workflows and eliminate manual tasks Familiarity with containerisation using Docker and orchestration best practices, along with configuration management using Ansible. Knowledge of secrets managementandaccess control using tools like Vault and IAM policies, ensuring secure handling of credentials and sensitive information Strong understanding of AWS security best practices, including encryption, patching, monitoring, least … environments Understanding of routing, traffic management, and load balancing, including configuration of NGINX and AWS-native tools for optimizing traffic flow. Experience with structured release and change management processes, including deployment governance, rollback strategies, and versioning control. Awareness of Java application environments and deployment considerations is a plus for supporting platform-wide consistency and integrations Proactive … Confluence and Bitbucket to support Agile delivery, documentation, collaboration, and CI/CD pipeline management Working knowledge of Active Directory and ADFS for identityandaccessmanagement, including group policy management, SSO, and integration with cloud authentication services Application Requirements: Hands-on experience: in any programming language e.g. python, bash More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO … and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
architectural standards and project timelines. Specifically: Builds and configures on-premises infrastructure Deploys and integrates cloud-based services (e.g. IaaS/PaaS/SaaS, virtual machines, storage, networking, identity). Ensures systems are built in line with approved high-level and low-level designs Collaborates with solution architects, programme and project managers, and cyber security engineers. Supports risk … management with associated stakeholders. Undertakes the planning, estimation and scheduling of installation and decommissioning work. Ensures that the highest levels of IT security are maintained to protect the integrity of all NCC data. Within project delivery, uses normal operating facilities, diagnostic tools, technical manuals, test scripts and systems documentation to identify, diagnose and report on system errors. Supports … as above. Familiarity with implementing security best practices across Microsoft environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance More ❯
economy. Our services include: consulting and advisory, governance, risk and compliance, incident response, penetration testing and assurance, network and infrastructure solutions, cloud security and solutions, identityandaccessmanagement, managed security services and cyber security training. More ❯
consistency with the overarching strategy. Familiarity with architectural frameworks and methodologies. Knowledge of cloud computing concepts and cloud migration strategies. Knowledge of implementing and managing IdentityandAccessManagement (IAM) and Public Key Infrastructure (PKI) within interconnected system landscapes. Excellent problem-solving skills and the ability to align technical solutions with business objectives. Application More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
the product lifecycle by aligning strong security practices with strategic goals and user experience, while engaging with diverse teams to understand and support their needs. Collaborate with product management, digital, and engineering functions to enable secure innovation and accelerate digital transformation. Develop and maintain application security architecture, reference models, and automation in line with cloud-first and hybrid … after penetration testing, red/purple team exercises and bug bounty programme. About you Extensive leadership experience in application and/or product security, ideally within the wealth management, financial services or fintech sectors. Track record of building and leading security teams in complex, regulated, and digitally transforming environments. Expertise in secure software development lifecycle (SSDLC) and experience … embedding security into agile, DevOps, and CI/CD environments. In-depth technical knowledge of application security architecture, cloud platforms (AWS, Azure, GCP), microservices, APIs, andidentity/access management. Strong familiarity with modern programming languages, frameworks, and security vulnerabilities (e.g., OWASP Top Ten, SANS 25). Proven experience driving digital transformation initiatives, including migration of More ❯
Employment Type: Permanent, Part Time, Work From Home