Key Responsibilities: Implement certificate-based authentication to prevent unauthorised device access. Design and execute a plan for third-party onboarding process. Work with Azure Cloud, Intune, and endpoint management tools to improve identity, access, and device security. Support rollout of Windows 11, ensuring compliance and endpoint hardening. What you'll need: Strong experience with … certificate-based authentication, Azure AD, Intune, and Windows 11. Hands-on knowledge of endpoint security, device compliance, andidentity & access management. Excellent stakeholder management skills. Experience managing unstructured data and implementing secure data handling practices. Please click here to find out more about our Key Information Documents. Please note that the documents provided contain More ❯
Key Responsibilities: Implement certificate-based authentication to prevent unauthorised device access. Design and execute a plan for third-party onboarding process. Work with Azure Cloud, Intune, and endpoint management tools to improve identity, access, and device security. Support rollout of Windows 11, ensuring compliance and endpoint hardening. What you'll need: Strong experience with … certificate-based authentication, Azure AD, Intune, and Windows 11. Hands-on knowledge of endpoint security, device compliance, andidentity & access management. Excellent stakeholder management skills. Experience managing unstructured data and implementing secure data handling practices. Please click here to find out more about our Key Information Documents. Please note that the documents provided contain More ❯
up, alongside deep expertise in Microsoft Entra. You'll be instrumental in designing, deploying, and supporting a modern workplace environment, with a strong focus on identityandaccessmanagement, device configuration, compliance, and security policies. Key Responsibilities for the Microsoft 365 Engineer: Lead the end-to-end setup and configuration of Microsoft Intune, including … policies, profiles, compliance, device enrolment, Autopilot, and application deployment. Design, implement, and support Microsoft Entra ID, Conditional Access, MFA, andidentity governance. Oversee the integration between on-prem Active Directory and cloud identity services. Develop and maintain documentation and SOPs for identityand device management across the organisation. Collaborate with … including device compliance, endpoint protection, Autopilot deployment, and app packaging. Familiarity with identity protocols such as SAML, OAuth2, and OpenID Connect. PowerShell scripting experience for automation andmanagement tasks. Experience working with Microsoft Graph API and Entra Workload Identities. Good understanding of Zero Trust architecture and secure modern workplace concepts. Strong troubleshooting and diagnostic skills in More ❯
About 1Password At 1Password, we're building the foundation for a safe, productive digital future. Our mission is to unleash employee productivity without compromising security by ensuring every identity is authentic, every application sign-in is secure, and every device is trusted. We innovated the market-leading enterprise password manager and pioneered Extended AccessManagement … we take a human-centric approach in everything from product strategy to user experience. Over 165,000 businesses and millions of people trust us to provide seamless, secure access to their most critical information. If you're excited about the opportunity to contribute to the digital safety of millions, to work alongside a team of curious, driven individuals … training and shipping high impact ML/AI products and iterating rapidly on ideas to solve open ended problems. ( Security for AI ) Deep understanding of identityandaccessmanagement protocols (OAuth, OIDC, SAML, etc.). Bonus points if you have: Proficiency in Golang and/or Rust. Familiarity with HTTP proxies and/or More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
Administrator to manage, optimise, and secure a Microsoft 365 environment. Key Skills are M365 and Hyper-V. However, the ideal candidate will have hands-on experience with user management, security policies, Intune, Exchange Online migrations, and Autopilot deployments . You will play a key role in ensuring a secure, efficient, and well-governed M365 ecosystem. Key Responsibilities: Microsoft … Administration: Manage user identities, licenses, and security groups in Azure AD & Microsoft 365 . Configure and enforce Conditional Access Policies (CAP) for secure access. Implement and manage Multi-Factor Authentication (MFA) and Zero Trust policies . Monitor and troubleshoot Microsoft 365 services (Exchange Online, SharePoint, Teams, OneDrive) . Endpoint Management (Intune & Autopilot): Deploy, configure, and manage … Microsoft Intune for MDM (Mobile Device Management) & MAM (Mobile Application Management) . Set up and automate Windows Autopilot for zero-touch device provisioning. Develop and enforce compliance policies for endpoints (Windows, macOS, iOS, Android). Manage application deployments and updates via Intune. Exchange Online & Migrations: Perform migrations from on-prem Exchange to Exchange Online . Manage More ❯
cycles for cybersecurity solutions including prospecting, solution positioning, negotiation, and closure. Develop and execute strategic account plans for key enterprise clients, aligning cybersecurity solutions to their business and risk management goals. Build relationships with C-level executives (CISOs, CIOs, CTOs) and key stakeholders to uncover pain points and promote solution value. Apply solution selling and consultative selling methodologies … software sales, with at least 5+ years focused specifically on cybersecurity. Proven success in consistently achieving or surpassing million-plus euro quotas. Deep knowledge of cybersecurity domains including: Identity & AccessManagement Attack Surface Management Threat Intelligence & Digital Risk Protection Vulnerability Management Pen Testing & Red Teaming Strong understanding of security buyer … hybrid working environment if desired We prioritize the well-being and development of our employees. That's why we offer a fitness allowance to support physical health and provide access to learning platforms such as LinkedIn Learning to encourage continuous self-improvement and personal growth. Employees also benefit from regular performance conversations with their managers, focused on development More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Jane's Group
