message the job poster from Premier Group Senior Contract Consultant | Empowering Clients with the Best Cloud & Infrastructure Talent in the UK & Europe Head of IT Long-Term Contract (London / Hybrid) Location: London (3 days onsite, 2 days remote) The Opportunity We are seeking an accomplished Head of IT to lead and deliver strategic IT initiatives for a leading … roadmap , aligned with business goals. Oversee IT infrastructure, service delivery, support, and cybersecurity functions. Manage budgets, vendors, and contract negotiations . Deliver on critical projects including cloud migrations (AWS / Azure), ERP / CRM upgrades, and cybersecurity enhancements . Ensure compliance with GDPR, ISO27001 , and internal security policies. Implement robust disaster recovery (DR … innovation, and strategic investments . 8+ years experience in IT leadership roles (e.g., Head of IT, IT Director, Senior IT Manager). Expertise in cloud platforms (Azure, AWS) , network / security architecture , and enterprise applications . Strong background in cybersecurity, compliance , and risk management. Proven delivery of digital transformation , infrastructure modernization, and change management initiatives. Excellent stakeholder engagement and More ❯
procedures, and reviewing and updating existing documentation. Deploying patches on hardware, software, networks, and environments, and supporting the architecture and integration of technical solutions. Maintaining high standards in ISO27001 and Cyber Essentials Plus accreditation. Researching and documenting major incidents and problems, including impact assessments and root cause analyses (RCAs). Person Specification Applicants should have … clustering and failover management. Advanced networking, connectivity, VPN, and firewall technologies. Hands-on experience with IT hardware and software installation, modification, maintenance, and repair procedures. Microsoft Intune, KANDJI, and / or other MDM tools. Windows PowerShell or other scripting languages. MS DPM, Azure backups, and other backup solutions. Experience with ServiceDesk, JIRA, or other ticketing systems, including escalation for … incident resolution. Strong documentation skills for reports, policies, procedures, and workflows. Applicants are also encouraged to have: ITIL v4 Foundation certification. Certifications such as MCSE / MCITP or equivalent. CCNA and / or CCNP certifications. Prince2 and / or Agile certifications. Knowledge of ISO27001 standards. We will support your professional development to More ❯
Supporting the implementation of security processes and requirements Providing security advice and guidance to the wider technical team Liaising with stakeholders in relation to security issues and providing remediation / improvement recommendations Supporting Octopus Energy Group's audit & compliance automation programs, enabling easy demonstration of compliance as we scale Working with the wider Security team to set the security … aren't subject matter experts Experience producing or supporting the delivery of security awareness programs in different business environments Knowledge of industry and regulatory security standards, such as ISO27001, SOC2, and GDPR A good candidate will have experience in at least some of the areas mentioned, we're not expecting any candidate to be an … What will help: Security certifications (any of the famous abbreviations) Security qualifications (e.g. apprenticeships or degrees) Experience working in organisations that maintain ISO27001 and / or SOC 1 and SOC 2 type II certifications A wider understanding of technology, especially AWS (or other CSPs) A background in a technical role or technical knowledge through More ❯
data and following secure coding practices to prevent breaches, injection, and unauthorised access. You should apply if you: ️ Have a strong background in frontend development - ideally React, TypeScript and / or Next.js Care about solving the technically challenging problems we're tackling for our customers Value shipping early and often to get customer feedback and then iterating quickly to … of the customer Have proven experience delivering large, complex software engineering systems It would also be nice if you have: Have experience with Backend development - ideally Python Have Geospatial / mapping / GIS experience Experience working with LLM's and OpenAI's API in particular Built or integrated with highly secure, fault tolerant APIs Experience building high performance … distributed systems at scale Proven experience of driving and using modern dev practices like BDD, TDD, 12 Factor, CI / CD Competitive starting salary £90,000-£110,000 Matched pension contributions and equity options in a fast growing start-up Flexible working hours and location 25 days paid holiday (plus bank holidays) Professional equipment and personal development budget along More ❯
Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO27001, NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security … service, audit lead for Infra, budget ) Key 3 rd party operational infrastructure vendor management - i.e. management of managed service partners as a team extension globally, as well as service / solution delivery partners, Migration of Legacy VM based estates to SaaS and Cloud services platforms, Legacy Infra tech to Azure knowledge / experience, Prior to the last … years in Enterprise Management of a global estate / user-base, a demonstrable technical infrastructure engineering level background, working on Windows Server, AD , SQL environments, Firewalls / SDWAN, and Networks (WAN & / or LAN). The Client is based in the City of London. This is a hybrid position with 3 days in the office. The salary More ❯
