migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP … and implementing Azure landing zones and hybrid cloud environments. Expert-level knowledge of core Azure services including Azure IaaS, Azure Networking, and Azure Active Directory. Deep expertise in identity federation and single sign-on (SSO), with hands-on experience integrating Okta with Azure AD. Strong understanding of traditional on-premises infrastructure services including Domain Controllers , Certificate Services , DNS More ❯
AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure, and troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and … and Incident Response Monitor AWS security alerts and incidents using AWS tools. Respond to and mitigate threats in real-time, conducting post-incident analysis and documentation. Risk and Compliance Management Conduct regular security assessments and audits to ensure compliance with industry standards (ISO 27001, SOC 2, etc.). Develop strategies to address vulnerabilities and mitigate risks. Collaboration and … Expertise in Checkpoint Firewall managementand troubleshooting Proficiency in Infrastructure as Code (IaC) tools like AWS CloudFormation and Terraform In-depth knowledge of IdentityandAccessManagement (IAM), VPC security, and encryption techniques Experience with network defense, vulnerability management, and incident response Familiarity with DevSecOps and integrating security within CI More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP More ❯
reviews ensuring secure integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army … & accessmanagement, and secure system integration. Skilled in architectural modelling (Sparx EA) and familiarity with Defence standards and frameworks. Excellent communication and stakeholder management across technical and non-technical teams. More ❯
Andover, Hampshire, South East, United Kingdom Hybrid/Remote Options
Data Careers
reviews ensuring secure integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army … & accessmanagement, and secure system integration. Skilled in architectural modelling (Sparx EA) and familiarity with Defence standards and frameworks. Excellent communication and stakeholder management across technical and non-technical teams. More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Atrium Workforce Solutions Ltd
/Hybrid (hybrid: 2 days in office) Contract Type: Contract Duration: 12 months Sector: Banking Good understanding of Cyber Security Standards and compliance needs and including Network Security, Identity & AccessManagement, Data Security, and Cyber Governance Strong and experienced professional able to derive and drive the remediation activities (with minimum guidance from CISO) for … a complex technology divestment process Strong stakeholder management skills able to engage with key stakeholders including, coordinating with RTB and CTB Teams and teams within wider CISO and Technology functions. Strong organisational and project reporting skills. Attention to details and at the same time ability to communicate complex issues in simplest terms for the higher management. Ability to More ❯
Oracle Database Developer-IAM Project Oracle Database Developer with expereince of Oracle RDBMS (v19c or later), is urgently needed to support our higher education client their Identity & AccessManagement (IAM) project on a 12-month contract. Oracle Database Developer-IAM Project-Essential Expereince Oracle RDBMS - version 19 or later: good knowledge of its structure More ❯
Containerisation and orchestration (Docker, Kubernetes) Modern development frameworks (React, Node.js, Next.js, Python) Databases such as DynamoDB, MongoDB, or RDS CI/CD pipelines (GitHub Actions) Identityandaccessmanagement (SSO, federated identity, Okta) Exposure to high-availability architectures, monitoring, and troubleshooting Strong communication skills, with the ability to engage both technical andMore ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Principal Consultant, you'll work directly with major enterprise customers, playing a strategic role in advisory, design … engagements Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
South East London, London, United Kingdom Hybrid/Remote Options
Anson Mccade
secure SDLC, API security and DevSecOps practices Conduct security risk assessments, architecture reviews and produce high-level and low-level security designs Advise engineering and product teams on identity, encryption, zero trust, network security and data protection approaches Work alongside client CISOs, architects and delivery teams, providing strategic security guidance Support bid work, proposals and shaping of security … Azure or GCP security architecture (certifications desirable) Hands-on experience embedding security into application design, APIs, CI/CD pipelines and DevOps workflows Knowledge of identityandaccessmanagement (OAuth2.0, OpenID Connect, SSO), encryption, container security (Docker, Kubernetes) and zero trust principles Strong stakeholder engagement skills able to influence technical and non-technical audiences More ❯
proposed solutions. Understand client requirements deeply and translate them into effective and innovative cloud solutions that address their specific needs within the defenceand national security context. Collaboration and Stakeholder Management Work closely with engineering, security, operations, and business development teams to ensure architectural alignment and successful execution of projects. Effectively communicate architectural decisions, strategies, and roadmaps to both … . Extensive experience with secure cloud architecture patterns, infrastructure-as-code (IaC), containerisation, and DevSecOpspractices. Strong understanding of networking principles, security protocols, encryption technologies, andidentityandaccessmanagement in cloud environments. Excellent understanding of software development lifecycles and agile methodologies. Soft Skills Exceptional leadership, communication (written and verbal), and presentation skills. Strong strategic More ❯
Guildford, England, United Kingdom Hybrid/Remote Options
