Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
/Application connectors within SailPoint IdentityIQ Knowledge Windows & Linux server operating systems is highly recommended. Scripting Knowledge eg: PowerShell is a plus At least 3-5 years of Identity & AccessManagement (IAM) engineering experience required. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues efficiently. Strong communication More ❯
/Application connectors within SailPoint IdentityIQ Knowledge Windows & Linux server operating systems is highly recommended. Scripting Knowledge eg: PowerShell is a plus At least 3-5 years of Identity & AccessManagement (IAM) engineering experience required. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues efficiently. Strong communication More ❯
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Robert Walters
of systems Hands on, automation, cross-functional collaboration Manage Azure and M365 Cloud Platforms Oversee enterprise application stack - M365, Azure, Atlassian, Telephony, IT Service tools Manage/Develop IdentityandAccessManagement solutions Identity/Automate tasks - streamline workflows Implement/Manage monitoring tools Troubleshoot and Incident Response: Investigate, Resolve issues Security … systems procedures CI/CD Support: Implementation of Continuous Integration/Deployment pipelines Provide tech config on cyber security controls Lead tech implementation of enterprise solutions Provide daily management of digital workplace tech stack Act as senior escalation point Tech Ops Engineer: Technical Skills Networking, Azure Cloud Platforms, AVD Virtualization, M365 Collaboration solutions Experience to Azure and M365 More ❯
security operations, security consulting, incident response, etc.) Hands-on security experience in two or more of the following: Cloud Security, Application Security (security SDLC, threat modeling, code review), Identity & AccessManagement, Network Security, Data Protection, Incident Response. Hands-on experience with enterprise security solutions (Data Loss Prevention, WAF, SIEM, etc.) Track record of leading … complex security projects Experience contributing to the professional development of technical contributors (direct management, mentoring, coaching, etc) Able to communicate effectively in English within technical and business settings. Preferred Qualifications Relevant security certifications (AWS Security Specialty, CISSP, CCSP, etc.) Experience leading cloud transformation projects Ability to navigate complex stakeholder relationships and drive change Strategic thinking and decision-making More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO … and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
database, LDAP, IIS 7.x, Jboss and webservers such as apache and iplanet webserver. CHEF, IBM WebSphere application server, Inspec, Splunk, CA Wily. Sound knowledge in Identityandaccessmanagement tools, IBM Security/Tivoli Access manager, IBM Security/Tivoli directory server, RSA access manager, RSA entitlement server, Active directory More ❯
cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript, Java, Python. Some other highly desirable skills include: Experience … sensitive information. Accountabilities Provision of subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Managementand protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in the banks infrastructure/software … including developers and security teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements. Development/Implementation and maintenance of IdentityandAccessManagement solutions and systems. Vice President Expectations To contribute or set strategy, drive requirements and make recommendations for change. Plan resources, budgets, and policies; manage andMore ❯
cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript, Java, Python. Some other highly desirable skills include: Experience … sensitive information. Accountabilities Provision of subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Managementand protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in the banks infrastructure/software … including developers and security teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements. Development/Implementation and maintenance of IdentityandAccessManagement solutions and systems. Vice President Expectations To contribute or set strategy, drive requirements and make recommendations for change. Plan resources, budgets, and policies; manage andMore ❯
You’ll work both autonomously and collaboratively, gaining exposure to a wide range of services and technologies including: Microsoft Azure Active Directory (Azure AD) for identityandaccessmanagement Microsoft Intune for device managementand endpoint security Microsoft Configuration Manager (ConfigMgr/SCCM) for software deployment and patching Jamf Pro for managing … Apple macOS and iOS devices Virtualisation platforms and mobile device management tools Main Accountabilities: Deliver excellent customer service with strong communication skills Act as a first point of contact on the Service Desk, handling IT-related issues via telephone, email, and desktop support Build relationships and collaborate with teams across the business Support and manage critical business applications … Passionate about technology and eager to learn Strong analytical and troubleshooting skills Ability to work independently and as part of a team Interest in enterprise IT environments and modern device management The placement will be for 1 year, starting in the summer of 2026. To be considered for this Student Placement, please apply to this advert and submit More ❯
You’ll work both autonomously and collaboratively, gaining exposure to a wide range of services and technologies including: Microsoft Azure Active Directory (Azure AD) for identityandaccessmanagement Microsoft Intune for device managementand endpoint security Microsoft Configuration Manager (ConfigMgr/SCCM) for software deployment and patching Jamf Pro for managing … Apple macOS and iOS devices Virtualisation platforms and mobile device management tools Main Accountabilities: Deliver excellent customer service with strong communication skills Act as a first point of contact on the Service Desk, handling IT-related issues via telephone, email, and desktop support Build relationships and collaborate with teams across the business Support and manage critical business applications … Passionate about technology and eager to learn Strong analytical and troubleshooting skills Ability to work independently and as part of a team Interest in enterprise IT environments and modern device management The placement will be for 1 year, starting in the summer of 2026. To be considered for this Student Placement, please apply to this advert and submit More ❯