variety of business and technical projects Attend and contribute to project meetings, offering expert information security guidance Review and consult on technical and design documentation (e.g. design documents, network / data flow diagrams) Collaborate with Security Architects and delivery teams to implement secure solutions Ensure security policies and standards are applied through a hands-on, consultative approach Translate technical … security frameworks, regulations, and best practices (e.g., ISO27001, DPA, GDPR) Familiarity with security tools such as vulnerability scanners, SIEM, DDoS protection, remote access, authentication / authorisation technologies, and data loss prevention Understanding of OWASP top vulnerabilities and methodologies Technical knowledge of cloud, networking, virtualisation, mobile technologies, and more Experience of working with external suppliers … Self-driven, collaborative, and confident operating both independently and within teams Desirable Qualifications & Experience: Certifications such as CISSP, CISM, CISA, or ISO27001 Lead Auditor / Implementer Knowledge of the NIST Cybersecurity Framework Experience with Smart Metering or highly regulated environments Familiarity with Cloud Security Controls and Public Key Infrastructure (PKI) Understanding of Hardware Security More ❯
to include advising and participating in remediation, closure and lessons learned. Understands and monitors vulnerabilities, to ensure appropriate classification in line with policy, satisfactory closure, and mitigation. What Experience / Skills are required: Bachelor's degree in computer science or information sciences, or in a similar field. Possess certifications from accredited bodies, including Microsoft SC-200, Certified SOC Analyst … understanding of penetration testing and hacking techniques. Experience across applying NIST CSF, ITIL, ISO27001, ISO and other best practice standards Desirable Experience / Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro / McAfee Enterprise Security Manager, QRadar, LogLogic). … Understanding of event and incident investigations and incident response in a 24 / 7 SOC environment. Proficiency in configuring and managing security technologies such as firewalls, IDS / IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusion detection, network traffic analysis, Web More ❯
Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO27001, NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security … Azure: Strong experience managing Microsoft 365 (Exchange, SharePoint, Teams), Azure cloud infrastructure, and security tools such as Microsoft Defender and Sentinel. Security & Compliance: Deep knowledge of security frameworks (ISO27001, NIST, CIS), compliance requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO … rd party operational infrastructure vendor management - i.e management of managed service partners, Migration of Legacy VM based estates to SaaS and Cloud services platforms, Legacy tech to Azure knowledge / experience, Prior to the last 5 years, a technical infrastructure engineering level background, working on Windows Server, AD , SQL environments, Firewalls / SDWAN, and Networks (WAN & /More ❯
ll play a crucial role in delivering technical excellence, leading customer engagements, and mentoring team members. Key Responsibilities: Design, implement, and manage enterprise-grade security solutions (firewalls, SIEM, IDS / IPS, endpoint protection, cloud security). Shape strategic security recommendations and collaborate on technical win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness … training and advise clients on best practices. Support audits and compliance initiatives (ISO27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We’re Looking For: A degree in Cybersecurity, IT, or equivalent … forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting / automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem-solving, communication, and More ❯
methodologies, and Azure DevOps to ensure project success. Maintain awareness of security standards, principles, tools, and emerging technologies. Automate security baselines and configuration management using IaC tools like Biceps / Terraform and enforce with Azure policy. Improve SSDLC practices, support risk assessments, and ensure cloud services align with governance, risk, and compliance controls. Skills required: Key skills and competencies … in security (Working) Systems design and integration (Practitioner) Understanding security implications of transformation (Working) Experience: Integrating security practices into DevOps, including automated testing and vulnerability management. Experience with CI / CD, IaC, and security automation tools. Implementing Zero Trust models, identity verification, MFA, and adaptive access controls. Knowledge of standards and regulations like GDPR, ISO27001 … CISM, or CRISC within a year. Eligibility for SC Security Clearance. Current knowledge of ISO27001, Risk Management, GDPR, and security issues related to AI / Gen AI. More ❯
cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through code reviews, manual penetration testing, and static / dynamic security testing (SAST / DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes (e.g., scanning tools, vulnerability management … fostering a culture of security awareness across engineering and business teams. Compliance and Standards : Ensure product security practices align with relevant security frameworks and standards (e.g., OWASP, NIST, ISO27001, GDPR, PCI DSS). Support regulatory compliance efforts and maintain evidence to meet audit requirements. Collaboration and Communication : Function as the primary interface between security, development … and frameworks such as OWASP, BSIMM, PCI DSS, ISO27001, and GDPR. Security Integration experience: Demonstrated ability to seamlessly integrate secure development practices into SDLC / SSDLC workflows. Skilled in implementing technical security controls and driving security automation within CI / CD pipelines. Risk Management and Compliance knowledge: Experience with identifying and managing security More ❯
Conduct secure code reviews and architectural security assessments to identify risks early in the development process. Automation & Tooling: Enhance security automation capabilities by integrating security testing tools into CI / CD pipelines. Penetration Testing & Red Teaming: Facilitate internal and external penetration testing activities, helping to triage and remediate findings. Security Champion Enablement: Collaborate with engineering teams to build security … bring? 7+ years of experience in Product Security, Application Security, or a related security engineering role. Deep expertise in secure software development, secure coding practices, and OWASP Top 10 / CWE 25. Strong technical proficiency in modern programming languages (e.g., Python, Java, JavaScript, Go, or C#). Experience with cloud-native security (AWS, Azure, GCP) and securing containerized environments … Docker, Kubernetes). Proficiency in security testing tools such as Burp Suite, Endor, Semgrep, etc. Strong background in network security, including firewalls, IDS / IPS, VPNs, and secure network design. Hands-on experience with CI / CD security automation (GitHub Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture More ❯
for access governance, identity life cycle, and privileged access management in alignment with defence-grade standards Security Assurance & Compliance Ensure commission controls comply with MOD policies (eg JSP 440 / JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and … DV Clearance : Must hold active Developed Vetting (DV) clearance (or immediate transfer eligibility) Access Control Expertise : Deep experience in identity & access management, particularly designing and enforcing commission controls, RBAC / ABAC models, access provisioning, and entitlement workflows. Tools & Technologies : Hands-on with identity platforms (eg Active Directory, Azure AD, Okta), PAM / IGA systems, SSO / SAML … / OAuth, and access governance tools. Security Framework Knowledge : Understanding of defence and public-sector security frameworks (JSP 440 / 604, STIGs, ISO27001, Government Functional Standard 007) Incident & Risk Handling : Proven ability to conduct security incident investigations relevant to unauthorized access and remediate gaps. Communication Skills : Strong ability to engage with both technical More ❯
tools for access governance, identity lifecycle, and privileged access management in alignment with defence-grade standards Security Assurance & Compliance Ensure commission controls comply with MOD policies (e.g. JSP 440 / JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and … DV Clearance : Must hold active Developed Vetting (DV) clearance (or immediate transfer eligibility) Access Control Expertise : Deep experience in identity & access management, particularly designing and enforcing commission controls, RBAC / ABAC models, access provisioning, and entitlement workflows. Tools & Technologies : Hands-on with identity platforms (e.g. Active Directory, Azure AD, Okta), PAM / IGA systems, SSO / SAML … / OAuth, and access governance tools. Security Framework Knowledge : Understanding of defence and public-sector security frameworks (JSP 440 / 604, STIGs, ISO27001, Government Functional Standard 007) Incident & Risk Handling : Proven ability to conduct security incident investigations relevant to unauthorized access and remediate gaps. Communication Skills : Strong ability to engage with both technical More ❯
best practices Develop and support cloud security policies and technical standards Conduct security assessments, risk analysis, and contribute to security roadmaps Collaborate with teams to integrate security into CI / CD and cloud-native applications Microsoft Security Stack Configure and manage Microsoft Defender for Cloud, Defender for Endpoint, and Sentinel Deploy Microsoft Purview for compliance and information protection Manage … Work with Azure Key Vault and manage encryption and certificate strategies Collaborate with our SOC and managed Sentinel provider on incident handling Compliance & Governance Help ensure compliance with ISO27001, SOC 2, GDPR, and NIS2 Support configuration and monitoring in Microsoft Compliance Manager Maintain security documentation and assist in audit preparation Configure insider risk management, audit … regulated industries Technical Skills Deep expertise in Azure security and Microsoft Defender suite Advanced skills in Microsoft Sentinel, Purview, Intune, and Defender for Endpoint Strong experience with Entra ID / Active Directory, Conditional Access, and PIM Hands-on with PowerShell and Microsoft Graph API for security automation Familiarity with M365 security, Zero Trust models, and Microsoft Information Protection Knowledge More ❯
