Monitor, Log Analytics, and Security Center . Expertise in database backup, recovery, and disaster recovery planning. Experience implementing security best practices, including RBAC, encryption, and auditing . Strong understanding of performance tuning techniques , including indexing strategies and query optimization. Familiarity with PowerShell scripting and Infrastructure as Code (IaC More ❯
Containers, lifecycle rules, access policies, secure access patterns. Azure Web Apps and additional cloud services where needed. Maintain and enhance IaC for RBAC, Entra ID (Azure AD), and secure external access. Support flexible deployments and environment replication across dev/test/prod. DevOps & Deployment Automation Build and More ❯
routing and switching, including protocols like BGP, OSPF, and MPLS. Deep understanding of network security principles (e.g., ACLs, firewalls, VPNs, 802.1x authentication, profiling, RBAC). Familiarity with network monitoring tools/protocols and logging pipelines (e.g., SNMP, Syslog, Netflow, ELK Stack, Grafana). Strong knowledge of cloud platforms (e.g. More ❯
security and identity access management. Familiarity with Cloudflare security services. Expertise in Microsoft Defender security operations. Advanced knowledge of Microsoft RBAC and PIM. Experience in threat detection and incident response. Hands-on experience with Microsoft Dataverse. Experience with Azure Firewall settings and Azure Virtual Network (VNet More ❯
SAP Business Warehouse and Master Data Management. Experience with integration patterns and methods like REST, JSON, XML or SOAP web services. Knowledge of SSO, RBAC, MFA in Azure AD and other modern authentication concepts. Up-to-date knowledge of cybersecurity threats, current best security practices, threat modelling and risk More ❯
knowledge of containerisation (e.g., Kubernetes/Docker/OpenShift) Experience with Terraform, CI/CD pipelines, automation tooling Understanding of platform security, IAM, RBAC, and cloud governance Agile/DevSecOps environment experience a plus Must hold active SC or DV Clearance, or be fully UKSV DV eligible (sole British More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Searchability NS&D
knowledge of containerisation (e.g., Kubernetes/Docker/OpenShift) Experience with Terraform, CI/CD pipelines, automation tooling Understanding of platform security, IAM, RBAC, and cloud governance Agile/DevSecOps environment experience a plus Must hold active SC or DV Clearance, or be fully UKSV DV eligible (sole British More ❯
to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identity and access management using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks such as; TOGAF Work More ❯
to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identity and access management using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks such as; TOGAF Work More ❯
essential governance features such as metrics tracking, audit logs, security measures and role-basedaccess controls (RBAC), to ensure compliance, transparency and enterprise readiness across AI systems. Holistic Thinking: Think critically about the interactions between AI models and product components to ensure More ❯
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
Python, SQL, and Scala for data processing. Strong understanding of Azure networking, security, and IAM , including Azure Private Link, VNETs, Managed Identities, and RBAC . Deep knowledge of enterprise-scale data architecture patterns , including Lakehouse, Medallion Architecture, and hub-and-spoke models . Strong problem-solving skills and ability More ❯
based on the level of database access the user/groups require - Individual/Group/Rolebased (Security). Knowledge of cross connectivity to various data sources - SQL Server/Oracle/Access/Informix/Azure More ❯
is a plus. Deep and proven technical knowledge in Risk/Fraud and Identity and Access technologies - SSO, SAML Federated Identity, OAuth, OIDC, RBAC, REST APIs, Certificates and Management (trust chain), Identity Orchestration, WebAuthn (FIDO2 Passkeys). Technical awareness of AWS, Azure, GCP cloud architectures and OpenShift and Kubernetes More ❯
Certification with CKA or CKAD is a plus! Demonstrable experience with the following security principles and technologies: SSH, PKI, 2FA, SSO (SAML, OIDC), RBAC Exceptional hands-on software troubleshooting, testing, and debugging skills with a tenacity to identify and resolve the technical issue that may arise Outstanding soft skills More ❯
with major cloud providers, especially AWS and Azure - Containerization: Proficient with Docker for containerizing applications. - Orchestration: Deep experience with Kubernetes, including cluster provisioning, autoscaling, RBAC, and network policies. - CI/CD Pipelines: Experience building and maintaining CI/CD pipelines using tools like GitHub Actions, GitLab CI, Jenkins, or ArgoCD. More ❯
Experience & Skills: Extensive hands-on experience with Microsoft Azure in a production environment. Strong knowledge of Entra ID (Azure Active Directory) – including group policies, RBAC, and identity management. Expertise in VMware (ESXi, vCenter) for managing virtual machines. Solid background in Windows Server administration and support (2016/2019/ More ❯
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging More ❯
services and REST APIs Experience in mentoring, serving as a tech lead, or leading an engineering team Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require 5+ years of software development experience 2+ years of experience contributing to the system design More ❯
to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-BasedAccessControl), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber … testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government More ❯
service communication. Configuring identity-aware proxy (IAP) services and secure APIs with authentication and authorization layers. Developing policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC) + Just-in-Time (JIT) access. Automating IAM More ❯
service communication. Configuring identity-aware proxy (IAP) services and secure APIs with authentication and authorization layers. Developing policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC) + Just-in-Time (JIT) access. Automating IAM More ❯
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