London, South East, England, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Ltd
experience with the likes of Microsoft Sentinel, Entra, Intune, Defender and, of course, Microsoft Azure. You must have worked at Enterprise level previously and have experience with IAM (Identity & AccessManagement) controls. Experience with CIS (Centre for Internet Security) and NIST (National Institute of Standards & Technology) frameworks. This is a great contract opportunity andMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Eames Consulting
technology areas. You'll take the lead on complex audit engagements, What you'll be doing: Leading and executing audits across core technology risk areas including Cyber Governance, Identity & AccessManagement, Network Security, Cloud, and AI Providing independent assurance over key cyber and infrastructure controls Partnering with senior stakeholders across Technology and Risk to … share findings and drive improvements Supporting the wider audit team with subject matter expertise in areas like Data Protection, Threat Management, and Emerging Technologies What we're looking for: Proven experience in IT or Cyber Security auditing, ideally within financial services or a regulated industry Strong technical understanding of cyber risk domains and infrastructure controls Ability to lead More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
Reigate, Surrey, South East, United Kingdom Hybrid / WFH Options
Client Server
improve cloud technologies including automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter … home. About you: You have experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure … subscriptions You have a good knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting (PowerShell or similar) skills You More ❯
standards, and guidelines for cloud services, ensuring alignment with regulatory requirements and internal security frameworks. Provide expertise and guidance on data protection, network security, andidentityandaccessmanagement within cloud platforms. Preferably, assess and enhance the security of Salesforce, including data security, access controls, and compliance. Desirable Qualifications: 6+ years of More ❯
ID/Active Directory. Skilled in Office 365 deployment and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusion detection/… prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identityandaccessmanagement tools like Azure AD, MFA, and SSO. Experience designing and implementing security protocols. Comfortable managing cybersecurity incidents and maintaining compliance with standards such as GDPR More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, andaccess logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function on threat modelling, security reviews, and AI-specific control design. Enterprise Integration: Integrate with … enterprise IdentityandAccessManagement (IAM) systems, enforcing Role-Based Access Control (RBAC) and least privilege principles. Compliance Support: Conduct vulnerability scans, manage pen-test remediation, and assist in internal and regulatory audits (FCA, PRA). Required Knowledge & Experience: Proven experience delivering greenfield AI systems in production with secure-by-design architecture. More ❯
experience in IT infrastructure support and administration. Strong technical knowledge in Microsoft 365, Google Workspace, Windows OS, Active Directory, Backup and Disaster Recovery. Proficient in IdentityandAccessManagement platforms (e.g., Entra ID, Okta). In-depth understanding of server technologies, enterprise storage, network protocols, and infrastructure components. Skilled in managing and deploying resources … within public cloud environments (e.g., Microsoft Azure, AWS). Familiar with virtualisation infrastructure (e.g., VMware, Nutanix, Hyper-V, Azure Stack HCI). Knowledgeable in Mobile Device Management platforms (e.g., Intune, Mosyle, JAMF). Well-versed in ITIL frameworks and best practices. Experience with Desktop as a Service (e.g., Citrix, AVD), automation tools (e.g., PowerShell, Power Automate), and Linux More ❯
and fully aligned with the evolving needs of our research teams and scientists driving global pathogen research. Key Responsibilities: Manage our object data storage, ensuring efficient design, tiering, andaccess controls. Build and manage our research compute environment for running bioinformatics pipelines and interactive analytics. Ensure the data platform meets disaster recovery standards. Ensure cloud resources are managed … and follow through on opportunities for improvement. Essential Knowledge, Skills and Experience: Strong hands-on experience with cloud infrastructure, ideally Oracle Cloud and its portfolio, including provisioning, configuration, andmanagement of services. Ability to automate everything using Terraform and appropriate toolchains. In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes. Solid understanding of cloud … security best practices, including identityandaccessmanagement (IAM), network security, and encryption. Experience with Git or other version control systems. Desirable Knowledge, Skills and Experience: Certifications in Oracle Cloud (OCI) or other cloud platforms (AWS, GCP). Experience with Jira, Confluence, or similar project management tools. Knowledge of compliance frameworks andMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of assigned controls, documenting results clearly and raising issues where appropriate Ensure timely delivery of assigned control … of quality and accuracy. Strong understanding of Cyber Security Domains including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identityandaccessmanagement, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK More ❯
both visionary direction and practical stewardship across all core domains-ranging from Wintel server estates through network architecture to end-point administration, Unix systems integration, database stewardship, storage management solutions, backup technologies, and cloud-based services. You will act as the ultimate escalation point for complex technical challenges while collaborating extensively with architectural teams on solution design. Your … responsibilities extend to overseeing seamless service delivery; imparting expert guidance on portfolio management; ensuring robust risk mitigation; managing substantial budgets; orchestrating disaster recovery strategies; nurturing team development; maintaining exhaustive documentation; evaluating vendor relationships; reporting on key metrics; supporting regional operations; managing third-party providers; planning upgrades; enforcing stringent security protocols; and championing continuous enhancement throughout the infrastructure lifecycle. … What you bring: * Extensive experience exceeding ten years in IT infrastructure management within large-scale multinational organisations with at least five years occupying senior or regional leadership positions.* Profound technical proficiency encompassing Wintel platforms (Windows Server 2016/2019/2022), Linux system administration, enterprise-grade databases (SQL/Oracle), VMware virtualisation (SRM/Aria monitoring), Exchange Online More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with service operations procedures. · Conduct full … Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly and concisely. Plans and manages own More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
IT Talent Solutions Ltd
environment. Strong knowledge of Azure IaaS and PaaS services, including Functions, App Services, Azure SQL, Key Vault, and API Management. Deep understanding of cloud security, identityandaccessmanagement (Azure AD), and governance (Azure Policy, Blueprints). Familiarity with microservices, event-driven architectures, and container technologies (Docker, AKS). Ability to translate complex technical More ❯
Employment Type: Full-Time
Salary: £50,000 - £70,000 per annum, Negotiable, Inc benefits
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in SailPoint with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … security/operational network architecture design Must have proficient knowledge and experience with SIEM technologies Strong troubleshooting, reasoning and problem-solving skills Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN etc. Excellent communications skills Exceptional Time Managementand organizational skills Ability to conduct forensic analytical studies and investigations effectively and efficiently Knowledge of More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in StrongDM with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in BeyondTrust with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications click apply for full job details More ❯