD pipelines and scripting (e.g. Bash, Python, Perl etc.) to automate routine tasks Strong understanding of cloud security best practices and tools (e.g. IdentityandAccessManagement, firewalls, encryption) Hands-on experience with networking across cloud and on-premises systems (e.g. TCP/IP, subnets, VPC, load balancing, DNS) Experience in site More ❯
of working Experience with algorithms and data structures. Experience in Observability practices with logging, metrics, tracing, and alerting. Experience with Infrastructure as Code. Understanding of identityandaccessmanagement, and application security. We use Datadog and BigPanda for our observability stack, Terraform for our cloud infrastructure, and EntraID as our IAM solutions but we … to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone's race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law. Conforming with applicable law, we can reasonably accommodate applicants' and employees More ❯
with colleagues. This role has the option to grow towards either a principal engineering role (a technical specialist leader) or an engineering manager (a team leader with line management) position at Vivacity, through structured career progression pathways. About us At VivaCity, we make cities smarter, safer, and more sustainable. We have over 5,000 AI sensors around the … familiar with the problem space, and you know when and how to ask for help. Requirements for the role: Expertise in Apache Kafka (ideally Kafka Strimzi), including broker management, scaling, upgrades, and integration with high-throughput data pipelines. Experience managing PostgreSQL databases, including load analysis, query optimisation, and role management. Experience with modern cloud infrastructure as GCP/… common DevOps tools and CI/CD processes. Proficiency with infrastructure management tools (e.g. Ansible, Chef, Puppet) Knowledge of information security principles, including identityandaccessmanagementand authentication/authorisation processes. Experience in a start-up or scale-up environment. Passion for sustainability, transport or smart cities. You don't need More ❯
regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identityandaccessmanagement, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK More ❯
servers, networks, cloud platforms, and end-user computing environments. The role will also support key projects on our technology roadmap, including infrastructure upgrades and cloud migrations. Duties and responsibilities Infrastructure Management • Administer and maintain on-premises and cloud-based infrastructure (e.g., Microsoft Windows Server, M365). • Monitor system performance and ensure high availability and reliability. • Implement and maintain … VPNs, and network security, collaborating with MSPs/Vendors as required. Cloud & Systems Administration • Manage Microsoft Defender, Entra ID, Exchange Online, SharePoint, and Intune. • Support identityandaccessmanagement across cloud and hybrid environments. Project Delivery • Contribute to infrastructure upgrade and migration projects. • Assist in planning and implementing new systems and services. • Document infrastructure … external standards. • Support implementation of security controls and participate in audits. • Collaborate with the security team to address vulnerabilities and incidents. Supporting additional work as reasonably required by management from time to time. This list is not exhaustive. Skills and experience Essential • Proven experience in infrastructure engineering or systems administration. • Strong knowledge of Microsoft technologies (Windows Server, M365 More ❯
be working on We are recruiting for a Head of Security Architecture & Engineering to join our team. In this role, you will be responsible for the leadership and operational management of the Security Architecture and Engineering team at Ki, actively collaborating with Ki's Technology & Product teams to devise and execute strategic initiatives that drive a 'secure, private … and ensure a robustly secure platform and product are in place in light of emerging threats and regulatory requirements. You'll be an expert in IdentityandAccessManagement, including privileged user controls and secrets management, with a good understanding of security topics in Azure, GCP, serverless, container platforms, and Infrastructure as More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of assigned controls, documenting results clearly and raising issues where appropriate Ensure timely delivery of assigned control … of quality and accuracy. Strong understanding of Cyber Security Domains including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
both visionary direction and practical stewardship across all core domains-ranging from Wintel server estates through network architecture to end-point administration, Unix systems integration, database stewardship, storage management solutions, backup technologies, and cloud-based services. You will act as the ultimate escalation point for complex technical challenges while collaborating extensively with architectural teams on solution design. Your … responsibilities extend to overseeing seamless service delivery; imparting expert guidance on portfolio management; ensuring robust risk mitigation; managing substantial budgets; orchestrating disaster recovery strategies; nurturing team development; maintaining exhaustive documentation; evaluating vendor relationships; reporting on key metrics; supporting regional operations; managing third-party providers; planning upgrades; enforcing stringent security protocols; and championing continuous enhancement throughout the infrastructure lifecycle. … What you bring: * Extensive experience exceeding ten years in IT infrastructure management within large-scale multinational organisations with at least five years occupying senior or regional leadership positions.* Profound technical proficiency encompassing Wintel platforms (Windows Server 2016/2019/2022), Linux system administration, enterprise-grade databases (SQL/Oracle), VMware virtualisation (SRM/Aria monitoring), Exchange Online More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
a Security Architect at Trainline, you will Define and own the enterprise-wide security architecture blueprint across corporate and product domains. Drive the Trainline Zero Trust initiative, spanning identity, device, network, and application layers. Lead secure design reviews … and threat modelling for key product and infrastructure initiatives. Develop reference architectures and reusable security design patterns. Collaborate with the IAM Engineer to architect enterprise identityandaccessmanagement Enforce secure configurations across SaaS, endpoint, and MDM platforms (e.g., CrowdStrike, Jamf, Intune). Evaluate and guide SaaS tool usage, integrations, and risk mitigation. Design … the SDLC and CI/CD. Define security controls for cloud-native services in AWS (IAM, KMS, GuardDuty, VPC security, etc.). Contribute to secure API design, secrets management, service-to-service auth, and cloud segmentation. Provide architectural governance input into vendor risk, procurement reviews, and data privacy design. Provide input as the security architecture voice in planning More ❯
ensuring a robust security posture and supporting continuous delivery of our applications. Key Responsibilities: Design and implement secure AWS cloud infrastructure, focusing on system architecture, IdentityandAccessManagement (IAM), encryption, data protection, and network security. Collaborate with the Information Security and application teams to drive cloud security initiatives and align with the broader … Terraform and Ansible for secure provisioning and management. Excellent problem-solving capabilities and strong verbal and written communication skills. Practical experience using Wiz or similar cloud security posture management tools. More ❯
ensuring a robust security posture and supporting continuous delivery of our applications. Key Responsibilities: Design and implement secure AWS cloud infrastructure, focusing on system architecture, IdentityandAccessManagement (IAM), encryption, data protection, and network security. Collaborate with the Information Security and application teams to drive cloud security initiatives and align with the broader … Terraform and Ansible for secure provisioning and management. Excellent problem-solving capabilities and strong verbal and written communication skills. Practical experience using Wiz or similar cloud security posture management tools. More ❯
hospitals and health systems to care for patients at home. We support patients across the full care journey-from early discharge and acute recovery to long-term condition managementand proactive care. We provide everything clinicians need to deliver safe, effective Virtual Care: medical-grade devices, logistics, patient onboarding, EHR integration, and an end-to-end clinical platform … infrastructure as code patterns Creating effective CI/CD delivery pipelines so that users can focus on doing the job, not deploying it Ensuring that identityandaccessmanagement deliver a secure and minimal platform while continuing to enable users. Working cross functionally with the wider organisation to migrate existing infrastructure to the new … and monitoring tooling, and building a sustainable on-call process Disaster response, resilient systems engineering, and security automation Cloud security and systems hardening An understanding of effective cost management as a key component of cloud platform administration. A bias towards action and a desire for mission-driven work Excellent communication skills, including communication with less-technical staff Experience More ❯
and Banking space. Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
and Banking space. Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