we do. To be successful in this role you should have: Strong hands-on IAM engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identitymanagement, authentication, authorization and identity federation. Expertise with single sign on, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM … implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in partnering with security, product, engineering and compliance teams, to embed identity-first principles into the DevSecOps lifecycle You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business … will train, guide and coach less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for More ❯
API design and integration • RESTful services and automation Data and Platforms • Salesforce • Google Workspace • Atlassian tools such as Jira and Confluence • Databases including DynamoDB, MongoDB, and RDS Security and Identity • Okta and federated identitymanagement • Encryption and TLS • Cloud posture and compliance best practice You’ll bring a broad technical background, strong problem-solving ability, and the More ❯
API design and integration • RESTful services and automation Data and Platforms • Salesforce • Google Workspace • Atlassian tools such as Jira and Confluence • Databases including DynamoDB, MongoDB, and RDS Security and Identity • Okta and federated identitymanagement • Encryption and TLS • Cloud posture and compliance best practice You’ll bring a broad technical background, strong problem-solving ability, and the More ❯
threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusion detection/prevention systems, endpoint protection, SIEM, and identitymanagement platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across Azure, AWS, or GCP (e.g., IAM, security groups, encryption … traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing activities; track remediation of findings. Evaluate risks and recommend security enhancements or compensating controls. Maintain asset inventories and ensure patching and configuration More ❯
threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusion detection/prevention systems, endpoint protection, SIEM, and identitymanagement platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across Azure, AWS, or GCP (e.g., IAM, security groups, encryption … traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing activities; track remediation of findings. Evaluate risks and recommend security enhancements or compensating controls. Maintain asset inventories and ensure patching and configuration More ❯
threats in a proactive and efficient manner. Key Responsibilities: Security Architecture & Implementation Design, deploy, and manage security solutions including firewalls, intrusion detection/prevention systems, endpoint protection, SIEM, and identitymanagement platforms. Implement secure network architecture and enforce segmentation and least-privilege access controls. Support secure cloud environments across Azure, AWS, or GCP (e.g., IAM, security groups, encryption … traffic for threats or suspicious activity. Lead or support incident response activities: investigation, containment, eradication, recovery, and reporting. Conduct root cause analysis and implement security hardening improvements. Vulnerability & Risk Management Run regular vulnerability scans and penetration testing activities; track remediation of findings. Evaluate risks and recommend security enhancements or compensating controls. Maintain asset inventories and ensure patching and configuration More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Ashdown Group
Providing 2 nd line support, resolving escalated hardware, software, and network issues with a methodical and analytical approach. Oversee and maintain Microsoft 365 and Azure environments, including user access, identitymanagement, and system configuration. Implement and manage backups, patching, endpoint security, and compliance controls. Work with the Head of IT to define, document, and enforce IT standards, procedures … field. At least 3–5 years’ experience in 2nd line support or systems administration roles. Confident with Active Directory, Microsoft 365 and Azure administration. Windows Server environments and endpoint management tools. Previous experience of cloud project delivery (e.g. migrations, upgrades). Networking fundamentals – including VLANs, firewalls, DNS, and routing. Excellent diagnostic and troubleshooting skills across hardware, OS, and application More ❯
Worcester, England, United Kingdom Hybrid/Remote Options
Chapman Tate Associates
What You’ll Do Architect and implement enterprise-grade Azure environments , from Landing Zones to subscription management. Automate everything possible using Terraform, Bicep, PowerShell , and Azure DevOps . Strengthen identity and access controls with Microsoft Entra ID, PIM, Conditional Access , and hybrid access solutions. Optimise for cost, performance, and security , applying zero-trust and secure-by-design principles. Collaborate … of Azure services: Networking, WAF, Logic Apps, and Azure OpenAI . Deep expertise in automation and Infrastructure as Code (Terraform, Bicep, PowerShell). Solid grasp of Azure security and identitymanagement in line with Zero Trust principles. Experience with CI/CD pipelines , monitoring , and observability tools such as Azure Monitor and Log Analytics. Excellent communication skills, stakeholder More ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … enterprise PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identitymanagement platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key managementMore ❯
