london (city of london), south east england, united kingdom
Experis UK
DevOps Engineer Location: Cheltenham, London, Manchester Job Description Responsible for designing and developing infrastructure systems that leverage zerotrust architectures and infrastructure-as-code methodologies. This role focuses on robust, scalable, and secure solutions that align with stakeholder requirements. The position also involves assisting teams in eliciting and refining requirements while adhering to best practices in DevSecOps and … as Agile or similar approaches. Foster a culture of continuous improvement, where knowledge sharing and experimentation are encouraged. Security & Risk Management Work with security and policy stakeholders to ensure zerotrust architectures and risk management practices are integrated throughout the development process. Align solutions with security best practices and relevant compliance standards. Architecture & Integration Make and collaborate on More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
creates HLDs, LLDs, and topology diagrams. Responsibilities include leading technical workshops, resolving complex networking issues, updating architecture standards to meet business and compliance needs, and integrating security features like ZeroTrust, segmentation, and NAC into designs. Key skills Design network architectures for cloud environments such as AWS, Azure, and GCP. Integrate hybrid and multi-cloud networks and services. … VMware NSX, Fortinet) Experience with VPNs, remote access, load balancing, firewalls, proxy solutions (F5, Palo Alto, Cisco ASA) Skilled in wireless networking design, optimization, troubleshooting Understanding of security integration: ZeroTrust, segmentation, NAC Familiar with frameworks: ISO 27001, NIST, PCI-DSS, GDPR Track record ensuring compliance in network designs Experience with cloud networking (AWS Transit Gateway, Azure VNet More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
MITRE ATTACK & STRIDE frameworks. Recommend controls and enforce best practices for APIs, microservices, and data flows. Design and review secure API gateways using IBM DataPower. Implement mTLS, RBAC, and zero-trust principles. Configure and manage IBM DataPower for API security, encryption, authentication, and traffic mediation. Collaborate with teams to integrate security measures and communicate risks to stakeholders. Required … TLS, WS-Security, and encryption standards. Previous experience developing bespoke threat models using MITRE ATTACK & STRIDE. Ability to design secure architectures for hybrid/multi-cloud environments. Knowledge of zero-trust security models and microservices security. Ability to assess security aspects of technical designs and provide constructive guidance. Strong cryptography knowledge. Experience in UK Financial Services or similar More ❯
london, south east england, united kingdom Hybrid / WFH Options
BITS Group
Intune, and hybrid infrastructures Manage key platforms and tools — including Intune, NinjaOne (RMM), Acronis Cyber Protect, and CIPP secure-score monitoring Strengthen cybersecurity posture through endpoint hardening, automation, and ZeroTrust best practices Lead client reviews and reporting, turning technical data into clear, actionable insights Visit client sites for installations, consultations, and hands-on support Mentor junior engineers … visits are part of the role Deep technical expertise across : Microsoft 365, Azure, Intune, Exchange Online Windows Server, Active Directory, Group Policy Networking: Firewalls, VPNs, VLANs Security: MFA, EDR, ZeroTrust Virtualisation: Hyper-V, VMware PowerShell/automation experience (advantageous) Why You'll Love Working Here: Human first – We value relationships, not ticket numbers Real impact – See the More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. Carbon60 More ❯
Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and ZeroTrust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices … in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and ZeroTrust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills More ❯
Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and ZeroTrust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices … in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and ZeroTrust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills More ❯
Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and ZeroTrust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices … in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and ZeroTrust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills More ❯
Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and ZeroTrust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices … in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and ZeroTrust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills More ❯
london (city of london), south east england, united kingdom
Damia Group
Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and ZeroTrust principles Monitor environments with ELK Stack, Splunk, and Prometheus to ensure visibility, auditing, and compliance Collaborate with engineering, operations, and security teams to promote DevSecOps best practices … in cloud platforms, particularly AWS and Kubernetes (OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and ZeroTrust Networking Hands-on experience with vulnerability scanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills More ❯
Wiltshire, England, United Kingdom Hybrid / WFH Options
Focus on SAP
strategies for identified vulnerabilities. Create detailed threat models aligned to MITRE ATT&CK and STRIDE frameworks. Design and review secure API gateway patterns using IBM DataPower. Lead implementation of Zero-Trust , mTLS, RBAC and policy enforcement within service mesh environments. Define and enforce security standards, controls, and policies for microservices, APIs, and data flows. Ensure architecture and implementations … and integration. Strong understanding of OAuth 2.0, JWT, TLS, WS-Security, cryptography and secure communication protocols. Experience designing secure architectures for hybrid/multi-cloud environments. Strong background in Zero-Trust , microservices security, and containerised platforms. Experienced in building bespoke threat models using MITRE ATT&CK & STRIDE . Ability to assess security elements of solution designs, constructively challenge More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
Focus on SAP
strategies for identified vulnerabilities. Create detailed threat models aligned to MITRE ATT&CK and STRIDE frameworks. Design and review secure API gateway patterns using IBM DataPower. Lead implementation of Zero-Trust , mTLS, RBAC and policy enforcement within service mesh environments. Define and enforce security standards, controls, and policies for microservices, APIs, and data flows. Ensure architecture and implementations … and integration. Strong understanding of OAuth 2.0, JWT, TLS, WS-Security, cryptography and secure communication protocols. Experience designing secure architectures for hybrid/multi-cloud environments. Strong background in Zero-Trust , microservices security, and containerised platforms. Experienced in building bespoke threat models using MITRE ATT&CK & STRIDE . Ability to assess security elements of solution designs, constructively challenge More ❯
Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support ZeroTrust adoption, GRC initiatives, and audit/compliance reporting (ISO27001, NIST, SOC2, CE+). Centralise and improve visibility of security events by unifying logs across cloud, on-prem … threat detection. Career pathways into senior engineering, incident response leadership, or architecture roles. Ongoing funded training and certification investment. Opportunity to cross-train into wider InfoSec disciplines including GRC, ZeroTrust, and compliance. Training to CISSP in year one. More ❯
Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support ZeroTrust adoption, GRC initiatives, and audit/compliance reporting (ISO27001, NIST, SOC2, CE+). Centralise and improve visibility of security events by unifying logs across cloud, on-prem … threat detection. Career pathways into senior engineering, incident response leadership, or architecture roles. Ongoing funded training and certification investment. Opportunity to cross-train into wider InfoSec disciplines including GRC, ZeroTrust, and compliance. Training to CISSP in year one. More ❯
Manage vulnerability assessments end-to-end, driving remediation outcomes with customers and internal teams. Optimise the Microsoft Security Stack: Sentinel, Defender (for Endpoint/Identity), Purview, and XDR. Support ZeroTrust adoption, GRC initiatives, and audit/compliance reporting (ISO27001, NIST, SOC2, CE+). Centralise and improve visibility of security events by unifying logs across cloud, on-prem … threat detection. Career pathways into senior engineering, incident response leadership, or architecture roles. Ongoing funded training and certification investment. Opportunity to cross-train into wider InfoSec disciplines including GRC, ZeroTrust, and compliance. Training to CISSP in year one. More ❯
