and design patterns. Strong understanding of application architectures, including microservices, API-driven platforms, cloud infrastructure (AWS), and DevOps practices. Familiarity with single sign-on technologies (OAuth, SAML, OpenID Connect), identitymanagement, and enterprise security practices. Expertise in managing operational app deployments at scale with knowledge of crash reporting, device constraints, and network efficiency. Knowledge of modern app development More ❯
Partner closely with PXBPs and Finance team to deliver analytics to the business. Utilize existing technology to automate and provide real-time data and analytics where possible. Partner with IdentityManagement team to configure and manage Single Sign-On (SSO) and SAML for the PX tech stack. Growth opportunities in the People Operations and Total Rewards space are … years as an HR/PX tech and analytics subject matter expert. Deep expertise with HR/PX systems, specifically ADP Workforce Now, and ideally, iCIMS, Learning Management Systems, and employee survey tools. Excellent communication skills in English, both written and verbal, with interpersonal skills to collaborate effectively with internal stakeholders and external partners. Ability to independently develop project More ❯
Responsibilities: Architect and deliver robust, secure, scalable Azure platforms aligned with CLIENT's cloud strategy and regulatory requirements. Design cloud landing zones, subscription models, and core services, including networking, identity, monitoring, and governance. Drive platform automation using Infrastructure as Code (IaC) with Terraform and Bicep. Implement and advocate DevOps practices like CI/CD, GitOps, infrastructure automation, and environment … consistency. Build and maintain deployment pipelines using Azure DevOps and GitHub Actions. Enhance platform stability with self-healing patterns and automated remediation. Enforce Azure governance through Management Groups, Policies (including DENY effects), RBAC, and tagging strategies. Collaborate with security teams to integrate DevSecOps practices and ensure platform compliance with CLIENT's internal standards and industry regulations. Enable and support … Privileged IdentityManagement (PIM), Conditional Access, and Zero Trust controls. More ❯
grow and improve IT operations. Key Responsibilities Provide expert-level support and root-cause analysis for persistent or critical technical issues. Support infrastructure-related tasks such as servers, networking, identitymanagement, and security tools (e.g., EDR/MDR/SOC). Work with third-party vendors and MSP partners to ensure seamless IT operations. Create and maintain detailed More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across … recommendations to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identitymanagement, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust … and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector Compliance Drive the identification and remediation of platform-specific security risks by leading discussions with more senior stakeholders and acting as a point of escalations. Ensure compliance with legal, regulatory, and professional obligations More ❯
from the firm's cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across … recommendations to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identitymanagement, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust … and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector Compliance Drive the identification and remediation of platform-specific security risks by leading discussions with more senior stakeholders and acting as a point of escalations. Ensure compliance with legal, regulatory, and professional obligations More ❯
Security Ensure UNIX systems are hardened and compliant with security frameworks. Manage OS-level security policies including firewall rules, kernel parameters, selinux policies and secure configurations. Integrate systems for identity and privileged access management. Support audit, forensic, and security event investigations in coordination with InfoSec teams. Regularly review and remediate security vulnerabilities identified by Qualys, Nessus, or other scanning … incident response planning, patching SLAs, and compliance reporting. Design and maintain logging, audit trails, and syslog/SIEM integrations Authentication, Authorization, and Directory Services Integrate UNIX systems with enterprise identitymanagement platforms Implement and enforce secure access controls, sudo policies, and RBAC schemes. Collaborate with IAM and InfoSec teams on audit readiness, access provisioning, and PAM integrations. Monitoring … understanding of centralized authentication/authorization. Proficiency in shell scripting (bash, ksh, sh); strong familiarity with Python, and Ansible. Proven experience with infrastructure-as-code principles, Git-driven config management, and CI/CD pipelines leveraging GitHub Actions and Ansible/AWX Familiarity with automated validation, monitoring, logging, and alerting frameworks. Passion for automating operations tasks, reducing technical debt More ❯
managing security and compliance under HIPAA, FDA, and NIST Knowledge of GDPR, ISO 27001, SOC 2 and international security standards Experience with cloud-native environments (e.g., AWS), data encryption, identitymanagement, and secure software development practices Strong communicator who can translate security priorities to technical and non-technical audiences Experience supporting FDA submissions, audits, and documentation Demonstrated ability More ❯
Alloy solves the identity risk problem for companies that offer financial products by enabling them to outpace fraud and confidently serve more people around the world. Banks and fintechs turn to Alloy to take control of fraud, credit, and compliance risk, and grow with the clearest picture of their customers. Check out our investors and read more about us … here . About the team Alloy is a leading provider of digital identitymanagement and supports innovative FinTech companies and banks to manage KYC, AML, and other components of client onboarding. Alloy's single API enables its clients to access over 50 third party data sources in real-time to improve decision-making and streamline client experiences. We … communication skills (oral, written, and interpersonal) to address customer concerns and provide feedback in a friendly, diplomatic and empathetic way; you treat customer problems like your own. Excellent customer management skills to address and prevent escalated issues by interacting, collaborating, and networking with other cross-functional teams to deliver solutions that customers need. Experience with diagnosing complex issues that More ❯
