experiences helpful) Cloud-based cyber security principles and architecture points Boundary controls, network segmentation and accesscontrol Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA Cryptographic techniques and implementations IT asset management and tracking Vulnerability Management and Patching SIEM principles, products and supporting logging infrastructure Containerisation and virtual More ❯
Kettering, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
WEETABIX LIMITED
and the enterprise. The Ingredients (What we need from you) Key Skills Strong understanding of Active Directory (AD) and Entra ID (Azure AD), MFA, SSO, conditional access, Azure RBAC, PIM Experience with the following products and technologies: Microsoft Defender, Exchange Online, vulnerability management tools, phishing simulation tools Experience creating policies, procedures and response plans Excellent communicator with the ability More ❯
and payments, identity and access management platform, conversion optimization, and features designed to help Enterprise customers. That includes things like Single-Sign-On, Role-BasedAccessControl, and supporting deployment and rollout of our products within customer infrastructure. You'll join one of these areas and work closely with engineers, designers More ❯
Skills and Technologies Ideally required: At least two years of hands-on production experience on Linux, OpenShift Good knowledge on Linux, Kubernetes and OpenShift Rolebasedaccesscontrol in relation to OpenShift roles and SCC's Good troubleshooting skills on OpenShift and Kubernetes Good troubleshooting skills in Docker and Podman Confidence in More ❯
or IT delivery oversight in large-scale tech programmes. Strong knowledge of vendor management, contract governance, and third-party controls. Familiarity with ERP Platforms Understanding of access controls (RBAC), licence and identity management. Financial governance experience including Azure cost optimisation and reporting. Solid knowledge of GDPR and global data protection standards. Experience working in structured programme environments or PMO More ❯
and real-time data flows. Use SQS, SNS, and Step Functions to deliver decoupled, event-driven messaging architectures. Apply Kubernetes and API security best practices, including TLS, KMS, RBAC, and service-to-service auth. Monitor performance using CloudWatch, X-Ray, and container-level logging and alerting tools. We are looking for the following experience: 5+ years' AWS integration experience More ❯
and real-time data flows. Use SQS, SNS, and Step Functions to deliver decoupled, event-driven messaging architectures. Apply Kubernetes and API security best practices, including TLS, KMS, RBAC, and service-to-service auth. Monitor performance using CloudWatch, X-Ray, and container-level logging and alerting tools. We are looking for the following experience: 5+ years' AWS integration experience More ❯
and real-time data flows. Use SQS, SNS, and Step Functions to deliver decoupled, event-driven messaging architectures. Apply Kubernetes and API security best practices, including TLS, KMS, RBAC, and service-to-service auth. Monitor performance using CloudWatch, X-Ray, and container-level logging and alerting tools. We are looking for the following experience: 5+ years' AWS integration experience More ❯
requirements for configuration requests following through to actiono Performing user and security administration for a portfolio of applications - covering Joiners, Leavers, Movers (JLM), role-basedaccesscontrol (RBAC) based on least privilege, and other build/configuration activitieso Identify, troubleshoot and resolve incidents and problems affecting our applications More ❯
in financial services or regulated settings). Dynamics release management processes and tooling. Able to work cross-functionally with product, dev, and data teams. Experience with security setup (RBAC), licensing, and deployment strategies. Working in an agile environment, at pace. Role responsibilities - Translate business workflow and underwriting processes into Dynamics 365 workflows, forms, entities, and rules. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Morgan Law
the team. Implementation Lead the end-to-end delivery of model-driven and canvas Power Apps, custom connectors, Dataverse schema and Azure integration components. Configure role-basedsecurity, data loss prevention (DLP) policies and automated tests; manage DevOps release pipelines. Organisational Control & Development Continually review procedures, automate manual processes and exploit new More ❯
Contract Inside IR35 Remote Key Responsibilities: • Design and develop responsive, user-friendly front-end applications using Oracle Application Express (APEX). • Build and implement custom, role-basedsecurity components within APEX applications. • Develop and manage RESTful APIs using Oracle REST Data Services (ORDS), including configuration of OAuth2 security. • Contribute to APEX architecture planning More ❯
Keyloop bridges the gap between dealers, manufacturers, technology suppliers and car buyers. We empower car dealers and manufacturers to fully embrace digital transformation. How? By creating innovative technology that makes selling cars better for our customers, and buying and owning More ❯
and configuration for 50k+ users Developing complex lifecycle workflows Developing customer connectors Onboarding applications with automated provisioning Configuring custom reports and dashboards Role Mining and implementing RBAC/ABAC 2+ years hands on experience in designing and deploying SailPoint IdentityNow/ISC Minimum experience of leading 5 large IAM implementations 2+ years’ experience in leading large strategic More ❯
SK10, Butley Town, Cheshire East, Cheshire, United Kingdom
Royal London
and processes. Expertise in SailPoint IDN: Proficiency in configuring, customizing, and administering SailPoint IdentityNow. Identity Governance Knowledge: Understanding of identity governance principles such as user provisioning, access management, RBAC, and SoD. Integration Skills: Ability to integrate SailPoint IDN with HR systems, Active Directory, and other identity sources. Customization Abilities: Experience in customizing SailPoint IDN for specific business needs, including More ❯
of Microsoft online services (Exchange Online, Entra ID, Purview) Microsoft Identity with Entra ID services (Cloud/Hybrid Identities) Microsoft Identity security services (Conditional Access, PIM, IDP, RBAC) Proven experience troubleshooting and resolving technical challenges. Salary : Up to £55,000 Basic Per Annum If you are interested in this opportunity, we encourage you to apply today More ❯
etc.), and cloud-permission systems (IAM). - Experience with identity and access concepts, with technologies to secure production and corporate access, (SSO, SAML) and with Federated Identity, RBAC, authentication and authorisation solution, encryption, SSL, and related. PREFERRED QUALIFICATIONS - 2+ years of experience in fields such a Security Operations, technology audit, or security vulnerability lifecycle. - Ability to More ❯
Null Checks Transforms Access Profiles Proven track record of implementing SailPoint in enterprise environments Familiarity with identity lifecycle processes, access reviews, and role-basedaccesscontrol Strong scripting skills (Beanshell, Java, etc.) and knowledge of APIs Exceptional analytical and problem-solving capabilities About Simeio Simeio delivers cutting-edge Identity and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
ServiceNow Project Manager | Contract | Central London - 3 days per week on-site | Up to £750/day Join a financial services client of ours as a ServiceNow Project Manager to lead a strategic ITSM transformation, driving the design, configuration, and More ❯
model. Key Responsibilities: Lead design and continuous improvement of access models for business units and newly acquired entities. Guide the implementation of Zero Trust-aligned governance controls, including RBAC and risk-basedaccess models. Own and review complex role analysis, redundancy elimination, and role standardization efforts. Act as the More ❯
model. Key Responsibilities: Lead design and continuous improvement of access models for business units and newly acquired entities. Guide the implementation of Zero Trust-aligned governance controls, including RBAC and risk-basedaccess models. Own and review complex role analysis, redundancy elimination, and role standardization efforts. Act as the More ❯