stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Capgemini Invent
secure business outcomes for our clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data andidentity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our security specialists and innovators enable our clients to evaluate cyber risks, redesign Cybersecurity operating models, modernise … digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. We continuously recruit across a range of experienced hire grades for our DT&S practice. … often the first step in engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threat modelling, risk managementand security overlay approaches by conducting security maturity assessments. Developing new security strategies to manage emerging risks in Cloud & agile/DevSecOps operating environments. Providing a business understanding of More ❯
AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and … controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory requirements. Collaborate Across Teams More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Capgemini
secure business outcomes for our clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data andidentity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our security specialists and innovators enable our clients to evaluate cyber risks, redesign Cybersecurity operating models, modernise … digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. We continuously recruit across a range of experienced hire grades for our DT&S practice. … often the first steps in engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threat modelling, risk managementand security overlay approaches by conducting security maturity assessments. Providing a business understanding of technical domains and tailoring these to help clients maximise value and leverage quick wins on More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
AWS security operations, implementing comprehensive security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and … controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and … respond to security incidents, conducting forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as, CIS, ISO 27001, NIST, and regulatory requirements Collaborate Across Teams More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance #J-18808-Ljbffr More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance We know our colleagues work tirelessly to make JD Sports the success it is today and in turn, we offer them some amazing benefits including staff Discount More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lonza
that’s the kind of work we want to be part of. The IAM Engineer for directory services at Lonza, you will be responsible for the design, implementation, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) across the organization's global infrastructure. Your role will involve ensuring the security, availability, and scalability of these … directory services, which are critical to the company's identityandaccessmanagement framework. You will work closely with cybersecurity, IT operations, and business units to develop and enforce access control policies, manage user identities, and support seamless integration with both cloud and on-premises applications. Additionally, you will ensure that the … while continuously evaluating and adopting emerging technologies to enhance the organization's security and operational efficiency. Key responsibilities: Design and Implementation of Directory Services: Lead the design, deployment, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) environments, ensuring they are secure, scalable, and optimized for performance. Develop and implement policies for directory services that More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
optimization. Ensure compliance with industry regulations (e.g., FCA, GDPR) and internal security policies. Implement backup, disaster recovery, and high availability strategies in the cloud. Manage identityandaccessmanagement (IAM), security groups, and networking configurations. Automate deployment pipelines and configuration management using DevOps practices and CI/CD tools (e.g., GitHub Actions … Scripting or automation experience (PowerShell, Bash, or Python). Familiarity with monitoring and logging tools such as Azure Monitor, CloudWatch, or Datadog. Understanding of IT governance, compliance, and risk management within financial services. Desirable Qualifications: Relevant cloud certifications (e.g., Microsoft Certified: Azure Solutions Architect , AWS Certified Solutions Architect , etc.). Experience with hybrid cloud and on-prem to More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer – Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … the following technologies: • Entra Collaboration Solutions (B2B, B2C) • Identity Models: Managed (PHS/PTA) vs Federated • Hybrid Identity Solutions • Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: • Active Directory Federation Services (ADFS) or third-party federation • Privileged IdentityMore ❯
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from NCC Group Global Talent Acquisition Partner | Global Managed Services | Consulting & Implementation & IdentityAccessManagement | NCC Group Cyber Security Senior Consultant Role Purpose NCC Group provides Information Assurance consultancy to help companies protect critical systems and information. We … client base. In addition to your technical skills, you will have strong client facing skills and be comfortable dealing with senior client stakeholders. Summary Liaise with the Resource Managementand Pre-Sales team during the sales cycle to assist in quantifying, pricing and assessing resources required for the project delivery. Assist with sales proposals, bids and tenders for … act as mentor to less experienced consultants and foster knowledge sharing throughout the delivery team. What we are looking for in you Skills Have strong skills in Sentinel management & optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & Data Loss Prevention (DLP) Experienced in More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
other stakeholders to implement robust security practices and tooling across the company. Your Impact Develop and implement security measures that protect the organization's information assets from unauthorized access or misuse. Collaborate closely with IT to harden the enterprise environment using industry best practices. Evaluate, deploy, and manage security tools for monitoring, data loss prevention, infrastructure, network, and … modern technology environment. Proven experience deploying and managing endpoint security solutions. Familiarity with public cloud platforms such as AWS, Azure, or GCP. Working knowledge of identityandaccessmanagement protocols (SAML, OAuth, SCIM). Experience with email security controls and protocols such as SPF, DKIM, and DMARC. Proficiency in scripting languages (e.g., Python, Bash … a place that thrives on diversity, equity, inclusion, and belonging. We believe in a hiring and working environment where all people are respected and valued, regardless of gender identity or expression, sexual orientation, religion, ethnicity, age, neurodiversity, disability status, citizenship, or any other aspect which makes people unique. We hire you for who you are, and we want More ❯
Senior Software Engineer – Client Identity 2 weeks ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless … of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). Implement secure authentication mechanisms such … as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive continuous improvement of engineering practices, coding standards, and deployment processes. Collaborate with Product Owners to More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive managementand the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue … Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerability management, cyber threat management, information risk management, data leakage protection, identity & accessmanagement, cyber resilience. Knowledge of new and emerging More ❯
and partners, providing collective experience from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer facing role. You will be required … more sensitive workloads to AWS. You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site to customers to deliver projects … of enterprise risk management methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations - Significant experience in IT security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios - Understanding architectural implications of meeting More ❯
at Barclays Internal Audit as a Cyber Audit AVP where you will collaborate with cross-functional teams to provide independent and reliable Cyber Security audit assurance to executive managementand the Board on governance, risk management, and control effectiveness. In this role, you will contribute to audit planning and execution, risk assessment, control evaluation, and issue … Cyber Security. Experience in developing and executing assurance testing approaches in some of the following areas: data security (including cryptography), security configuration, network security, cyber incident response, vulnerability management, cyber threat management, information risk management, data leakage protection, identity & accessmanagement, cyber resilience. Knowledge of new and emerging More ❯
Management (SIEM) tools, and respond to security incidents in a timely and effective manner. Collaborate with cross-functional teams to develop and enforce identityandaccessmanagement (IAM) policies and network access control (NAC) solutions. Stay abreast of the latest security threats, industry trends, and best practices to proactively enhance … science, Information Technology, or related field. Proven experience in network security, with a strong understanding of network security fundamentals, encryption technologies, and secure network design principles. Zscaler Private Access & Internet Access Proficiency in configuring, managing, and troubleshooting firewalls. Cisco, Palo Alto etc,. Experience with intrusion detection/prevention systems, as well as with SIEM tools More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
SafetyCulture
Pre-Sales) , you’ll partner closely with Sales, Product, and Implementation Partners to design scalable solutions that fit seamlessly into our customers’ IT environments. From identityandaccess to data and reporting, you’ll play a vital role in helping our enterprise customers unlock the full value of the SafetyCulture platform. How will you spend your … time Enterprise Integration Leadership : Design and guide technical strategies to connect the SafetyCulture platform with customer systems across identity (SSO, SCIM), integrations (API, middleware, third-party apps), and data/reporting layers. Identity & AccessManagement : Advise customers on best practices for identity integration, including SSO, SCIM, and role-based access. … functions, from Sales to Product to Services. Experience supporting pre-sales and services delivery cycles. More than a Job Hybrid working arrangement with an onsite chef, snacks, and beverages Access to professional and personal training and development opportunities; Hackathons, Workshops, Lunch & Learns; We encourage involvement in the community, open source work, attending talks and events, and experimenting with More ❯