delivery of secure, large-scale infrastructure across both private and public cloud environments. This position focuses heavily on enterprise PKI and trust services, integrating modern authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical … scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities, and Certificate Lifecycle Management systems Develop high-quality design artefacts, standards, and documentation for PKI, identity, and cross-domain architectures Provide technical guidance on Active Directory integration, federation services, and certificate-based … enterprise PKI and trust infrastructures (Root/Issuing CAs, RA, VA, CLM). Familiarity with Defence or government PKI ecosystems is advantageous Strong understanding of Active Directory, federation and identitymanagement platforms, and certificate-based access controls Experience designing secure cloud solutions within private (VCF) and hyperscale (AWS, Azure, GCP) environments Knowledge of certificate auto-enrolment, key managementMore ❯
Cheshire, England, United Kingdom Hybrid/Remote Options
Morgan Law
architectures Right to work in the UK Desirable: Industry certifications (e.g., CompTIA Security+, SSCP) Experience in the charity or non-profit sector Familiarity with Microsoft Azure cloud platforms and identitymanagement Experience with compliance frameworks (PCI DSS, Cyber Essentials) Experience with auditing and compliance Experience of BCP/DR More ❯
environments for each project Expert-level knowledge of Windows Server, Active Directory, and Microsoft 365. Solid hands-on experience with Google Cloud Platform (GCP) – ideally across compute, networking, and identity management. Confident managing both Windows and Linux operating systems. Skilled in VMware or Hyper-V virtualisation. Excellent understanding of networking fundamentals – VLANs, routing, switching, firewalls, and VPNs. Awareness of More ❯
environments for each project Expert-level knowledge of Windows Server, Active Directory, and Microsoft 365. Solid hands-on experience with Google Cloud Platform (GCP) - ideally across compute, networking, and identity management. Confident managing both Windows and Linux operating systems. Skilled in VMware or Hyper-V virtualisation. Excellent understanding of networking fundamentals - VLANs, routing, switching, firewalls, and VPNs. Awareness of More ❯
Infrastructure Engineer should have: Deep understanding of Windows Server, M365 and Linux operating system Expert understanding of cloud platforms - Azure (preferred), GCP. Expert knowledge of M365 Strong knowledge in IdentityManagement - Active Directory, EntraID, Azure AD Confident in the build/configuration/management of HPe hardware Good understanding of core network services - DNS, DHCP. Comfortable with More ❯
Infrastructure Engineer should have: Deep understanding of Windows Server, M365 and Linux operating system Expert understanding of cloud platforms - Azure (preferred), GCP. Expert knowledge of M365 Strong knowledge in IdentityManagement - Active Directory, EntraID, Azure AD Confident in the build/configuration/management of HPe hardware Good understanding of core network services - DNS, DHCP. Comfortable with More ❯
transition process. Follow internal processes for approval and cost sign off, working with the commercial team to ensure clients are presented with accurate pricing. Work closely with the project management/operations team during the transition to handover. Ensure customer deadlines are achieved and work with sales to help customer manage expectations. Ensure all relevant activity related to opportunities … TVOS operating systems Apple Business Manager/DEP Apple hardware range eg Macbook, iMACs, iPhones, iPads, Mac Mini Endpoint Protection Products and features relevant to Mac and Windows environments Identity solutions Azure AD, OKTA Other MDM/MAM Solutions preferably Microsoft Intune relevant to iOS environments Microsoft Autopilot and Whiteglove Data Loss Protection Solutions in a Mac and Windows … solutions, Synology, QNAP Microsoft Server, Microsoft Cloud Services: Microsoft 365, Azure Microsoft SQL design principles Back-up, replication, disaster recovery and availability solutions eg Veaam/Acronis Authentication and IdentityManagement services eg AD/Azure AD/OKTA/2FA/MFA Managed Services Good general understanding of Networking and Security Solutions for Tier 1 vendors Desktop More ❯
a system and network administration role in when required. Key Responsibilities: End-User Support (80%): Provide technical assistance to employees as needed, ensuring smooth day-to-day operations. User & IdentityManagement: Administer Microsoft Azure, Office 365, and Active Directory to maintain secure and efficient access control. Remote Access & Security: Configure and maintain VPNs and other secure remote access … enhance knowledge sharing and process efficiency. Collaboration with Security Teams: Support security initiatives, implement best practices, and contribute to compliance efforts across on-premises and cloud environments. IT Infrastructure Management: Administer and optimize servers (Windows and Linux) , virtualization environments (VMware), and cloud platforms ( Azure ) to ensure high availability and efficiency. System Monitoring & Incident Resolution: Proactively monitor IT systems, diagnose More ❯
on senior role for someone who thrives on solving complex challenges, mentoring others, and shaping IT standards in an evolving and ambitious organisation. What You’ll Do Lead the management and development of a hybrid IT estate, ensuring performance, security, and resilience. Oversee Windows Server, Active Directory, Intune, Azure, and virtualisation platforms (Hyper-V, SAN). Drive improvements in … Stakeholders on system upgrades, automation, and business continuity planning. What You’ll Bring Strong expertise in Windows Server, Active Directory, Azure, Hyper-V, and Veeam. Solid understanding of cybersecurity, identitymanagement, and vulnerability management. Proven troubleshooting and documentation skills. Experience supporting multi-site or hybrid environments. Desirable: Certifications (e.g. Microsoft, CompTIA, or cybersecurity) PowerShell scripting, networking (Barracuda, Ubiquiti More ❯
