London, South East, England, United Kingdom Hybrid/Remote Options
Lorien
our team on a 6-month contract. This hybrid role offers the opportunity to work at the heart of technology change, enabling secure and effective identityandaccessmanagement (IAM) solutions across a portfolio of initiatives. What You'll Do Act as a single point of contact (SPoC) or relationship-based fly-in resource … solutions that align with technology strategy, standards, and risk appetites. Collaborate with internal teams and third parties to ensure smooth "Path to Live" transitions. Provide day-one user access, knowledge creation, warranty support, and seamless handover into operations. Deliver proactive updates, manage risks and issues, and ensure timely delivery of milestones. Champion IAM capabilities to drive innovation and … tools and practices. What You'll Bring Strong technical expertise in IAM processes and tools. Proven experience in designing and implementing IAM solutions in complex environments. Excellent stakeholder managementand communication skills. Ability to work flexibly, including occasional non-standard hours to support operational priorities. A collaborative mindset and willingness to support wider departmental goals. Guidant, Carbon60, Lorien More ❯
delivering IT Internal Audits. Essential. Planning and Delivery of IT Internal Audits. Strong understanding of IT General Controls (ITGC), for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, and IT Disaster Recovery. Assistant Manager/Manager/Senior Manager Level. The minimum criteria you’ll need is a professional More ❯
delivering IT Internal Audits. Essential. Planning and Delivery of IT Internal Audits. Strong understanding of IT General Controls (ITGC), for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, and IT Disaster Recovery. Assistant Manager/Manager/Senior Manager Level. The minimum criteria you’ll need is a professional More ❯
certificate lifecycle management. Implement and maintain Certificate Authorities, Registration Authorities, and associated infrastructure. Ensure secure deployment and configuration of PKI across enterprise systems, endpoints, applications, and devices. Collaborate with IDAM, DevOps, and cloud security teams to integrate PKI with broader identityand security architectures. Provide technical leadership in incident response and troubleshooting related to certificates and encryption. Stay … OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and key management practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards … such as PCI DSS, HIPAA, SOX, GDPR, NIST 800-53. Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: IdentityandAccess, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture andIdentity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible More ❯
in Spring Boot and JavaScript Create and manage RESTful APIs , event-driven integrations, and NoSQL data models Deploy containerised services through Docker and Kubernetes (EKS) Implement strong security controls (IDAM/IdP, SSO, RBAC, encryption) and AWS monitoring/telemetry Ensure high availability, performance, and automation through CI/CD and DevOps practices Collaborate closely with product, security, and architecture More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Burberry
Technical Architect, DW, EUC & IDAM Department: INFORMATION TECHNOLOGY Location: GB INTRODUCTION JOB PURPOSE Technically hands on and delivery focused Technical Architect to support the design, implementation, and continuous improvement of Digital Workplace, EUC andIDAM solutions. This role is ideal for someone with strong technical knowledge in device managementand end user computing, who can work collaboratively with … engineering teams, vendors, and internal stakeholders to enhance user experience and security. This role will provide architectural assurance and delivery across Burberry's Digital Workplace andIDAM domains, ensuring secure, scalable, and user centric technology solutions and aligning with the strategic roadmap and fully documented according to governance principles. RESPONSIBILITIES Define and evolve the technical architecture for Digital Workplace and … IDAM platforms, ensuring alignment with enterprise architecture principles and security frameworks. Complete the technical design and implementation of solutions including Microsoft 365, JAMF, Okta, and conditional access policies. Collaborate with internal teams and vendors to deliver integrated solutions that support both tactical and long term goals. Ensure all solutions meet compliance, security, and design assurance standards, particularly in More ❯
Key Responsibilities Advanced Support & Problem Management (Tier 2/3) Own and resolve complex, high-impact, and escalated support issues (L3) that cannot be resolved by Tier 1 staff. Perform Root Cause Analysis (RCA) for recurring incidents, developing and implementing permanent solutions across the organization. Provide specialized, discrete support for executive, VIP, and highly sensitive technical functions. Master … and troubleshoot advanced issues related to operating systems, virtual desktop environments (VDI), complex application integrations, and specific line-of-business tools. Endpoint & Systems Management Administer and maintain enterprise-level endpoint management tools such as Microsoft Endpoint Configuration Manager (SCCM), Microsoft Intune, or JAMF Pro for software deployment and patching. Develop, test, and deploy automated scripts ( PowerShell … Python, or Bash ) to streamline routine maintenance, provisioning, and configuration tasks. Manage and enforce security and group policies within Active Directory, Azure AD, and Okta for identityandaccess management. Oversee and standardize the configuration, deployment, and imaging process for all new hardware. Project Leadership & Infrastructure Lead or execute major IT projects, including large-scale OS More ❯
