Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
architects to raise capability across multiple programmes. You will engage senior stakeholders, balance risk against usability and cost, and shape patterns that let teams adopt cloud, DevSecOps, IoT and zerotrust approaches safely. If you can blend deep technical insight with clear, influential communication and enjoy turning complex risks into elegant proportionate solutions, this role offers the chance More ❯
with Azure networking services , such as: Azure Virtual WAN Azure Private Link Azure Firewall Azure Application Gateway Azure Front Door DDoS Protection Expertise in network security within Azure, including ZeroTrust principles . Strong troubleshooting skills for network performance and connectivity issues. Must have active SC Clearance. Qualifications Candidates who have passed the following Microsoft Azure networking-related More ❯
play a critical role in delivering cutting-edge security solutions to our customers. This role requires hands-on implementation, configuration, and deployment of secure network environments based on a zero-trust model. You will be responsible for end-to-end project delivery, from scoping to final handover, ensuring the highest standards of security and performance. Your work will … out-of-hours work during project go-lives and cutovers. Professional Services Engineer - Key Duties: Solution Design & Implementation - Design, configure, and deploy secure network environments with a focus on ZeroTrust security models - Deliver end-to-end implementations, from planning to deployment and testing, ensuring the best and most secure configurations for customers - Create detailed technical documentation, including … and cutovers, which may involve occasional out-of-hours work Professional Services Engineer - You: Technical Skills - Strong expertise in configuring firewalls, VPNs, and other security solutions, particularly within a ZeroTrust framework - Proficiency with Palo Alto Networks technologies, including experience with PAN-OS - Familiarity with security concepts such as IDS/IPS - Hands-on experience with scripting and More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
cyber security and apply your deep understanding and experience of HMG, NCSC, and international cyber standards. The role will require excellent stakeholder management and communication skills to build the trust and support necessary for successful outcomes. You will be supported by team members in a highly collaborative environment, a structured learning and development programme, and will have opportunities for … knowledge of cyber detection (e.g., threat identification/intelligence, real-time monitoring, anomaly detection) and cyber response (e.g. incident response, eradication and remediation, recovery, post-incident analysis). DevSecOps. ZeroTrust Architecture (ZTA) expertise for enterprise, cloud and air-gapped environments along with knowledge of operational use of ZeroTrust within any of the following: , IdAM More ❯
with security teams to integrate DevSecOps practices and ensure platform compliance with CLIENT's internal standards and industry regulations. Enable and support Privileged Identity Management (PIM), Conditional Access, and ZeroTrust controls. More ❯
specialists, vendors, and industry leaders to identify strategic and innovative uses of technology. Technical Experience Required Extensive experience with on-premises and cloud-based security technologies and concepts, including 'ZeroTrust'. Proficiency in security protocols, standards, and best practices. Strong knowledge of network security, application security, and cloud security, specifically with Azure. Experience with security frameworks and More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
in a regulated industry (financial services, insurance) - Desirable Certifications such as Azure Security, CCNA, CCNP, CISSP, CEH - Desirable Experience securing Linux, Mac, containerised applications (e.g., Kubernetes) - Desirable Familiarity with ZeroTrust, ITIL, and security governance frameworks - Desirable To be considered Please apply by clicking online or emailing me directly at . For further information please call me on More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
debugging skills across network, systems, and data stack. Observability tooling, e.g. custom metrics pipelines, OpenTelemetry tracing, or integrations across telemetry stacks. Security engineering and practical understanding of IAM hardening, zero-trust network principles, and secrets management in data-heavy systems. Passion for building reliable, secure, and user-friendly platforms and products. "Nice To Have": Exposure to Azure or More ❯
design & solution build, deployment and ongoing management of process Support System Integration Testing, User Acceptance Testing, Production Rollout Applied knowledge of concepts and principles of 'Secure by Design' and 'ZeroTrust' Willingness to learn new Security skills and build experience from working in different security domains, with evidence of continued personal growth attaining necessary further Security qualifications and More ❯
