industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
Borehamwood, Hertfordshire, United Kingdom Hybrid / WFH Options
Interaction Recruitment
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
Borehamwood, Hertfordshire, United Kingdom Hybrid / WFH Options
Interaction Recruitment
manner over the phone and via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with service operations procedures. · Conduct full … Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly and concisely. Plans and manages own More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with service operations procedures. · Conduct full … Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly and concisely. Plans and manages own More ❯