appropriately patched and maintained to minimise vulnerabilities. Ensure standards are adopted across Service Teams. Mentor and support Service Teams on appropriate use of cloud resources. Contribute to service management processes covering change control, incident managementand DR. Operate in a fast-paced agile environment, balancing an operational mindset with the need to deliver. The ideal skills … network, backup, observability, security and governance. Experience at managing security of systems in line with ISO27001, Cyber essentials or NIST standards. In-depth experience with IdentityandAccessManagement, including Privileged Access In-depth experience with Terraform, IaC and associated pipeline management. Experience managing Windows and Linux servers and associated services, e.g. … Directory Services. Experience with cloud native, serverless architectures. Experience with disaster recovery and service management principles and processes. Good understanding of agile and modern software engineering and development practices. Experience across a range of the following technologies: CloudFront, WAF, AWS Firewall, API Gateway, Transit Gateway AWS VPN, Zscaler ZPA, AWS Identity Centre, Microsoft Entra AWS Backup More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Jane's Group
appropriately patched and maintained to minimise vulnerabilities. Ensure standards are adopted across Service Teams. Mentor and support Service Teams on appropriate use of cloud resources. Contribute to service management processes covering change control, incident managementand DR. Operate in a fast-paced agile environment, balancing an operational mindset with the need to deliver. The ideal skills … network, backup, observability, security and governance. Experience at managing security of systems in line with ISO27001, Cyber essentials or NIST standards. In-depth experience with IdentityandAccessManagement, including Privileged Access In-depth experience with Terraform, IaC and associated pipeline management. Experience managing Windows and Linux servers and associated services, e.g. … Directory Services. Experience with cloud native, serverless architectures. Experience with disaster recovery and service management principles and processes. Good understanding of agile and modern software engineering and development practices. Experience across a range of the following technologies: CloudFront, WAF, AWS Firewall, API Gateway, Transit Gateway AWS VPN, Zscaler ZPA, AWS Identity Centre, Microsoft Entra AWS Backup More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Computappoint
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
dofrom infrastructure to application design. Key Responsibilities Design and implement security controls across cloud platforms (AWS, Azure, or GCP) Develop and maintain security tooling for threat detection, vulnerability management, and incident response Lead threat modelling and risk assessments for critical systems and services Collaborate with engineering teams to integrate security best practices into CI/CD pipelines Monitor … controls and documentation What Were Looking For Proven experience as a security engineer with a strong background in cloud security (AWS, Azure, or GCP) Solid understanding of networking, identity & accessmanagement, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, and security scanners Familiarity with DevSecOps practices and modern CI More ❯
Manage and optimize Virtual Desktop Infrastructure (VDI) environments to deliver reliable remote access solutions Configure and maintain Entra ID (Azure Active Directory) for identityandaccessmanagement across the organization Deploy and manage Microsoft Intune for device management, application deployment, and security policy enforcement Implement conditional access policies … group policies, and user profile management solutions Support Azure and Microsoft 365 services integration with on-premise systems Manage application packaging, virtualization, and deployment using SCCM and Citrix technologies Maintain enterprise mobility management platforms and ensure seamless user experiences Work with database, storage, network, and monitoring systems to ensure comprehensive service delivery Contribute to long-term … roles within ITIL-governed environments Strong hands-on experience with Windows 11, Entra ID, Active Directory, VDI, EUC, Microsoft 365 suites, and Intune Expertise in VDI technologies and virtual desktop management Knowledge of Microsoft 365, single sign-on (SSO), identity providers, and PKI systems PowerShell scripting skills and automation experience with Infrastructure as Code (IaC) Experience More ❯
responsibilities of this role • Design, implementation and administration of hybrid cloud services, including but not limited to, IaaS resources, data connectivity, data backup and restore, print, telecoms, and building management services. • Monitor system performance and availability, proactively identifying and resolving issues to maintain high service levels. • Collaborate with security and compliance teams to implement and maintain governance policies … maintain documentation, user guides, and training materials. Security & Compliance o Implement and enforce security policies. o Ensure compliance with internal data governance standards. o Manage identityandaccess controls, MFA, and device compliance. o Collaborate with support partners on the remediation of security vulnerabilities, across datacentre, EUC, IaaS space and data network. o Design, implementation and … offered for out-of-hours work during Mon-Fri. Skills required Skills required Skills & Experience required: The successful candidate will demonstrate expert-level proficiency in the design, implementation, andmanagement of Microsoft Azure and Microsoft 365 environments. The role requires a deep understanding of cloud infrastructure, identityandaccessmanagement, automation, andMore ❯