Hawksworth
3rd parties to make surethey are fully operational/implemented and effective. This will include accountability for all Information Security risks and control owned by IT. Regulator reporting, Management of outsourced partners and their adherence to the control framework, Engages in projects, ensure overall compliance etc. About you. One or more of CISA, CISSP or CRISC Good working … tools and scripting languages (e.g., PowerShell, Python) for configuration and compliance checks. Knowledge of patch and vulnerability management tools and practices. Understanding of identityandaccessmanagement (IAM) principles and technologies. If you are ready for the next challenge and you have the above skills and experience and are able to work More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential.With over 25 years of experience and trusted by more than 350 institutions … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential. With over 25 years of experience and trusted by more than … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the More ❯
to build, maintains, and enhance protection, detection and alerting on cloud-based infrastructure, services, applications and networks Creating cloud-based infrastructure and programs including implementing identityandaccessmanagementand configuring cloud environments securely The ability to distil complex information into easy-to-digest anecdotes, stories or lessons Ability to speak confidently in front More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Lorien
our team on a 6-month contract. This hybrid role offers the opportunity to work at the heart of technology change, enabling secure and effective identityandaccessmanagement (IAM) solutions across a portfolio of initiatives. What You'll Do Act as a single point of contact (SPoC) or relationship-based fly-in resource … solutions that align with technology strategy, standards, and risk appetites. Collaborate with internal teams and third parties to ensure smooth "Path to Live" transitions. Provide day-one user access, knowledge creation, warranty support, and seamless handover into operations. Deliver proactive updates, manage risks and issues, and ensure timely delivery of milestones. Champion IAM capabilities to drive innovation and … tools and practices. What You'll Bring Strong technical expertise in IAM processes and tools. Proven experience in designing and implementing IAM solutions in complex environments. Excellent stakeholder managementand communication skills. Ability to work flexibly, including occasional non-standard hours to support operational priorities. A collaborative mindset and willingness to support wider departmental goals. Guidant, Carbon60, Lorien More ❯
certificate lifecycle management. Implement and maintain Certificate Authorities, Registration Authorities, and associated infrastructure. Ensure secure deployment and configuration of PKI across enterprise systems, endpoints, applications, and devices. Collaborate with IDAM, DevOps, and cloud security teams to integrate PKI with broader identityand security architectures. Provide technical leadership in incident response and troubleshooting related to certificates and encryption. Stay … OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and key management practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards … such as PCI DSS, HIPAA, SOX, GDPR, NIST 800-53. Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: IdentityandAccess, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture andIdentity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible More ❯
Surrey, England, United Kingdom Hybrid/Remote Options
Hawksworth
no chance you'll be getting bored anytime soon. They need you to have experience across Infrastructure, from networking (TCP/IP, HTTP, SMTP), security, risk, governance, automation, identity & access management...not to mention financial services experience, and ideally insurance. If you're still reading, then great, the wish-list hasn't scared you off yet!! Another More ❯
Do Act as a trusted technical advisor, guiding customers through their cybersecurity and digital transformation journeys Stay at the forefront of emerging security technologies (SIEM, SOAR, EDR, SASE, DDoS, IDAM, WAF, and more) Design and present high-impact security and networking solutions (Fortinet, Palo Alto, Juniper, Zscaler, Netskope, and more) Lead technical discovery sessions, solution design, demos, and PoCs Create More ❯
Things. As a trusted technology adviser and managed services provider, we help clients navigate continuous change and embrace innovation. We deliver world-class hybrid cloud, Infrastructure, mainframe transformation, data, IDAM, and cloud-native solutions, simplifying complex business challenges and creating new pathways to success. Headquartered in the USA and backed by private equity, Ensono has a strong track record in More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
management, representing Digital, Data and Technology (DDaT). Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR andIDAM polices) to detect, prevent, and respond to cyber threats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security … of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability managementMore ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
management, representing Digital, Data and Technology (DDaT). Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR andIDAM polices) to detect, prevent, and respond to cyber threats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security … of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability managementMore ❯
client-facing role. Ideal Background: Proven experience in cyber security design, architecture, or consultancy. Hands-on expertise across domains such as SIEM, SOAR, EDR, Vulnerability Management, WAF, IDAM, and Cloud Security. Strong understanding of vendor technologies (e.g., Fortinet, Palo Alto, Juniper). Excellent communication and stakeholder engagement skills — able to translate complex technical concepts into business value. Requirements More ❯