Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
Oscar Technology
our security posture, modernise authentication processes, and drive best practices across our CI/CD pipelines. This is a hands-on role with a strong focus on Node.js and identitymanagement, particularly around authentication, automation, and access control. You'll be helping the client complete their migration to a modern identity platform, strengthen automation around onboarding, and … embed "secure by default" principles into everything they build. What You Will Be Doing Designing, developing, and maintaining Node.js integrations and automation tools for the clients identity and access systems Leading secure migrations to the clients new authentication platform, managing cutovers, rollbacks, and feature flag strategies Automating customer onboarding, including keypair management, SSO configuration, and integration workflows Using … CI/CD pipelines (GitHub Actions or similar) Familiarity with AWS services such as API Gateway, Lambda, and CloudWatch A deep understanding of authentication standards (OIDC/SAML) and identitymanagement principles Hands-on experience with observability and monitoring practices Excellent communication skills and a proactive approach to problem-solving Nice to Have Experience with enterprise SSO integrations More ❯
in-depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … Providing solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … SC) or ability to obtain Experienced in ITIL best practices Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID and IdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityMore ❯
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, and identitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation, storage, and … techniques. Collaborate closely with developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust Identity and Access Management (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … The ability to lead critical incident response, make confident, well-informed decisions, and communicate effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identity and access controls. More ❯
or workplace technology roles. Strong technical knowledge of Microsoft 365, Intune, Tanium, Jamf, Okta and Zoom Experience automating tasks using PowerShell, Python, or similar scripting tools. Knowledge of endpoint management, security hardening, and identitymanagement principles. Experience collaborating with teams such as InfoSec, Networking, or Platform Engineering. Excellent troubleshooting, analytical, and communication skills. A passion for using More ❯
a Cyber Product Owner- Legacy Authentication for our airline client who is accountable for the phased modernisation of the organisation’s legacy authentication services. You will work closely with Identity and Access Management (IAM) and Cyber Delivery Assurance teams to ensure secure-by-design principles are applied while reducing reliance on outdated authentication mechanisms. The position requires strong … product ownership, deep understanding of authentication and access control technologies, and the ability to translate business and technical requirements into a clear vision and roadmap for modern, secure identity services Roles and Responsibilities: To be successful in the role, the role holder will be expected to: Drive adoption of secure authentication standards and patterns across BA and IAG Tech … and balance competing priorities, guiding teams and stakeholders towards achieving strategic security and business outcomes. Experience/Skill Proven experience as a Product Owner or similar role within cybersecurity, identitymanagement, or infrastructure modernisation. Strong understanding of authentication and authorisation technologies, including legacy protocols (e.g. NTLM, Kerberos, Basic Auth, LDAP) and modern standards (e.g. SAML, OAuth2.0, OpenID Connect More ❯
day-to-day M365 admin including Outlook, Teams, SharePoint and permissions Configure and maintain Intune, Conditional Access, compliance policies and MAM/MDM Work with Azure basics including AVD, identitymanagement and security Security & Compliance Support Defender suite alerts and investigations Assist with Cyber Essentials activity Follow internal security processes and contribute to improvements Networking & Infrastructure Troubleshoot switches More ❯