on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our award-winning, zero-trust, privileged access management platform deploys in minutes and seamlessly integrates with any tech stack and identity application to provide visibility, security, control, reporting and compliance across an … entire enterprise. Trusted by millions of individuals and thousands of organisations, Keeper is an innovator of best-in-class password management, secretsmanagement, privileged access, secure remote access and encrypted messaging. Learn more at . About the Role The Enterprise Sales Executive, EMEA will drive new business … industry trends, market conditions, and competitor activities to identify new opportunities and potential threats 5+ years of software sales experience Experience selling identity access management solutions, including PAM (privileged access management) An accomplished track record of selling software into IT organizations Existing CTO/CIO/CISO relationships More ❯
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable … operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secretsmanagement (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when More ❯
Pipelines: Experience building and maintaining CI/CD pipelines using tools like GitHub Actions, GitLab CI, Jenkins, or ArgoCD. - Security and Compliance: Knowledge of secretsmanagement (e.g., AWS Secrets Manager), IAM roles/policies, and security best practices. - Networking: Understanding of DNS, load balancing, TLS and ingress More ❯
explain technical concepts to technical and non-technical stakeholders. Hands on experience of some or all of the following: Experience with automation/configuration management, e.g. Terraform Experience with AWS or GCP Experience with at least one and associated certifications for at least one of the following: AWS (ideally … certified Solutions Architect Professional) GCP (ideally certified Professional Cloud Architect) Azure (ideally certified Solutions Architect Expert) Experience of enterprise secretsmanagement systems, e.g. HashiCorp Vault, AWS secrets manager Experience in supporting production systems for high profile, mission critical systems. Experience with hybrid cloud technologies including OpenShift, Google More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Weare5vtech
/CD systems like GitLab CI, Jenkins, Azure DevOps Scripting skills (Bash, Python, or similar) Security mindset: static/dynamic code analysis, vulnerability scanning, secretsmanagement Bonus Points For: NHS or wider healthcare tech experience Knowledge of UK Government security frameworks Familiarity with HITRUST, ISO 27001, or similar More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Peaple Talent
streamlined pipeline development. Strong experience working with cloud-based data services, especially within AWS environments, utilizing tools like Lambda, S3, Redshift, Glue, Athena and Secrets Manager. Skilled in building modern data warehouses on platforms like Amazon Redshift, Snowflake, or Databricks. If you are interested in this position please apply More ❯
part of the Private Markets Data Engineering team, you will collaborate with Product and other teams to develop technology that supports data collection and management of Private Markets entities, ensuring data consistency and accurate labeling. The systems you develop are vital for Aladdin and Preqin's success, aiming to … explore AI and other advancements to improve data accuracy, timeliness, and research efficiency. In this role, you will: Collaborate across teams to build data management solutions that enable quick delivery of high-quality data. Deliver enterprise-grade software solutions. Promote software quality through best practices. Contribute to continuous improvement … Python, React.js, and Postgres, with AWS experience. You have experience with complex, data-centric systems. You understand infrastructure as code, CI/CD pipelines, secretsmanagement, and Kubernetes. You are curious, eager to learn, and possess a growth mindset. You understand the importance of customer and problem understanding More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
security architecture – preferably AWS (Azure is a plus). Database and enterprise IAM security design experience. Exposure to tools like SIEM, EDR, CASB, VPNs, SecretsManagement, Pen Testing. Understanding of modern software development practices (CI/CD, version control). Operational IT security experience. About You Strong communicator More ❯
subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Management and protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in … teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements. Development/Implementation and maintenance of Identity and Access Management solutions and systems. Skills Required: Extensive experience of working within Cyber Security Engineering and within a DevSecOps environment. Experience across configuration and integration with … Hardware Security Module (HSM) and AWS Secrets Manager (ASM) tooling, certificate lifecycle management, e.g. rotation, revocation, and in automating security workflows. Experience using GitLab CI/CD pipelines, AWS CLI or Chef. Strong experience with Cloud Security expertise across the following areas: AWS security controls, policies and automation More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Sanderson
subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Management and protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in … teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements. Development/Implementation and maintenance of Identity and Access Management solutions and systems. Skills Required: Extensive experience of working within Cyber Security Engineering and within a DevSecOps environment. Experience across configuration and integration with … Hardware Security Module (HSM) and AWS Secrets Manager (ASM) tooling, certificate lifecycle management, e.g. rotation, revocation, and in automating security workflows. Experience using GitLab CI/CD pipelines, AWS CLI or Chef. Strong experience with Cloud Security expertise across the following areas: AWS security controls, policies and automation More ❯
London, England, United Kingdom Hybrid / WFH Options
Sanderson
subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Management and protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in More ❯