the development and design of cybersecurity standard methodologies to all layers of the hosting and application stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secretsmanagement, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard More ❯
the development and design of cybersecurity standard methodologies to all layers of the hosting and application stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secretsmanagement, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. … Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable and developer-friendly. Cloud Security Collaboration : Work alongside infrastructure teams to ensure secure configuration of AWS and Azure environments, with a focus on IAM, network security, encryption, and observability. Architecture & Design Reviews : Provide input and recommendations to ensure new services … focus. Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secretsmanagement, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis More ❯
other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & Access Management (IAM), Privileged Access Management … solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human identities. Automate Security: Implement and integrate tools like … HashiCorp Vault, CyberArk Conjur, AWS Secrets Manager, or Azure Key Vault into CI/CD workflows. Ensure Compliance: Build solutions that meet audit, regulatory, and internal security requirements. Collaborate Across Worlds: Translate IAM/PAM principles into DevOps-friendly processes, working with developers, cloud engineers, and security teams. What We’re Looking For in a Non-Human Identity Manager More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Entasis Partners
other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & Access Management (IAM), Privileged Access Management … solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human identities. Automate Security: Implement and integrate tools like … HashiCorp Vault, CyberArk Conjur, AWS Secrets Manager, or Azure Key Vault into CI/CD workflows. Ensure Compliance: Build solutions that meet audit, regulatory, and internal security requirements. Collaborate Across Worlds: Translate IAM/PAM principles into DevOps-friendly processes, working with developers, cloud engineers, and security teams. What We’re Looking For in a Non-Human Identity Manager More ❯
impact, and recommended remediation steps: including executive summaries and technical findings. Validate remediations and conduct retesting cycles. Track and manage issues via Jira workflows and developer tickets. Advise on secretsmanagement, IAM, and secure deployment practices. Educate development and operations teams on security best practices and emerging threats. Your Profile Essential skills/knowledge/experience: Strong application More ❯
sprint planning, threat modeling, and secure design reviews. Produce detailed reports with executive summaries, technical findings, and actionable remediation guidance. Validate remediation efforts and perform retesting cycles. Advise on secretsmanagement, IAM, and secure deployment practices. Educate and collaborate with development and operations teams on security best practices. Required Skills & Experience Strong application security knowledge (OWASP Top More ❯
OpenShift), CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secretsmanagement tools like HashiCorp Vault Vulnerability management solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/ More ❯
infrastructure-as-code (Terraform, Helm) Understanding of security frameworks (ISO 27001, NIST, CIS Benchmarks) Bonus Points Certifications: AWS Security Specialty, CISSP, or CKS Experience with zero-trust architectures or secretsmanagement (Vault, AWS KMS) Contributions to open-source security tools or DevSecOps communities With Myn, you gain a trusted partner dedicated to helping people excel in their careersconnecting More ❯
AKS), Terraform, Azure DevOps. Develop, deploy, and manage containerized applications using AKS. Ensure high availability and scalability of microservices. Implement best practices for container orchestration and monitoring. Implement automated secretsmanagement workflows. Design and maintain CI/CD pipelines using Azure DevOps. Automate testing, building, and deployment processes. Integrate with other tools and services for seamless workflows. Develop More ❯
cloud infrastructure across Cloud (Azure, AWS) and on-prem environments. Implement and maintain Infrastructure as Code (e.g. Terraform, Azure ARM/Bicep, AWS CloudFormation, and Ansible). Automate configuration management and routine tasks (e.g. Python, Bash). CI/CD & GitOps Maintain and optimize infrastructure, Pipeline-as-Code and shared libraries (e.g. TeamCity, Jenkins). Implement AI deployments and … Helm, ingress controllers, and service meshes to manage complex deployments. Security & Compliance Integrate security tools such as Snyk, Trivy, OWASP ZAP, and SonarQube into CI/CD pipelines. Manage secrets using HashiCorp Vault, AWS Secrets Manager, and Azure Key Vault. Operate cloud-native security services like Azure Defender, AWS GuardDuty, Security Hub, Inspector, and Config. Monitoring & Observability Build More ❯