Key Responsibilities Advanced Support & Problem Management (Tier 2/3) Own and resolve complex, high-impact, and escalated support issues (L3) that cannot be resolved by Tier 1 staff. Perform Root Cause Analysis (RCA) for recurring incidents, developing and implementing permanent solutions across the organization. Provide specialized, discrete support for executive, VIP, and highly sensitive technical functions. Master … and troubleshoot advanced issues related to operating systems, virtual desktop environments (VDI), complex application integrations, and specific line-of-business tools. Endpoint & Systems Management Administer and maintain enterprise-level endpoint management tools such as Microsoft Endpoint Configuration Manager (SCCM), Microsoft Intune, or JAMF Pro for software deployment and patching. Develop, test, and deploy automated scripts ( PowerShell … Python, or Bash ) to streamline routine maintenance, provisioning, and configuration tasks. Manage and enforce security and group policies within Active Directory, Azure AD, and Okta for identityandaccess management. Oversee and standardize the configuration, deployment, and imaging process for all new hardware. Project Leadership & Infrastructure Lead or execute major IT projects, including large-scale OS More ❯
Surrey, England, United Kingdom Hybrid/Remote Options
Hawksworth
no chance you'll be getting bored anytime soon. They need you to have experience across Infrastructure, from networking (TCP/IP, HTTP, SMTP), security, risk, governance, automation, identity & access management...not to mention financial services experience, and ideally insurance. If you're still reading, then great, the wish-list hasn't scared you off yet!! Another More ❯
no chance you'll be getting bored anytime soon. They need you to have experience across Infrastructure, from networking (TCP/IP, HTTP, SMTP), security, risk, governance, automation, identity & access management...not to mention financial services experience, and ideally insurance. If you're still reading, then great, the wish-list hasn't scared you off yet!! Another More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Hawksworth
no chance you'll be getting bored anytime soon. They need you to have experience across Infrastructure, from networking (TCP/IP, HTTP, SMTP), security, risk, governance, automation, identity & access management...not to mention financial services experience, and ideally insurance. If you're still reading, then great, the wish-list hasn't scared you off yet!! Another More ❯
GitHub Actions, or Bitbucket. Build and manage containerised and serverless environments, including AKS (Kubernetes), Azure Container Apps, and Functions, to ensure flexibility and scalability. Implement security, networking, andidentity frameworks across Azure, covering areas such as Entra ID (Active Directory), Key Vault, Firewalls, VNets, and routing configurations. Manage Azure database solutions, including Cosmos DB, PostgreSQL, and MySQL, ensuring … or Kubernetes. Demonstrated experience with CI/CD pipelines, particularly Azure DevOps or GitHub Actions. A passion for security, governance, and compliance, with hands-on experience in cloud identityandaccess management. Familiarity with multi-cloud environments and scripting (e.g. Bash, PowerShell, Python). Why this opportunity should be of interest: You’ll have the opportunity More ❯
GitHub Actions, or Bitbucket. Build and manage containerised and serverless environments, including AKS (Kubernetes), Azure Container Apps, and Functions, to ensure flexibility and scalability. Implement security, networking, andidentity frameworks across Azure, covering areas such as Entra ID (Active Directory), Key Vault, Firewalls, VNets, and routing configurations. Manage Azure database solutions, including Cosmos DB, PostgreSQL, and MySQL, ensuring … or Kubernetes. Demonstrated experience with CI/CD pipelines, particularly Azure DevOps or GitHub Actions. A passion for security, governance, and compliance, with hands-on experience in cloud identityandaccess management. Familiarity with multi-cloud environments and scripting (e.g. Bash, PowerShell, Python). Why this opportunity should be of interest: You’ll have the opportunity More ❯
senior lead to ensure our state of the art security centre is as effective and as efficient as can possibly be. As well as the proactive and responsive management of your team you will also have input for the strategy and future direction of our operation. Main tasks and responsibilities: Manage Shared SOC for more than 100 FTE … to achieve operational objectives Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Centre Management, administration & maintenance of security devices under the purview of SOC which … of more than 12 years in advanced security technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Managementand Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day More ❯
Do Act as a trusted technical advisor, guiding customers through their cybersecurity and digital transformation journeys Stay at the forefront of emerging security technologies (SIEM, SOAR, EDR, SASE, DDoS, IDAM, WAF, and more) Design and present high-impact security and networking solutions (Fortinet, Palo Alto, Juniper, Zscaler, Netskope, and more) Lead technical discovery sessions, solution design, demos, and PoCs Create More ❯
