Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Virgin Money
ongoing evolution of security engineering practices. Implement automation to remove repetitive manual tasks. We need you to have Hands-on exposure and knowledge of Cyber & network security, e.g. management of firewalls, IDS, Web Gateways etc. Familiarity with deploying Infrastructure as Code and using CI/CD technologies, such as Azure DevOps. Hands-on experience working with cloud networking … as Icinga or Elastic Stack. Network Security certifications (especially Cloud centric) would be advantageous. Proven ability to design and deploy zero-trust security solutions, including identityandaccessmanagement, micro segmentation, and continuous authentication, in complex organisational structures would be an advantage. Be yourself at Virgin Money At Virgin Money, we celebrate everyone. We More ❯
engineering, including 3+ years of direct experience with AWS. Proven experience designing production-grade cloud infrastructure in regulated environments. Deep understanding of cloud security, networking, identityandaccessmanagement, and governance within AWS.Proficiency in a scripting or programming language (e.g., Python, Go, Shell). You will have Experience with continuous integration/delivery pipelines … and GitOps workflows. Excellent communication skills and a collaborative mindset.Experience with multi-account cloud architecture, landing zones, or control tower setups.Familiarity with zero-trust architecture, data encryption, and key management systems (KMS). Strong proficiency with using Infrastructure as Code tools such as Terraform to build cloud infrastructure solutions and automating cloud deployments. If this of interest drop More ❯
engineering, including 3+ years of direct experience with AWS. Proven experience designing production-grade cloud infrastructure in regulated environments. Deep understanding of cloud security, networking, identityandaccessmanagement, and governance within AWS.Proficiency in a scripting or programming language (e.g., Python, Go, Shell). You will have Experience with continuous integration/delivery pipelines … and GitOps workflows. Excellent communication skills and a collaborative mindset.Experience with multi-account cloud architecture, landing zones, or control tower setups.Familiarity with zero-trust architecture, data encryption, and key management systems (KMS). Strong proficiency with using Infrastructure as Code tools such as Terraform to build cloud infrastructure solutions and automating cloud deployments. If this of interest drop More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
/GKE). - Familiarity with IaC tools such as Terraform, CloudFormation, and Helm for scalable deployments. AI/ML Fundamentals: - Knowledge of Natural Language Processing (NLP), model lifecycle management, and explainability techniques. - Ability to articulate how AI … models integrate into enterprise workflows and compliance frameworks. Security & Compliance: - Strong grasp of SOC 2, ISO 27001, GDPR, and enterprise security best practices. - Understanding of identityandaccessmanagement (IAM), encryption standards, and secure API design. Integrations & APIs: - Experience with RESTful APIs, webhooks, and SDKs for connecting SaaS platforms to enterprise systems (ERP, CRM More ❯
Infrastructure, and Travel Digital teams, reporting to the Senior Director of Security Architecture. Key Responsibilities: Security architecture design and implementation Development security operations and CI/CD pipeline management Conduct security and platform reviews, risk profiling, and compliance adherence Collaborate cross-functionally to embed security into cloud solutions Must … Have Skills: 1-3 years' experience in cloud security, software engineering, or development security operations Hands-on exposure to AWS cloud services Strong understanding of IdentityandAccessManagement (IAM) principles and tools Experience with scripting/programming languages (e.g., JavaScript) Foundational knowledge of networking and security principles Familiarity with Git-based development workflows More ❯
economy. Our services include: consulting and advisory, governance, risk and compliance, incident response, penetration testing and assurance, network and infrastructure solutions, cloud security and solutions, identityandaccessmanagement, managed security services and cyber security training. More ❯
London - UK/Client Solutions/Hybrid - Full-time We are seeking a proactive and detail-oriented professional to join our team, focusing on the end-to-end management of client payment data, technical operations, and support. The successful candidate will play a critical role in ensuring the accuracy and integrity of beneficiary and mandate data, managing payment … in understanding and onboarding with the Navro API endpoints. Triage and resolve technical issues and requests from existing clients, ensuring minimal disruption to their operations. Beneficiary & Mandate Data Management: Conduct data analysis to ensure accuracy and compliance. Manage the upload of beneficiary and mandate data into the Navro Hub, and provide feedback to Implementation Managers on any data … concepts to non-technical users. Experience with API integration and troubleshooting. Desirable Previous experience in the fintech or payments industry. Knowledge of Keycloak or other identityandaccessmanagement systems. Familiarity with sandbox environments and testing procedures. You may not possess every single required skill listed, and that's perfectly fine. If you have More ❯
About the role: Developing and designing secure solutions Documenting controls in a Security Design Adhering to cyber security design principles to ensure solutions meet industry standards Determining risk management processes and articulating the risks and benefits Creating design documentation and presenting to stakeholders Qualifications & Experience Specialised technical knowledge and experience of cyber security as evidenced by relevant industry … GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. Understanding of Infrastructure, Networking and Cloud environments Knowledge in IdentityandAccessManagement technologies Knowledge in Backup and Recovery technologies At Sword, our core values and culture are based on caring about our people, investing in training and career development and building inclusive teams where we are all encouraged to contribute to achieve success. We offer comprehensive benefits designed to support your professional development and enhance your overall More ❯
CI/CD pipeline design Azure Private Link and Private Link Service configuration Databricks and Unity Catalog for data governance Azure Policy and compliance enforcement Identityandaccessmanagement (OAuth, federated credentials) Azure security best practices including BCDR and high availability Cost managementand optimisation strategies within Azure Please send me a More ❯
CI/CD pipeline design Azure Private Link and Private Link Service configuration Databricks and Unity Catalog for data governance Azure Policy and compliance enforcement Identityandaccessmanagement (OAuth, federated credentials) Azure security best practices including BCDR and high availability Cost managementand optimisation strategies within Azure Please send me a More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in StrongDM with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in BeyondTrust with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