and leading practical delivery. Key Responsibilities: Design, implement, and maintain secure CI/CD pipelines across multiple teams. Integrate security tools and practices into DevOps workflows (SAST, DAST, SCA, secretsmanagement). Collaborate with development, operations, and security teams to implement secure coding and deployment practices. Provide practical guidance on threat modelling, risk assessments, and vulnerability management. Advise More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identity and access management (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable … data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and AI/ML workloads. Leverage automation frameworks and IaC to More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … Apply SRE principles to improve reliability, performance, and maintainability of security services. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards More ❯
Java, JavaScript, Groovy, JSP, HTML, XML, SQL, Bash. Experience with build tools like Maven and Gradle. Knowledge of relational DBMS such as Postgres. Experience using AWS services via Terraform (Secrets Manager, Kinesis Firehose, S3, Open Search, etc.). Familiarity with monitoring tools like New Relic and Kibana for metrics and alerts. Experience with Docker, containers, Helm, Kustomize, and Kubernetes … management tools. Knowledge of networks, AWS ACM certificates, VPCs, transit gateways is a plus. Responsibilities: Serve as a primary technical contact for external resources. Contribute to design and development of system components. Collaborate with customers and end users. Lead coding and technical problem-solving efforts. Finalize requirements with technical teams. Design complex data models. Mentor and lead developers in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
City of London Salary: £100,000 - £120,000 + Bonus Are you an experienced Security Engineer with a passion for safeguarding systems and driving innovation in identity and access management? Do you thrive in complex environments where you can solve critical security challenges and influence long-term strategy? If you're driven by excellence, collaboration, and the opportunity to … where you'll help shape a market-leading digital platform and deliver secure, cutting-edge customer experiences. Ideal Candidate: Strong hands-on expertise with Hardware Security Modules (HSM), AWS Secrets Manager, and certificate lifecycle management (rotation, revocation, automation) Experienced with GitLab CI/CD pipelines, AWS CLI, and automation tooling (Chef or similar) Proven background in Cloud Security … with deep knowledge of: - AWS security controls, policies, and automation - Role-based and attribute-based access controls - Cryptographic protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability More ❯
Hybrid - City of LondonSalary: £100,000 - £120,000 + Bonus Are you an experienced Security Engineer with a passion for safeguarding systems and driving innovation in identity and access management? Do you thrive in complex environments where you can solve critical security challenges and influence long-term strategy? If you're driven by excellence, collaboration, and the opportunity to … where you'll help shape a market-leading digital platform and deliver secure, cutting-edge customer experiences. Ideal Candidate: Strong hands-on expertise with Hardware Security Modules (HSM), AWS Secrets Manager, and certificate lifecycle management (rotation, revocation, automation) Experienced with GitLab CI/CD pipelines, AWS CLI, and automation tooling (Chef or similar) Proven background in Cloud Security … with deep knowledge of:- AWS security controls, policies, and automation- Role-based and attribute-based access controls- Cryptographic protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetration testing and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
of support requests are the Team's goals.Knowledge and experience of build tools - Maven and Gradle Knowledge and experience of relational DBMS - PostgresdbKnowledge of using AWS services via Terraform - Secrets Manager, Kinesis Firehose, S3, Open Search etcKnowledge and experience of configuring and using New Relic, Kibana for observing metrics and configuring alerts.Knowledge and experience of using Docker, containers, helm … processes, coding best practices, and code reviews. • Operate in various development environments (Agile, Waterfall, etc.) while collaborating with key stakeholders. • Train entry-level software engineers as directed by department management, ensuring they are knowledgeable in critical aspects of their roles. Responsibilities: We promote a healthy work/life balance across the organisation. We offer an appealing working prospect for More ❯
of support requests are the Team's goals.Knowledge and experience of build tools - Maven and Gradle Knowledge and experience of relational DBMS - PostgresdbKnowledge of using AWS services via Terraform - Secrets Manager, Kinesis Firehose, S3, Open Search etcKnowledge and experience of configuring and using New Relic, Kibana for observing metrics and configuring alerts.Knowledge and experience of using Docker, containers, helm … processes, coding best practices, and code reviews. • Operate in various development environments (Agile, Waterfall, etc.) while collaborating with key stakeholders. • Train entry-level software engineers as directed by department management, ensuring they are knowledgeable in critical aspects of their roles. Responsibilities: We promote a healthy work/life balance across the organisation. We offer an appealing working prospect for More ❯