Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … environment. Strong understanding of both IT and OT systems and infrastructure. Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Run-Time Group Ltd
Landing Zones Core responsibilities of an Azure Infrastructure or Cloud Engineer especially in designing, deploying, and managing cloud infrastructure. Intune/AVD (Azure Virtual Desktop) experience in endpoint management … and virtual desktop infrastructure , common in cloud ops or endpoint management roles. Azure ENTRA/PIM (Privileged IdentityManagement) identityandaccessmanagement knowledge, fitting for someone managing enterprise cloud environments. Roles/Groups (including built-in) Related to RBAC (Role-Based Access Control) and security More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
X4 Technology
programme, advising IT on remediation strategies. Oversee security incident monitoring and response in coordination with the SOC team. Design and implement an effective identityandaccessmanagement (IAM) process and own access control across all systems. Required Skills & Experience Strong technical hands-on experience with Microsoft Security solutions, including Defender … and threat detection. Demonstrable background in implementing and running vulnerability management programmes, with experience using industry-standard tooling. Experience designing, deploying, and managing IdentityandAccessManagement (IAM) systems and processes. Strong understanding of risk management principles and experience building KPI, KRI, and risk-based security metrics. Ability to bridge More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
Amersham, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Anson Mccade
or multi-entity environments . Strong expertise in Microsoft 365 (Exchange, SharePoint, Intune, Entra ID, Security & Compliance). In-depth knowledge of Azure infrastructure , including identityandaccessmanagement (Azure AD, Azure AD Connect, MFA, Conditional Access). Solid background in managing and supporting on-premises infrastructure . Proficient in PowerShell scripting More ❯