Biggleswade, Bedfordshire, United Kingdom Hybrid / WFH Options
Kramp
pipelines , monitoring systems , and logging solutions. Troubleshoot platform-related issues and ensure quick resolution for engineering t eams. Apply and automate system-wide updates , manage certificates , and oversee access rights . Develop and maintain common frameworks, libraries, and development guidelines used by application engineers. Collaborate closely with domain engineers to understand their needs and improve their developer experience. … experience implementing and configuring monitoring, alerting, and logging solutions for large-scale systems. Understanding of software development practices and ability to set development guidelines . Experience with certificates, identity/accessmanagement, and system-wide updates. A problem-solver who enjoys enabling others rather than building features directly. Experience and knowledge of at least More ❯
consistency with the overarching strategy. Familiarity with architectural frameworks and methodologies. Knowledge of cloud computing concepts and cloud migration strategies. Knowledge of implementing and managing IdentityandAccessManagement (IAM) and Public Key Infrastructure (PKI) within interconnected system landscapes. Excellent problem-solving skills and the ability to align technical solutions with business objectives. Application More ❯
team is responsible for developing and maintaining the productivity tooling for all aspects of the firm. You will work directly with the team responsible for IdentityandAccessManagement (IAM), Productivity platforms and cross-system integrations within Enterprise Technology. In this role, you will be administering our productivity tooling including Slack and Google Workspace … productivity platform and other internal systems including but not limited to managing user lifecycles in LDAP, integrating SSO and SCIM for new additions to our SaaS stack and integrating asset management tooling. Responsibilities Development of tools and automations for supporting IT processes as well as other teams at HRT Integration and smooth operation of enterprise SaaS applications including … such as SAML, OIDC, SCIM and non-standard API-based workflows Experience implementing client-side SSO integrations in one or more software applications preferred Familiarity with IaC and configuration management tools such as Terraform and SaltStack preferred Culture Hudson River Trading (HRT) brings a scientific approach to trading financial products. We have built one of the world's More ❯
for a Systems Engineer to join their IT team and play a key role in their shift to a cloud-first infrastructure. You'll help modernise their endpoint management, support collaboration tools & strengthen critical identityandaccess frameworks. This is a hands-on technical role, ideal for someone confident working with Microsoft 365, Intune … ideally an SME in this area), and cloud identity systems. The role is paying up to £50k + 8% bonus (flex upwards on base salary for the right candidate) and will be ideally based close enough to Durham, to commute a couple of days a month into the office (flexible). Must Haves: - Experience in a Systems Engineer … or Endpoint Management role. - Hands-on experience with Microsoft Intune and endpoint management across diverse OS/device types. - Proficiency in Microsoft Entra ID (Azure AD), identity, andaccess management. - Experience with M365 administration and configuration. - Strong problem-solving and interpersonal skills with a customer-first mindset. Nice to Haves: - Experience with More ❯
and? Private Link Service . Expertise in? Databricks and? Unity Catalog for data governance. Solid understanding of? Azure Policy and compliance enforcement. Strong background in? identityandaccessmanagement , including? OAuth and? federated credentials. Deep understanding of? Azure security best practices , including? Defense in Depth ,? BCDR , and? high availability. If you meet these requirments More ❯
and Private Link Service . Expertise in Databricks and Unity Catalog for data governance. Solid understanding of Azure Policy and compliance enforcement. Strong background in identityandaccessmanagement , including OAuth and federated credentials. Deep understanding of Azure security best practices , including Defense in Depth , BCDR , and high availability. If you meet these requirments More ❯
business needs to security controls, have technical knowledge of mainstream operating systems (mainly Microsoft Windows) and understanding of security technologies, such as network security appliances, identityandaccessmanagement (IAM) systems, anti-malware solutions and desktop security tools, basic knowledge of network infrastructure and risk assessment methods and technologies. This is a superb career More ❯
business needs to security controls, have technical knowledge of mainstream operating systems (mainly Microsoft Windows) and understanding of security technologies, such as network security appliances, identityandaccessmanagement (IAM) systems, anti-malware solutions and desktop security tools, basic knowledge of network infrastructure and risk assessment methods and technologies. This is a superb career More ❯
business needs to security controls, have technical knowledge of mainstream operating systems (mainly Microsoft Windows) and understanding of security technologies, such as network security appliances, identityandaccessmanagement (IAM) systems, anti-malware solutions and desktop security tools, basic knowledge of network infrastructure and risk assessment methods and technologies. This is a superb career More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
the product lifecycle by aligning strong security practices with strategic goals and user experience, while engaging with diverse teams to understand and support their needs. Collaborate with product management, digital, and engineering functions to enable secure innovation and accelerate digital transformation. Develop and maintain application security architecture, reference models, and automation in line with cloud-first and hybrid … after penetration testing, red/purple team exercises and bug bounty programme. About you Extensive leadership experience in application and/or product security, ideally within the wealth management, financial services or fintech sectors. Track record of building and leading security teams in complex, regulated, and digitally transforming environments. Expertise in secure software development lifecycle (SSDLC) and experience … embedding security into agile, DevOps, and CI/CD environments. In-depth technical knowledge of application security architecture, cloud platforms (AWS, Azure, GCP), microservices, APIs, andidentity/access management. Strong familiarity with modern programming languages, frameworks, and security vulnerabilities (e.g., OWASP Top Ten, SANS 25). Proven experience driving digital transformation initiatives, including migration of More ❯
Employment Type: Permanent, Part Time, Work From Home