bolton, greater manchester, north west england, United Kingdom
InfoSec People Ltd
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
crawley, west sussex, south east england, United Kingdom
InfoSec People Ltd
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom
InfoSec People Ltd
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
InfoSec People Ltd
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Project More ❯
Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Project More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
DEBRA International
Understanding of charity sector KPIs (fundraising metrics, retail performance, supporter engagement). Support company-wide Power BI deployments. Experience with Role-BasedSecurity in Power BI - for managing access at an enterprise level. Demonstrable experience in advanced Power BI development, data modelling More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Pest Control South Africa
RHEL 7, 8, and 9 VMware vSphere proficiency In-depth knowledge of Red Hat Satellite, Hybrid Cloud Console, and Insights Delinea Centrify AD/RBAC for Linux Advanced troubleshooting skills using tools like strace, tcpdump, iostat, mpstat General SQL/RDBMS skills LAMP stack experience Scripting proficiency in BASH, Python More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some exposure to IAM, role-basedaccesscontrol, and identity management principles. Some experience working with penetration testing findings and basic security audits. In-person and More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
watford, hertfordshire, east anglia, United Kingdom
Akkodis
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
required. Ensure access and data security compliance across all databases, administering user accounts and user access (role-basedaccesscontrol). Install and configure database servers, establish database instance(s) in a private cloud environment. Proactively monitor system health More ❯
london, south east england, united kingdom Hybrid / WFH Options
Lorien
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Axiom Software Solutions Limited
practices, industry regulations, and internal policies in all configuration and governance activities. Implement role-basedaccess controls (RBAC) and manage user permissions to enforce secure, scalable solutions. Collaboration & Support: Provide support to end-users by troubleshooting issues and providing technical assistance with Power More ❯
vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-BasedAccessControl Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information SecurityMore ❯
IAM). - Experience with identity and access concepts, with technologies to secure production and corporate access, (SSO, SAML) and with Federated Identity, RBAC, authentication and authorisation solution, encryption, SSL, and related. PREFERRED QUALIFICATIONS - 2+ years of experience in fields such a Security Operations, technology audit, or securityMore ❯
IAM). - Experience with identity and access concepts, with technologies to secure production and corporate access, (SSO, SAML) and with Federated Identity, RBAC, authentication and authorisation solution, encryption, SSL, and related. PREFERRED QUALIFICATIONS - 2+ years of experience in fields such a Security Operations, technology audit, or securityMore ❯