in touch today! Responsibilities: Conducting regular security assessments and vulnerability testing. Developing and implementing security policies and procedures. Monitoring network traffic for unusual activity and potential threats using SOC / SIEM solutions. Responding to security breaches and carrying out forensic investigations. Ensuring compliance with industry standards and regulations, including ISO27001 and GDPR. Delivering security … use of best-of-breed products. Collaborating with the IT team to design and implement secure network architectures. Generating automated security reports tailored for executive-level clients. Required Skills / Qualifications: A Bachelor's degree in Cyber Security, Information Technology, or a related field. A minimum of three years' experience in a cyber security role, infrastructure, or advanced third … line support. Strong knowledge of security frameworks and standards such as ISO27001 and GDPR. Expertise in Microsoft 365, SharePoint, Azure architecture, security, and Entra. Proficiency in security tools and technologies, including firewalls, identity management, and layered security stacks. Experience in incident response and forensic analysis. Excellent problem-solving, analytical, and communication skills. Relevant certifications (e.g. More ❯
Leading vulnerability management efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO27001 and supporting audits and certifications. Collaborating across teams to embed security into the core of platform and product development. Delivering internal security awareness initiatives to strengthen … experience in regulated or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS / IPS, SIEM, vulnerability scanners, encryption, SAST / DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). … Proven experience with incident response and threat mitigation. Familiarity with security compliance frameworks (ISO27001, SOC 2, etc.). Security certifications (e.g. Security+, CISSP, or equivalent) are a plus. You'll Thrive If You Are: Comfortable taking ownership and working autonomously in a high-accountability environment. Eager to learn and keep up with the latest in More ❯
them Participate in tabletop exercises and incident simulations Stay close to the latest tactics, techniques & procedures (TTPs) Your fingerprints will be on every layer of our infrastructure from CI / CD pipelines to employee devices to cloud configurations. You'll thrive here if you have: 4+ years in cybersecurity or technical security roles Familiarity with frameworks like NIST, ISO27001, or CIS Controls Working knowledge of networking, OS (Windows / macOS), and security protocols Experience with tools like Splunk, CrowdStrike, Nessus, Palo Alto, Wireshark Basic cloud security knowledge (AWS / Azure / GCP) Scripting experience (Python, Bash, PowerShell) A sharp eye for log analysis, threat investigation & incident response Bonus: Security+ / CEH / CySA+ certs A bit about you You're deeply curious, action-oriented, and thoughtful under pressure. You don't just want to spot problems, you want to fix them, automate the fix, and then teach the team how to prevent it altogether. You want ownership, not hand-holding. You thrive in ambiguity and get a kick More ❯
and team size, the role requires the functional capability and proficiency to technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles / services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. … Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO27001, NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security … Azure: Strong experience managing Microsoft 365 (Exchange, SharePoint, Teams), Azure cloud infrastructure, and security tools such as Microsoft Defender and Sentinel. • Security & Compliance: Deep knowledge of security frameworks (ISO27001, NIST, CIS), compliance requirements (GDPR, SOC2), and risk management best practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO More ❯
to understand client needs and position appropriate cybersecurity services Deliver technical presentations and demos that communicate the value and scope of our services (e.g., penetration testing, red teaming, DORA /ISO compliance, etc.) Support the preparation of proposals, statements of work (SOWs), and RFP / RFI responses Scope and define technical requirements and resource estimates for … role within cybersecurity or IT services Understanding of the cyber threat landscape Familiarity with AWS, Azure, or Google Cloud. Understanding of Cyber Services markets e.g. Penetration Testing, Red Team / Purple Team, Adversary Simulation, risk and compliance frameworks ISO27001, NIST, DORA, CREST. TIBER etc.) Willingness to travel to regular F2F end user meetings Familiarity More ❯
