Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Project More ❯
Risk Management. Conduct risk assessments, segregation of duties (SoD) analysis, and accesscontrol reviews. Define and implement role-basedaccesscontrol models and authorization concepts. Guide the integration of GRC tools with other security systems and frameworks. Transformation & Project More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
DEBRA International
Understanding of charity sector KPIs (fundraising metrics, retail performance, supporter engagement). Support company-wide Power BI deployments. Experience with Role-BasedSecurity in Power BI - for managing access at an enterprise level. Demonstrable experience in advanced Power BI development, data modelling More ❯
At least two years of hands-on production experience on Linux, OpenShift Good knowledge on Linux, Kubernetes and OpenShift Rolebasedaccesscontrol in relation to OpenShift roles and SCC's Good troubleshooting skills on OpenShift and Kubernetes Good troubleshooting skills in More ❯
to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-BasedAccessControl), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber … testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government More ❯
Log Analytics, and Application Insights . Improve security and compliance using Azure Security Center, Key Vault, and role-basedaccesscontrol (RBAC) . Troubleshoot and resolve issues in CI/CD pipelines, deployments, and infrastructure. Collaborate with developers, cloud engineers More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯
Security Cleared (SC or DV) Knowledge of Security Solution Architecture, Information Security, Technical Vulnerability Risk Assessments, Authentication, Authorisation, IAM (ABAC/RBAC), HMG security policy Expert practical and design expertise in PKI Security Advisory and Design of System Architecture Design Documentation Expertise in Financial Services More ❯