Secure SD-WAN, FortiGate NGFW, FortiManager/FortiAnalyzer, FortiSASE, and ZTNA. Cisco: Cisco SD-WAN (Viptela/Catalyst), Cisco+ Secure Connect/Meraki SD-WAN, ASA/Firepower, and ZeroTrust alignment. Enterprise Connectivity: Experience across FTTP, FTTC, leased lines, on-net fibre, and multi-carrier design. Partnerships with UK carriers including Openreach, Virgin Media Business, and other … re Looking For Minimum 10 years’ experience in senior sales leadership within enterprise networking, managed services, or IT infrastructure. Deep technical and commercial understanding of SD-WAN, SASE, and ZeroTrust (ZTNA) frameworks. Strong background in Fortinet and Cisco ecosystems. Experience across connectivity solutions (FTTP, leased lines, carrier relationships, and on-net designs). Knowledge of Microsoft Cloud More ❯
warrington, cheshire, north west england, united kingdom
Communicate Technology
Secure SD-WAN, FortiGate NGFW, FortiManager/FortiAnalyzer, FortiSASE, and ZTNA. Cisco: Cisco SD-WAN (Viptela/Catalyst), Cisco+ Secure Connect/Meraki SD-WAN, ASA/Firepower, and ZeroTrust alignment. Enterprise Connectivity: Experience across FTTP, FTTC, leased lines, on-net fibre, and multi-carrier design. Partnerships with UK carriers including Openreach, Virgin Media Business, and other … re Looking For Minimum 10 years’ experience in senior sales leadership within enterprise networking, managed services, or IT infrastructure. Deep technical and commercial understanding of SD-WAN, SASE, and ZeroTrust (ZTNA) frameworks. Strong background in Fortinet and Cisco ecosystems. Experience across connectivity solutions (FTTP, leased lines, carrier relationships, and on-net designs). Knowledge of Microsoft Cloud More ❯
health monitoring. Ensure endpoint telemetry is integrated with SIEM platforms and observability stacks. Partner with platform and infrastructure teams to enforce secure device baselines and policies. Build self-healing, zero-trust-aligned architectures for secure device management. Observability & Event Management: Implement real-time observability of endpoint health, risk exposure, and threat posture. Integrate with cybersecurity event and incident … endpoint protection, mobile security, and compliance tooling. Strong background in automation, scripting, and observability practices. Experience working with large, global device fleets and BYOD models. Preferred Qualifications: Familiarity with zero-trust security models and endpoint detection and response (EDR). Certifications such as CISSP, CISM, Microsoft Security certifications, or equivalent. Experience integrating device telemetry into SIEM and SOAR … of up to 30% and a generous retirement contribution that starts at 5% and moves to 10% after 2 years. All of our plans provide best in class coverage: Zero dollar ($0) health insurance premiums for BCG employees, spouses, and children Low $10 (USD) copays for trips to the doctor, urgent care visits and prescriptions for generic drugs Dental More ❯
to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters. Job Description The Opportunity: Enabling Digital Resilience across the Integrated Force The UK Ministry of Defence (MOD) and its Front … SI’s and Tech partners to build compelling value propositions and influence. Position Multi-Domain Capabilities: Effectively position the portfolio of solutions focusing on core MOD modernization themes, including: ZeroTrust Networks consistent across domains (Fixed/Deployed/Multi-tiered/Service Edge/5G/Battlefield/Gateways). Secure Cloud & AI Assets (Data, Applications, AI … sales cycle, including pipeline creation and pursuit management. Technical Aptitude: A capability for understanding how technology products and solutions, especially those based on SaaS architectures and advanced security platforms (ZeroTrust Networks, SASE, Cortex, Prisma AIRS), solve complex military and government problems. Additional Information Additional Information You will be joining a team built on joint success, empowered with More ❯
south east england, united kingdom Hybrid / WFH Options
Perfect People
a global "as a Service" platform. You'll take ownership across 13–14 DCs, keeping enterprise clients connected and driving forward modernisation projects focused on Spine & Leaf , SDN , and ZeroTrust . You'll design, build, and troubleshoot across routing/switching (EIGRP/OSPF/BGP) , VLAN/VXLAN , Wi-Fi , and Palo Alto/Sophos firewalls … switching, and firewall technologies. Confident leading major incidents and communicating with stakeholders. CCNP/CCIE certified or working toward it (training fully supported). Nice to have: experience with ZeroTrust , SDN , or modern DC architectures . More ❯