to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-BasedAccessControl), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber … testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-basedaccesscontrol (RBAC), and identity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g. More ❯
service communication. Configuring identity-aware proxy (IAP) services and secure APIs with authentication and authorization layers. Developing policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC) + Just-in-Time (JIT) access. Automating IAM More ❯
Log Analytics, and Application Insights . Improve security and compliance using Azure Security Center, Key Vault, and role-basedaccesscontrol (RBAC) . Troubleshoot and resolve issues in CI/CD pipelines, deployments, and infrastructure. Collaborate with developers, cloud engineers More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
DEBRA International
Understanding of charity sector KPIs (fundraising metrics, retail performance, supporter engagement). Support company-wide Power BI deployments. Experience with Role-BasedSecurity in Power BI - for managing access at an enterprise level. Demonstrable experience in advanced Power BI development, data modelling More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
wide implementation. Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, and access reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Pest Control South Africa
RHEL 7, 8, and 9 VMware vSphere proficiency In-depth knowledge of Red Hat Satellite, Hybrid Cloud Console, and Insights Delinea Centrify AD/RBAC for Linux Advanced troubleshooting skills using tools like strace, tcpdump, iostat, mpstat General SQL/RDBMS skills LAMP stack experience Scripting proficiency in BASH, Python More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some exposure to IAM, role-basedaccesscontrol, and identity management principles. Some experience working with penetration testing findings and basic security audits. In-person and More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
required. Ensure access and data security compliance across all databases, administering user accounts and user access (role-basedaccesscontrol). Install and configure database servers, establish database instance(s) in a private cloud environment. Proactively monitor system health More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Axiom Software Solutions Limited
practices, industry regulations, and internal policies in all configuration and governance activities. Implement role-basedaccess controls (RBAC) and manage user permissions to enforce secure, scalable solutions. Collaboration & Support: Provide support to end-users by troubleshooting issues and providing technical assistance with Power More ❯
vulnerability and penetration testing reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-BasedAccessControl Framework, ensuring efficient management of access rights. Key Skills & Experience: Ideally a Degree in Computer Science, Information SecurityMore ❯
IAM). - Experience with identity and access concepts, with technologies to secure production and corporate access, (SSO, SAML) and with Federated Identity, RBAC, authentication and authorisation solution, encryption, SSL, and related. PREFERRED QUALIFICATIONS - 2+ years of experience in fields such a Security Operations, technology audit, or securityMore ❯
IAM). - Experience with identity and access concepts, with technologies to secure production and corporate access, (SSO, SAML) and with Federated Identity, RBAC, authentication and authorisation solution, encryption, SSL, and related. PREFERRED QUALIFICATIONS - 2+ years of experience in fields such a Security Operations, technology audit, or securityMore ❯
highly desirable. Exposure to Permissions and Profiles, including policy as code for defining permission roles, and familiarity with security model paradigms such as RBAC, ABAC, and ReBAC. Proven experience collaborating with cross functional teams, with a strong understanding of software engineering methodologies. Experience with BDD (Behaviour-Driven Development) testing More ❯
Greenford, London, United Kingdom Hybrid / WFH Options
TXP
design workshops and translate business needs into technical solutions Recommend and support business process improvements Ensure quality assurance of test systems and deliverables Manage RBACsecurity, reporting, workflows, and API integrations Provide ongoing support and lead consultant oversight where required Requirements: In-depth knowledge of Unit4 ERP with at More ❯
CIS, NIST). Manage and enforce Identity and Access Management (IAM) controls, including conditional access, MFA policies, role-basedaccesscontrol (RBAC), and least-privilege enforcement across Microsoft Entra and AWS IAM. Support incident response processes including investigation, containment, eradication More ❯
Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Projec... More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended.<... More ❯