is considered at every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modeling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code & Architecture Review: Conduct secure code reviews and … CI/CD security automation (GitHub Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & accessmanagement (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. Experience driving developer enablement and … CSSLP. Experience working in SaaS, multi-tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best practices). Familiarity with attack surface managementand threat intelligence. What do we offer? We value our people and offer a competitive salary along with company bonus Strong maternity and paternity scheme A workplace pension scheme More ❯
to succeed Strong experience as a DevSecOps Engineer/Security/DevOps Engineer. Great programming ability with Python or Powershell - you know your languages! Deep experience in IAM (IdentityAccessManagement) e.g Active Directory! Strong knowledge of Sailpoint/or other identity products. Experienced with Infrastructure as Code (IaC) using tools such More ❯
Employment Type: Contract
Rate: £750.0 - £850.0 per day + £750-850 Per Day Inside IR35
to succeed Strong experience as a DevSecOps Engineer/Security/DevOps Engineer. Great programming ability with Python or Powershell - you know your languages! Deep experience in IAM (IdentityAccessManagement) e.g Active Directory! Strong knowledge of Sailpoint/or other identity products. Experienced with Infrastructure as Code (IaC) using tools such More ❯
exceptional customer service. Own and optimise our Freshservice ITSM platform, leveraging its capabilities for extensive automation, improved efficiency, and enhanced user experience. Drive excellence in Change, Incident, and Problem Management, implementing best practices to ensure seamless IT operations. Manage a crucial part of the IT budget for support tools, hardware, and services, demonstrating strong budgeting and procurement skills. … centric, dedicated to providing excellent service and continuously improving the overall user experience. Cloud: AWS, Azure and GCP Networking: VMware SD-WAN, Mist WiFi, Meraki LAN, Netskope SASE Identity & AccessManagement: Okta, Google Workspace SSO, SAML, OIDC and SCIM integrations, EntraID Automation/IaC: GitHub, PowerShell, Bash, Python, Terraform Patching: Automox, Nudge, Autopatch (We … with a competitive salar y based on your experience and the market we're in. Plus the potential to earn an annual bonus based on performance. There's access to the tools to support your personal development with programmes on our dedicated learning platform . As well as support for your mental health with access to More ❯
Manager requires hands-on experience which includes the following responsibilities: Spearheaded User Acceptance Testing (UAT) from a client-focused perspective, utilizing automation tools to streamline regression testing and ensuring comprehensive management of test artifacts throughout the entire test execution lifecycle. Collaborate closely with Visa's technology, product, and solution teams to understand new business initiatives and ensure the … years of relevant experience with a PhD A bachelor's degree with 8+ years of experience, or an advanced degree with 6+ years of experience, in Product Management, Solutions Management, Quality Engineering, or a comparable area is required. Hands-on experience in the Payments industry. Proven expertise in developing, writing, and executing test cases from a … mobile applications through technical implementations. Superior analytical and problem-solving skills, with the agility to adapt to evolving priorities and challenges. Hands-on experience with IdentityandAccessManagement (IAM) solutions-including oAuth, OpenID Connect, SAML, and security tokens (JWS, JWE, access token, ID token)-as well as cryptographic concepts and key More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
security into CI/CD pipelines and DevOps practices Provide guidance on Azure-native security tools (e.g., Defender for Cloud, Sentinel, Key Vault, Azure Policy) Support zero trust andidentity-based security models Skills & Experience: Proven experience as a Cloud Security Architect with a focus on Microsoft Azure Strong understanding of Azure security services, network security, andidentity & accessmanagement Familiarity with cloud security frameworks (e.g., NIST, CIS, ISO 27001) Experience in enterprise-scale environments and regulated industries Excellent communication and stakeholder engagement skills If you're an Azure security expert looking for your next challenge, we’d love to hear from you. More ❯
Responsibilities Assist in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyber threats, and automate tasks. Contribute to the planning, implementation, andmanagement of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security infrastructure and technologies. Create and maintain detection rules … and protocols. Collaborate closely with the Cyber Defence team to uphold enterprise defence practices, guidelines, and procedures. Provide support for incident response efforts as needed. Assist with operational andmanagement reporting produced by the team. Skills/Qualifications A highly self-motivated individual with positive mindset & can-do attitude, and a strong believer of “Security as an enabler … including multinational connectivity; Experience with various security technologies such as NDR/content filtering/FW/IPS/IDS/DDOS, EDR/MDR, DAST/SAST, IdentityAccessManagement, SIEM & SOAR, log management. Preferable experience in Azure, AWS, Defender, Darktrace. Experience and technical knowledge in multiple areas of cyber defence operations. Experience More ❯