systems architecture, and drive strategy in a fast-paced, forward-thinking environment. What you’ll need: 3+ years in complex IT or consultancy environments Knowledge of HMG SPF, ISO27001, identitymanagement, SIEM, PKI, cryptography, and secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared More ❯
Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++, or similar object-oriented languages Preferred Qualifications Experience with AWS products and services Experience with threat modeling, secure coding, identitymanagement, authentication, software development, cryptography, system administration, or network security Proficiency in programming languages such as Python, Java, or C++ Amazon is committed to equal opportunity employment and More ❯
/or C# Experience with Azure OpenAI, Microsoft Graph API, and Azure AI Search Familiarity with LangChain, Semantic Kernel, or similar orchestration tools Understanding of cloud deployment, security, and identitymanagement in Azure Exposure to financial services or other regulated environments is a strong plus Passion for innovation and building real-world solutions that drive measurable impact Why More ❯
/or C# Experience with Azure OpenAI, Microsoft Graph API, and Azure AI Search Familiarity with LangChain, Semantic Kernel, or similar orchestration tools Understanding of cloud deployment, security, and identitymanagement in Azure Exposure to financial services or other regulated environments is a strong plus Passion for innovation and building real-world solutions that drive measurable impact Why More ❯
we feel supported in the workplace and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security - Experience applying threat modeling or other risk identification techniques or equivalent - Experience with programming languages such as More ❯
best of British TV to fans everywhere. Job Purpose: As a Senior Product Manager within the Product Growth team, you will own the end-to-end subscription and account management journey for BritBox's growing customer base. You will define and execute the product vision for key user journeys such as sign-up, upgrades, billing, cancellations, and account management … Data, and Customer Support teams to drive improvements that maximize customer lifetime value, reduce churn, and fuel sustainable growth. Responsibilities: Define, develop and maintain a clear subscription and account management product strategy and roadmap, aligned to the BritBox global business strategy. Own and evolve the user experience for onboarding, billing, subscription changes, account settings, authentication, and cancellation processes. Identify … all touchpoints. Develop business cases to support product initiatives and work within agreed budgets. Knowledge and Experience Essential Proven experience owning end-to-end customer-facing subscription and account management flows. Strong understanding of subscription models (SVOD, DTC, OTT) and associated technology ecosystems (payment gateways, CRM, identitymanagement). Deep experience using product analytics and customer insights More ❯
platforms. Knowledge of networking concepts such as SDN, routing, VPNs, load balancers, and firewalls. Experience building and maintaining customer relationships, especially in enterprise accounts. Understanding security concepts like encryption, identitymanagement, access control, attack vectors, and penetration testing. About the Role Google Cloud aims to spread the power of cloud computing globally by partnering with educational institutions, government … Responsibilities Identify and qualify business opportunities, address technical objections, and develop strategies to resolve blockers. Support technical relationships through technology advocacy, bid responses, briefings, proof-of-concepts, and product management collaboration. Demonstrate and prototype Google Cloud integrations in customer environments. Assess legacy environments and recommend modernization roadmaps. Advise on enterprise architectures, platforms, and application infrastructure for Google Cloud solutions. More ❯
Extensive hands on experience in application security or similar role PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe More ❯
United Kingdom Job Category: Other EU work permit required: Yes Job Reference: d73b018b6e72 Job Views: 14 Posted: 12.08.2025 Expiry Date: 26.09.2025 Job Description: Venafi is a leader in machine identitymanagement, protecting machine identities that secure our digital infrastructure. We are seeking a highly skilled Senior Software Engineer to join our team, focusing on our cloud platform and … integrating with cloud-native environments like Kubernetes. Responsibilities include: Designing features to improve machine identity security in Kubernetes. Developing backend services in Golang for Venafi's cloud platform. Architecting scalable, distributed microservices. Developing high-performance GraphQL APIs. Ensuring security, scalability, and efficiency of backend systems. Building integrations across teams. Troubleshooting complex technical issues. Improving development processes. Participating in on More ❯
and ensuringworkload migration strategiesare followed Leading workload migration andmodernisation efforts and developingroadmaps Leading Well Architected reviews,ensuring cloud solutions meetbest practice standards Leading cost optimisationinitiatives and developing policies forcost management Leading security strategies,implementing continuous securityposture management Leading identity managementstrategy, integrating userdirectories and secure SSO Leading client network strategy,managing RAM sharing andnetwork performancemonitoring Benefits Discretionary bonus … Team If you would like to join us on our adventure, please apply! Cloudscaler are proud to be an equal opportunity employer, committed to equal opportunities regardless of gender identity, sexual orientation, race, ancestry, age, marital status, disability, parental status, religion or medical history. If you require reasonable adjustments during the recruitment process or within the workplace, please let More ❯
security frameworks and controls to protect cloud infrastructure in our AWS environment. Ensure that security is seamlessly integrated into every layer of the cloud architecture, from network configuration to identity management. Container & Orchestration Security: Partner with Cloud Engineering, DevOps, Platform teams and stakeholders in the deployment of secure containerised environments using platforms like Docker, and ECS. With a focus … application delivery. Infrastructure & Compliance as Code: Comprehensive knowledge of Infrastructure as Code (IaC) practices, including the use of tools like Terraform or AWS CloudFormation to automate the provisioning and management of cloudresources. Strong understanding of Policy as Code frameworks such as OPA or AWS config to enforce security policies and compliance requirements automatically across the infrastructure. Experience in advocating More ❯