You’ll work both autonomously and collaboratively, gaining exposure to a wide range of services and technologies including: Microsoft Azure Active Directory (Azure AD) for identityandaccessmanagement Microsoft Intune for device managementand endpoint security Microsoft Configuration Manager (ConfigMgr/SCCM) for software deployment and patching Jamf Pro for managing … Apple macOS and iOS devices Virtualisation platforms and mobile device management tools Main Accountabilities: Deliver excellent customer service with strong communication skills Act as a first point of contact on the Service Desk, handling IT-related issues via telephone, email, and desktop support Build relationships and collaborate with teams across the business Support and manage critical business applications … Passionate about technology and eager to learn Strong analytical and troubleshooting skills Ability to work independently and as part of a team Interest in enterprise IT environments and modern device management The placement will be for 1 year, starting in the summer of 2026. To be considered for this Student Placement, please apply to this advert and submit More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of London Salary: £100,000 - £120,000 + Bonus Are you an experienced Security Engineer with a passion for safeguarding systems and driving innovation in identityandaccessmanagement? Do you thrive in complex environments where you can solve critical security challenges and influence long-term strategy? If you're driven by excellence, collaboration … shape a market-leading digital platform and deliver secure, cutting-edge customer experiences. Ideal Candidate: Strong hands-on expertise with Hardware Security Modules (HSM), AWS Secrets Manager, and certificate lifecycle management (rotation, revocation, automation) Experienced with GitLab CI/CD pipelines, AWS CLI, and automation tooling (Chef or similar) Proven background in Cloud Security, with deep knowledge of … - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock IAM solutions (PingGateway, PingAM, PingIDM More ❯
City of LondonSalary: £100,000 - £120,000 + Bonus Are you an experienced Security Engineer with a passion for safeguarding systems and driving innovation in identityandaccessmanagement? Do you thrive in complex environments where you can solve critical security challenges and influence long-term strategy? If you're driven by excellence, collaboration … shape a market-leading digital platform and deliver secure, cutting-edge customer experiences. Ideal Candidate: Strong hands-on expertise with Hardware Security Modules (HSM), AWS Secrets Manager, and certificate lifecycle management (rotation, revocation, automation) Experienced with GitLab CI/CD pipelines, AWS CLI, and automation tooling (Chef or similar) Proven background in Cloud Security, with deep knowledge of … - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering, security, and product teams Desirable Skills: Hands-on configuration, deployment, and operation of ForgeRock IAM solutions (PingGateway, PingAM, PingIDM More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
Join us for rewarding work that makes a difference across the UK. You'll solve some of the nation's highest-priority digital challenges, helping millions of people access services they need. About Engineering Enablement Reporting to GDS Product Group CTO, the Technology programme is boosting efficiency, strengthening security, and improving developer experience by providing infrastructure, tools and … value from our SaaS services. We are looking for 1 Senior SRE to join this team Engineering Access Operations team - owns and operates identityandaccessmanagement for our systems and acts as an intelligent customer for IT services, improving overall effectiveness. We are looking for 2 Senior and 1 mid-level … team - manages core business tooling and services, supporting business impact and agility GOV.UK One Login Programme represents a once in a generation and career opportunity to simplify and widen access to all digital government services. Sitting at the heart of the government, we are building one simple, safe and secure way for users to log in and prove More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
Security Project Manager to lead governance and orchestration across our client's strategic Active Directory (AD) Resiliency Programme. This programme includes nine critical workstreams aimed at strengthening infrastructure, access controls, and overall cyber posture. Day-to-day of the role: Lead end-to-end project management across multiple AD resiliency workstreams, including Conditional Access … security standards and regulatory obligations. Required Skills & Qualifications: Proven experience delivering complex cyber security or infrastructure programmes in large enterprise environments. Understanding of Active Directory, identityandaccessmanagement, and enterprise IT architecture. Exceptional governance , planning , and stakeholder management skills . Ability to manage multiple concurrent workstreams with competing priorities . Experience More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
architectural standards and project timelines. Specifically: Builds and configures on-premises infrastructure Deploys and integrates cloud-based services (e.g. IaaS/PaaS/SaaS, virtual machines, storage, networking, identity). Ensures systems are built in line with approved high-level and low-level designs Collaborates with solution architects, programme and project managers, and cyber security engineers. Supports risk … management with associated stakeholders. Undertakes the planning, estimation and scheduling of installation and decommissioning work. Ensures that the highest levels of IT security are maintained to protect the integrity of all NCC data. Within project delivery, uses normal operating facilities, diagnostic tools, technical manuals, test scripts and systems documentation to identify, diagnose and report on system errors. Supports … as above. Familiarity with implementing security best practices across Microsoft environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance More ❯