Do Act as a trusted technical advisor, guiding customers through their cybersecurity and digital transformation journeys Stay at the forefront of emerging security technologies (SIEM, SOAR, EDR, SASE, DDoS, IDAM, WAF, and more) Design and present high-impact security and networking solutions (Fortinet, Palo Alto, Juniper, Zscaler, Netskope, and more) Lead technical discovery sessions, solution design, demos, and PoCs Create More ❯
Things. As a trusted technology adviser and managed services provider, we help clients navigate continuous change and embrace innovation. We deliver world-class hybrid cloud, Infrastructure, mainframe transformation, data, IDAM, and cloud-native solutions, simplifying complex business challenges and creating new pathways to success. Headquartered in the USA and backed by private equity, Ensono has a strong track record in More ❯
Things. As a trusted technology adviser and managed services provider, we help clients navigate continuous change and embrace innovation. We deliver world-class hybrid cloud, Infrastructure, mainframe transformation, data, IDAM, and cloud-native solutions, simplifying complex business challenges and creating new pathways to success. Headquartered in the USA and backed by private equity, Ensono has a strong track record in More ❯
RBAC Specialist SC Cleared We are seeking an experienced procurement professional to support a high-profile public sector technology programme. We are seeking an experienced Oracle Role-Based Access Control (RBAC) Specialist to join our high profile public sector Client on a short term contract. The ideal candidate will be responsible for reviewing and redesigning security roles within … existing Oracle Fusion Human Capital Management (HCM) production environment, while also defining and implementing security roles for upcoming Oracle Fusion ERP Financials and Oracle Fusion ERP Procurement solutions that are currently undergoing testing under Finance Modernisation Programme. This role is critical to ensuring systems have a robust, secure, and compliant access framework before and after go … principles (including in enhanced privileged access needed for business and tech support teams), and security best practices. Ensure these are aligned with Bank security policies and existing IDAM tools. Design and Implementation: Design and implement new security roles and data access for the Oracle Fusion ERP Financials and Fusion ERP Procurement modules, which are currently in More ❯
RBAC Specialist SC Cleared We are seeking an experienced procurement professional to support a high-profile public sector technology programme. We are seeking an experienced Oracle Role-Based Access Control (RBAC) Specialist to join our high profile public sector Client on a short term contract. The ideal candidate will be responsible for reviewing and redesigning security roles within … existing Oracle Fusion Human Capital Management (HCM) production environment, while also defining and implementing security roles for upcoming Oracle Fusion ERP Financials and Oracle Fusion ERP Procurement solutions that are currently undergoing testing under Finance Modernisation Programme. This role is critical to ensuring systems have a robust, secure, and compliant access framework before and after go … principles (including in enhanced privileged access needed for business and tech support teams), and security best practices. Ensure these are aligned with Bank security policies and existing IDAM tools. Design and Implementation: Design and implement new security roles and data access for the Oracle Fusion ERP Financials and Fusion ERP Procurement modules, which are currently in More ❯
enterprise systems and digital platforms Background in Defence Support engineering or logistics environments Knowledge of Defence Digital principles, including networks, cloud, operational service management, cyber operations, andIDAM Strong stakeholder managementand communication skills Ability to work collaboratively within cross-functional teams Experience in consulting or advisory roles Understanding of business change initiatives (advantageous More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
Data Careers
enterprise systems and digital platforms Background in Defence Support engineering or logistics environments Knowledge of Defence Digital principles, including networks, cloud, operational service management, cyber operations, andIDAM Strong stakeholder managementand communication skills Ability to work collaboratively within cross-functional teams Experience in consulting or advisory roles Understanding of business change initiatives (advantageous More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
management, representing Digital, Data and Technology (DDaT). Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR andIDAM polices) to detect, prevent, and respond to cyber threats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security … of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability managementMore ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
management, representing Digital, Data and Technology (DDaT). Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR andIDAM polices) to detect, prevent, and respond to cyber threats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security … of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability managementMore ❯
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical concepts into business value. Requirements More ❯