and security teams, to ensure cryptographic solutions align with business objectives, security policies, and regulatory requirements. Develop, implement, and maintain IdentityandAccessManagement solutions and systems. Assistant Vice President Expectations Advise and influence decision making, contribute to policy development, and ensure operational effectiveness. More ❯
and processes. Good knowledge across a range of infrastructure capabilities: networks, compute, storage, cloud technologies, unified communications, data hosting, messaging, identityandaccessmanagement, security and end user compute. Keeps abreast of IT trends and uses this to identify areas of improvement. Ability to More ❯
Manager to join their team. The Ideal Candidate will need: Excellent understanding of technology and security fundamentals. Experience in technical project/programme management, either in corporate IT, professional services, consulting or product development … or 4 years of experience in an IT system administrator role. Experience with PaaS and SaaS technologies including collaboration tools, identityandaccessmanagement (IAM). Excellent organisational, analytical and influencing skills. Ability to speak and write in English fluently and idiomatically. Preferred Qualifications More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
environment, Operational Technologies. Knowledge of security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR). Experience with SIEM solutions, endpoint security, andidentity & access management. Ability to conduct risk assessments and develop mitigation strategies. What's on Offer Competitive salary and benefits package. Opportunity to More ❯
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
Senior Software Engineer - TypeScript, Node.js, AWS, Cybersecurity, Cloud Security, IDAM/IAM, MFA, Ping Identity, REST APIs, Investment Management - Central Manchester A global Investment Manager is seeking a Senior Engineer skilled in TypeScript and Node.js development on AWS to join their Security Architecture and Engineering team … engineering on AWS Backend development experience in Python is a plus Previous experience in security engineering and architecture is highly advantageous Knowledge of customer IDAM tools such as Ping Identity is beneficial Experience in finance is helpful but not essential If you are interested in Cybersecurity and building More ❯
technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
workflows to improve performance and scalability. Refactoring existing pipelines into reusable templates to support the onboarding of new datasets. Azure SQL: Integrating database access with Microsoft Entra ID for improved identityandaccess management. Designing and implementing STAR schema models to support analytical workloads. More ❯
software engineering and IT patterns. Strong documentation and decision-recording capabilities. Experience in on-prem and hybrid cloud solutions. Strong security awareness, including identityandaccess management. Expertise in observability and monitoring solutions. What They Offer : Learning Opportunities: Access to training, workshops, and professional More ❯
software engineering and IT patterns. Strong documentation and decision-recording capabilities. Experience in on-prem and hybrid cloud solutions. Strong security awareness, including identityandaccess management. Expertise in observability and monitoring solutions. What They Offer: Learning Opportunities: Access to training, workshops, and professional More ❯
and perform reviews to provide assurance of information security controls effectiveness. Be responsible for establishing and implementing the information security and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure … Proven experience in a GRC Analyst role Experience of mentoring or managing team members Strong knowledge of Security controls across Microsoft based technologies, Endpoints, IdAM, Networks, Applications, Email and Cloud. Experience of authoring governance documentation (standards, policies, reporting, proposals, analysis). Experience of delivering culture, training and awareness programmes. Experience More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
and perform reviews to provide assurance of information security controls effectiveness. Be responsible for establishing and implementing the information security and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure … Proven experience in a GRC Analyst role Experience of mentoring or managing team members Strong knowledge of Security controls across Microsoft based technologies, Endpoints, IdAM, Networks, Applications, Email and Cloud. Experience of authoring governance documentation (standards, policies, reporting, proposals, analysis). Experience of delivering culture, training and awareness programmes. Experience More ❯
no two days will be the same. Experience in SIEM, SOAR, or Managed Security Services is essential. Additional hands-on experience with DDoS, WAF, IDAM, EDR, MDM , or Vulnerability Management is highly desirable. They are also open to candidates from operational security backgrounds who wish to transition into More ❯
SOAR, or Managed Security Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or Vulnerability Management ? Even better. They're also super open to people who are coming from an operational security background andMore ❯
SOAR, or Managed Security Services , you're exactly the kind of person they want to speak with. Any hands-on background in DDoS, WAF, IDAM, EDR, MDM , or Vulnerability Management ? Even better. They're also super open to people who are coming from an operational security background andMore ❯