Contract Role - SOC Manager / Cyber Security Operations Manager - Leeds / Remote - 12 Months Initial - Inside IR35 We are seeking an exceptional SOC Manager / Cyber Security Operations Manager to lead our Cyber Security Operations Centre; responsible for managing the day-to-day operations of the SOC team, overseeing incident detection and response, ensuring vulnerability scanning and … remediation efforts across the organization. Role Overview: Job Title: SOC Manager / Cyber Security Operations Manager Location: Leeds / England / Remote Contract Type: Contract Duration: 12 months initially Sector: Healthcare . Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, or a related field (Master’s preferred). Minimum 5 years of experience in cybersecurity operations, with … 27001, NIST, GDPR, or CIS Familiarity with scripting or automation for incident response or scanning processes. Please feel free to contact myself - Daisy Nguyen at Gibbs Consulting / Atrium UK for a confidential chat to know more details about the role. Please also note: Due to the volume of applications received for positions, it will not be More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Become
We're Hiring: DevOps Engineer - Centre of Excellence (Cloud / CI / CD / Automation) Location: London, United Kingdom (Hybrid - Minimum 2 days onsite / week)?? Start Date: Immediate? Engagement Type: Contract - Outside IR35 , 12-month initial term (with potential for extension or permanent employment) Industry: Financial Services / Technology Consulting About the Role We … scalable, and production-grade digital platforms across multiple client engagements in the financial services sector. This role is ideal for an engineer with strong experience in cloud infrastructure , CI / CD pipelines , and infrastructure as code , who thrives in collaborative, high-accountability environments. The successful candidate will play a key role in enabling continuous delivery, platform reliability, and engineering … excellence across the CoE. Key Responsibilities Design, implement, and maintain CI / CD pipelines to support rapid and reliable software delivery Build and manage cloud-native infrastructure (AWS, Azure, or GCP) using Infrastructure as Code (IaC) tools Collaborate with engineering teams to automate deployment, monitoring, and scaling of applications Ensure platform security, compliance, and observability through DevSecOps best practices More ❯
workforce solutions - from recruitment and technology to workforce supply, management, and training - tailored for the infrastructure, construction, and civil engineering sectors. Key Responsibilities: • Manage full lifecycle for 6+ IT / telecoms vendors, including contracts, renewals, and performance reviews • Oversee daily / weekly SLAs, drive service improvements, and align to ITIL metrics • Lead IT governance board; maintain risk register … and support ISO/ cybersecurity compliance • Control £700k IT OPEX budget; track costs and manage asset register • Sponsor supplier-led projects (e.g., ERP, M365); build cases and track benefits • Communicate clearly with execs; use NPS / CSAT to improve supplier service What You ll Bring to the Team: • Managed multi-supplier, outsourced IT & telecoms contracts end … Understanding Microsoft Cloud environment • Run IT Teams across Microsoft stack • Led RFPs, contract negotiations, and vendor performance reviews • Tracked SLAs and supported supplier-led change projects • Familiar with ISO27001, GDPR, and risk reporting • Clear communicator with execs, users, and vendors • Data-driven; focused on cost, service, and risk improvement Certifications & Education: • ITIL v4 Managing Professional More ❯
workforce solutions - from recruitment and technology to workforce supply, management, and training - tailored for the infrastructure, construction, and civil engineering sectors. Key Responsibilities: • Manage full lifecycle for 6+ IT / telecoms vendors, including contracts, renewals, and performance reviews • Oversee daily / weekly SLAs, drive service improvements, and align to ITIL metrics • Lead IT governance board; maintain risk register … and support ISO/ cybersecurity compliance • Control £700k IT OPEX budget; track costs and manage asset register • Sponsor supplier-led projects (e.g., ERP, M365); build cases and track benefits • Communicate clearly with execs; use NPS / CSAT to improve supplier service What You’ll Bring to the Team: • Managed multi-supplier, outsourced IT & telecoms contracts end … Understanding Microsoft Cloud environment • Run IT Teams across Microsoft stack • Led RFPs, contract negotiations, and vendor performance reviews • Tracked SLAs and supported supplier-led change projects • Familiar with ISO27001, GDPR, and risk reporting • Clear communicator with execs, users, and vendors • Data-driven; focused on cost, service, and risk improvement Certifications & Education: • ITIL v4 Managing Professional More ❯
Employment Type: Permanent
Salary: £40000 - £60000/annum Plus up to 10% annual bonus
and team size, the role requires the functional capability and proficiency to technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles / services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting … On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms / solutions. Oversee management of the End User Compute estate via Intune Act upon and proactively manage all estate patch management requirements (on-prem, virtual, & physical) for software, hardware, and … optimal service delivery and value for investment. Negotiate cloud service agreements, monitor SLAs, and ensure vendor compliance with security and data protection policies. Monitor, forecast and efficiency manage vendor / solution spend against defined budget. Oversee third-party SaaS solutions, ensuring they align with the organisation's cloud-first strategy and security requirements. Refine and develop external and internal More ❯