Reading, Oxfordshire, United Kingdom Hybrid/Remote Options
CBSbutler Holdings Limited trading as CBSbutler
including Cisco Webex, Microsoft Teams, and Skype for Business . Support and configure AV systems such as Cisco P60, Crestron, and Polycom within secure meeting and operational spaces. Manage identity and authentication services via Active Directory, Azure AD, and Microsoft Exchange . Lead Unified Communications migrations and Cisco Expressway upgrades , ensuring minimal disruption and full compliance with defence standards. … hands-on experience with Cisco collaboration tools , AV systems, and networking technologies . Proficiency in Active Directory , Azure AD , and Exchange administration . Solid understanding of network security principles , identitymanagement , and UC integration . Experience with Expressway deployments , UC migrations, and hybrid collaboration environments. Strong documentation, communication, and stakeholder engagement skills. Desirable Cisco certifications (e.g., CCNA Collaboration More ❯
Reading, Berkshire, United Kingdom Hybrid/Remote Options
CBSbutler Holdings Limited trading as CBSbutler
including Cisco Webex, Microsoft Teams, and Skype for Business . Support and configure AV systems such as Cisco P60, Crestron, and Polycom within secure meeting and operational spaces. Manage identity and authentication services via Active Directory, Azure AD, and Microsoft Exchange . Lead Unified Communications migrations and Cisco Expressway upgrades , ensuring minimal disruption and full compliance with defence standards. … hands-on experience with Cisco collaboration tools , AV systems, and networking technologies . Proficiency in Active Directory , Azure AD , and Exchange administration . Solid understanding of network security principles , identitymanagement , and UC integration . Experience with Expressway deployments , UC migrations, and hybrid collaboration environments. Strong documentation, communication, and stakeholder engagement skills. Desirable Cisco certifications (e.g., CCNA Collaboration More ❯
including Cisco Webex, Microsoft Teams, and Skype for Business . Support and configure AV systems such as Cisco P60, Crestron, and Polycom within secure meeting and operational spaces. Manage identity and authentication services via Active Directory, Azure AD, and Microsoft Exchange . Lead Unified Communications migrations and Cisco Expressway upgrades , ensuring minimal disruption and full compliance with defence standards. … hands-on experience with Cisco collaboration tools , AV systems, and networking technologies . Proficiency in Active Directory , Azure AD , and Exchange administration . Solid understanding of network security principles , identitymanagement , and UC integration . Experience with Expressway deployments , UC migrations, and hybrid collaboration environments. Strong documentation, communication, and stakeholder engagement skills. Cisco certifications (e.g., CCNA Collaboration, CCNP More ❯
manage resources effectively Demonstrated experience in leading and/or managing technical teams Exposure to Microsoft Azure or AWS (Desired) Citrix - Virtual Desktop/Apps, NetScaler (desired) Office 365 IdentityManagement, Security & Compliance (desired) Experience with SaaS monitoring solutions (LogicMonitor, ScienceLogic, SolarWinds) (desired) At boxxe we believe that business should be about more than just profits. Sustainability is … are committed to building a team that represents a variety of backgrounds, perspectives, and skills. boxxe does not discriminate based on race, religion, colour, national origin, sexual orientation, gender identity, age, marital status, veteran status, or disability status. All our employment is based on qualification, excellence, and business need. More ❯
secure, regulated cloud services in enterprise environments. Deep technical expertise in Azure security architecture and secure service configuration. Hands-on experience with Azure Policy, RBAC, NSGs, firewalls, encryption, and identity management. Strong understanding of cloud compliance frameworks and regulatory standards. Why Tesco Insurance and Money Services? Seeing your impact all around you: there's no better feeling. Lucky for More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Computappoint
using Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secrets management, vulnerability scanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for developer self … Infrastructure as Code with Terraform or Bicep Extensive CI/CD pipeline experience with GitHub Actions or Azure Pipelines Background in observability and telemetry solutions Understanding of cloud security, identitymanagement, and compliance frameworks Networking fundamentals and familiarity with Azure databases and messaging services Scripting skills (Bash/PowerShell/Python) and Linux system administration Strong Azure experience … AKS, Container Registry, App Services, Virtual Networks, API Management, monitoring tools Azure certifications (AZ-104, AZ-400, CKA) advantageous To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this vacancy. More ❯
initial 3-month contract can be completed on a fully remote basis and is determined as Inside IR35, offering £500-£525 per day. Key Skills : Microsoft Defender XDR: Endpoint, Identity, Office 365, Cloud Apps Microsoft Sentinel: KQL, playbook development, SIEM optimisation Privileged IdentityManagement (PIM) and change control workflows Advanced threat detection, incident response, and threat hunting … Log collection via Azure Monitoring Agent and Firewall Management Centre Responsibilities: Configure and fine-tune Microsoft Defender XDR in line with approved designs Participate in Microsoft FastTrack engagements Integrate Defender XDR with Sentinel SIEM for enhanced detection and response Develop Kusto queries and automation playbooks Support PoC setup for Microsoft Copilot for Security Connect syslogs from on-prem Servers More ❯