Perth, Perthshire, Scotland, United Kingdom Hybrid / WFH Options
Harvey Nash
role in cybersecurity, identity management, or access governance. Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). Experience working in Agile environments and with tools such as Jira, Confluence More ❯
Perth, Scotland, United Kingdom Hybrid / WFH Options
Harvey Nash Group
role in cybersecurity, identity management, or access governance. Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). Experience working in Agile environments and with tools such as Jira, Confluence More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Canonical
cloud native operations products, including: Juju - the open source orchestration engine for software operators Identity management - authentication, authorization, and identity governance across Ubuntu One SSO and other products Observability - strategy for tracing and system health diagnostics Location: Remote in the EMEA region, with expectations to be based there. Responsibilities include More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Version 1
experience in the following areas: Required: Oracle Cloud Infrastructure 2023 Architect Associate (1Z0-1072-23) OCI support, including user management, IAM policies, and AD SSO integrations Experience with IPSec VPNs, network routing, and security group issues in OCI CloudGuard experience and alert resolution DevOps skills, particularly Terraform scripting Basic Linux More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Hymans Robertson LLP
leveraging Microsoft Graph to integrate M365 services Experience of Azure DevOps tools and services, including cognitive services and migrations Singlesign-on design and implementation Strong understanding of cybersecurity principles and best practices, particularly within M365 and its associated tools Self-motivated with analytical More ❯