by identifying, segmenting, and enforcing compliance of every connected thing in a real-time and at scale. Our unified security platform enables enterprises and government agencies to focus on ZeroTrust segmentation, IT/OT convergence, and OT/ICS innovation, all supporting our mission and vision. Join us as we secure the world with our products. We More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … sponsorship for significant and impactful change Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security To apply for this position please submit your CV. Carbon60, Lorien & SRG More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. Carbon60 More ❯
will play a crucial role in modernising the company's vulnerability management capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerability management architecture Capture our vulnerability management requirements and usage scenarios, captured as a set of patterns that a future … for significant and impactful change Desired: Establishing observability platforms Capabilities adjacent to exposure/vulnerability management capabilities (ie cyber security asset management, attack surface management, etc) Pragmatic application of zero-trust philosophies Cloud based security (GCP, AWS and Azure) Pentest scoping and analysis experience Application security Threat modelling To apply for this position please submit your CV. Carbon60 More ❯
to remain technically hands-on while working on close customer-facing mission-critical projects at the forefront of the secure sector. Experience/Areas of expertise required: DevSecOps environments - 'ZeroTrust' Architecture Deploying & operating infrastructure/applications on AWS CI/CD & IaC - Terraform/Ansible Cloud orchestration & containerisation - Kubernetes/Docker Role Responsibilities: Lead the development and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Maxwell Bond
Intune. Excellent communication, attention to detail, and multitasking abilities. Desirable: Experience with Microsoft Exchange, iMail, and cloud platforms like AWS or Azure. Knowledge of cybersecurity frameworks (e.g. ISO 27001, ZeroTrust). Exposure to hardware for drone detection (radars, RF sensors, etc.). This is an urgent role, if you match the skill set, please email your CV More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
data privacy, identity management, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zerotrust and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector More ❯
data privacy, identity management, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zerotrust and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Picture More
CI/CD pipelines (e.g. Azure DevOps, Jenkins) Implement robust monitoring, logging and observability tools (Azure Monitor, SolarWinds) Work with DevOps and Security teams to enforce cloud governance and zero-trust models Stay close to the technology – supporting the business, guiding junior engineers, and troubleshooting high-level incidents when needed Who We're Looking For This role suits More ❯
and agile systems, while championing DevSecOps and modern cloud best practices. Own the cybersecurity strategy and ensure compliance with relevant standards (e.g. ISO 27001, GDPR). Implement risk assessments, zero-trust architecture, encryption, MFA, and 24/7 monitoring. Manage AWS infrastructure with a focus on performance, resilience, and cost-efficiency. Oversee disaster recovery, business continuity, secure APIs More ❯
proven experience in managing and delivering complex Security Operations activities within a fast-paced and dynamic security domain, youll have previous experience in Cloud Security, Identity and Access Management, ZeroTrust, Security Service Edge, and SASE. Youll have excellent communication skills, able to translate complex security-related matters for a non-technical audience, as well as being able More ❯
and optimise CI/CD pipelines to support automated cloud product lifecycles Understanding of cloud-based connectivity patterns Experience with SD-WAN technologies, such as Cisco Meraki Familiarity with zerotrust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across multiple environments Exposure to multi More ❯
time for development opportunities - Assisting the client in their 'Journey to the cloud' understanding Hybrid cloud and migration strategies - Facilitate the journey from Isolated and zone based networks to "ZeroTrust Implementation" Required qualifications to be successful in this role Minimum 2 years of hands-on experience as a Linux Systems Administrator, with proven expertise in managing and More ❯
business catalogs, and user onboarding documentation Contribute to internal data enablement initiatives such as training and knowledge-sharing sessions Governance, Quality, and Compliance: Implement data access controls and support zero-trust security principles Support data classification, lineage, and automated data governance tooling Ensure compliance with internal and external data policies (e.g., GDPR) What We're Looking For 3+ More ❯