moving. We re on the lookout for a Security Engineer. Reporting to the Cyber Security Manager, the main purpose of this role is to support the development andmanagement of security technologies across F1 s growing technology landscape. Main Duties & Responsibilities: Assess and maintain high standards of security maturity across Formula 1 s cloud infrastructure Focus on new … Cloud infrastructure against Formula 1 s compliance and security standards (such as ISO 27001 and CIS) Main duties to be carried out include, but not limited to: Vulnerability Managementand reporting across Formula 1 s cloud environment(s), including: Development of requirements, design, and implementation of cloud security tools (E.g. compliance and host security) A key … focus on threat detection and risks across cloud environments Identification, remediation, and reporting of security vulnerabilities Reporting on compliance to F1 s security standards Support in the delivery andmanagement of security design and architecture reviews Working closely with Infrastructure teams on security design and control strategies to reduce risks The definition and operation of secure development/ More ❯
moving. We’re on the lookout for a Security Engineer. Reporting to the Cyber Security Manager, the main purpose of this role is to support the development andmanagement of security technologies across F1’s growing technology landscape. Main Duties & Responsibilities: Assess and maintain high standards of security maturity across Formula 1’s cloud infrastructure Focus on new … Cloud infrastructure against Formula 1’s compliance and security standards (such as ISO 27001 and CIS) Main duties to be carried out include, but not limited to: Vulnerability Managementand reporting across Formula 1’s cloud environment(s), including: Development of requirements, design, and implementation of cloud security tools (E.g. compliance and host security) A key … focus on threat detection and risks across cloud environments Identification, remediation, and reporting of security vulnerabilities Reporting on compliance to F1’s security standards Support in the delivery andmanagement of security design and architecture reviews Working closely with Infrastructure teams on security design and control strategies to reduce risks The definition and operation of secure development/ More ❯
resilient to threats, and aligned with best-in-class standards (including ISO 27001 and SOC 2). You'll play a key role in monitoring, incident response, vulnerability management, and secure DevOps practices-helping us maintain customer trust and regulatory compliance as we scale. What You'll Do Monitor systems and infrastructure for potential vulnerabilities, threats, and breaches … What We're Looking For Extensive experience in security operations roles, preferably in SaaS or cloud-native environments Proficiency in security monitoring tools such as SIEM, EDR, vulnerability management tools, and log aggregation platforms Strong knowledge of security frameworks, standards, and best practices (ISO 27001, SOC 2, GDPR) Proven incident response, threat detection, and investigation experience Experience with … cloud platforms (preferably Azure), identity & accessmanagement, and secure networking Scripting or automation experience (e.g. PowerShell, Python, Bash) Clear, proactive communicator with a collaborative mindset Why Join Oak? Join a mission-led SaaS company with strong backing and high growth trajectory Take ownership of our security operations in a role that matters deeply to More ❯
Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity managementand planning in place for the security services and solutions assigned to you and ensure that the … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. More ❯
a Security Design An understanding of cyber security design principles to ensure solutions meet industry standards An understanding of frameworks and compliance The Ability to work with risk management processes and articulate the risks and benefits An understanding of networks and cloud environments is advantageous Comfortable creating design documentation and presenting to clients Key Responsibilities: Specialised technical knowledge … GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & AccessManagement Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident Response team is advantageous These ongoing contract engagements will attract a day rate commensurate with the depth of skills and experience required. You'll join a team of experienced engineers working with cutting edge tech across a range of interesting More ❯
visually appealing front-end applications with a mobile-responsive design. Developing and maintaining well-functioning databases, applications, and secure APIs. Implementing best practices for security, data protection, andidentity & accessmanagement within cloud services. Troubleshooting, debugging, and optimizing software to ensure efficiency, reliability, and high performance. Collaborating with cross-functional teams, including product managers … RTK query), and utilising authentication flows like OAuth 2.0. Hands-on experience in deployment, testing, validation, and producing technical proposals for front-end application delivery. Effective stakeholder and user management skills, including leading workshops, gathering requirements, and facilitating user engagement sessions. Ability to collaborate with internal teams (Engineering, IT, Production, Finance), third-party suppliers, and senior management … and needs. With this in mind, we have a flexible benefits scheme where you can tailor your benefits package to suit you. with us We value your unique identityand perspective and are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. Come bring your authentic self and create a better More ❯