Oversight Own and optimise endpoint security through Intune, ensuring device compliance and integration with Zero Trust. Harden AKS clusters and cloud-native apps through role-based access control (RBAC), secretsmanagement, and runtime protection. Secure data pipelines and models in AI workloads, implementing guardrails for model integrity and prompt injection defence. Cloud & Network Security Engineer secure access and More ❯
for every model decision. *Cloud hand-offs* • Deploy new services into the existing Terraform/ECS stack—extend, don’t rewrite. • Add CloudWatch alarms, log routes and parameter-store secrets where needed. *Quality & Ops* • Write unit and integration tests and set up a lightweight CI pipeline. • Provide concise hand-over docs and 30 days of post-launch bug-fix … cover. Must-Have Skills • Pro in *Python (FastAPI)* or *Node.js (TypeScript/Nest)*—ready to justify your pick. • Experience extending an *AWS stack (Terraform, ECS Fargate, ALB, Secrets Manager, KMS)*. • Hands-on with *LLM APIs* and at least one *vector database* (Pinecone, Weaviate, OpenSearch, etc.). • Multi-tenant data design with GDPR awareness. • CI/CD and automated More ❯
patterns and reference architectures that will drive adoption of modern technology meeting HMRCs business driven need towards rationalised strategic platforms. In addition, you may be encouraged to undertake line management responsibilities developing and managing a team. You may be expected to own and develop CSTS capabilities and/or services. Person specification Ideal candidate: A business and technology leader … development and delivery of technical security controls and services. Focused expertise to develop and lead within one or many security technology domains aligning capability to security tooling. Key stakeholder management experience across senior business and technical environments including vendors, partners and other government departments. Able to demonstrate a proven history of delivering high value outcomes in challenging and complex … the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria: You More ❯