CISA) It would be good to have a basis in a few of the below: Governance, Risk & Compliance (GRC) Cloud security and zero trust architectures IdentityandAccessManagement (IAM) Data protection and privacy Threat managementand incident response If you would like to more information on the role, please click apply More ❯
CISA) It would be good to have a basis in a few of the below: Governance, Risk & Compliance (GRC) Cloud security and zero trust architectures IdentityandAccessManagement (IAM) Data protection and privacy Threat managementand incident response If you would like to more information on the role, please click apply More ❯
knowledge of Microsoft technologies such as Windows Server and Microsoft Azure. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance … and controls in infrastructure delivery. Experience implementing monitoring, logging, and alerting toolsets. Understanding of data classification, encryption standards (e.g. at rest and in transit), and secure storage/access principles. ITIL Foundation Certificate Please send CV for full job description and an informal chat. Excellent opportunity to join a high-profile market leader More ❯
Infrastructure & Security Solutions Architect Location: London (Hybrid) About Albany Beck Albany Beck are a Management Consultancy focused on providing specialist talent and transformative solutions to Financial Services clients. We combine subject matter expertise with innovative delivery models that help clients scale efficiently, while offering meaningful, long-term career opportunities to our people. At Albany Beck, you’ll be … AWS) and on-premise hybrid infrastructure environments. Strong understanding of security frameworks (e.g. NIST, ISO 27001, CIS) and architectural best practices. Experience with network design, identityandaccessmanagement, endpoint protection, and cloud security controls. Strong stakeholder engagement and communication skills, with the ability to translate complex technical topics into actionable insights. More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Albany Beck
Infrastructure & Security Solutions Architect Location: London (Hybrid) About Albany Beck Albany Beck are a Management Consultancy focused on providing specialist talent and transformative solutions to Financial Services clients. We combine subject matter expertise with innovative delivery models that help clients scale efficiently, while offering meaningful, long-term career opportunities to our people. At Albany Beck, you’ll be … AWS) and on-premise hybrid infrastructure environments. Strong understanding of security frameworks (e.g. NIST, ISO 27001, CIS) and architectural best practices. Experience with network design, identityandaccessmanagement, endpoint protection, and cloud security controls. Strong stakeholder engagement and communication skills, with the ability to translate complex technical topics into actionable insights. More ❯
days a week - London - Circa £70,000 We're looking for an IAM Operations Engineer to lead the design, implementation, and continuous improvement of enterprise identityandaccessmanagement systems. This is a great opportunity to join a high impact team, work across modern IAM technologies, and shape the future of identity … and technologies - Manage and secure Active Directory, Azure/Entra, M365, and Intune environments - Collaborate with HR and IT teams on seamless onboarding/offboarding workflows - Improve and automate access controls using PowerShell - Work with PAM tools like Delinea or CyberArk and … governance tools like Veza We're Looking For: - Strong experience with AD, Azure/Entra, M365, and Intune - Proficiency in PowerShell scripting - Solid understanding of IAM, MFA, SSO, andidentity governance - Familiarity with PAM solutions (Delinea, CyberArk, etc.) - Ability to handle sensitive information with care and discretion More ❯
days a week - London - Circa £70,000 We're looking for an IAM Operations Engineer to lead the design, implementation, and continuous improvement of enterprise identityandaccessmanagement systems. This is a great opportunity to join a high impact team, work across modern IAM technologies, and shape the future of identity … and technologies - Manage and secure Active Directory, Azure/Entra, M365, and Intune environments - Collaborate with HR and IT teams on seamless onboarding/offboarding workflows - Improve and automate access controls using PowerShell - Work with PAM tools like Delinea or CyberArk and … governance tools like Veza We're Looking For: - Strong experience with AD, Azure/Entra, M365, and Intune - Proficiency in PowerShell scripting - Solid understanding of IAM, MFA, SSO, andidentity governance - Familiarity with PAM solutions (Delinea, CyberArk, etc.) - Ability to handle sensitive information with care and discretion More ❯
NIST, CIS, ISO 27001, and MITRE. Expertise in security controls and best practices for cloud-based workplace environments. Proficiency in Microsoft cloud security, compliance capabilities, identityandaccessmanagement, and threat protection, including Microsoft Defender, Microsoft Entra, and Microsoft Purview. Expertise with on-prem virtualisation and container platforms. Familiarity with virtualisation security best practices … and endpoint security. Proficiency in securing databases (e.g., SQL, NoSQL). Proficiency in risk analysis, security controls management planning, and disaster recovery planning. Experience with security technologies such as firewalls, intrusion detection/prevention systems, and encryption. Qualifications & Experience: Strong knowledge of security frameworks and standards (e.g., NIST, ISO 27001). Bachelor's degree in Computer Science, Information More ❯
full build-out begins. Key Responsibilities: Design and implement an Azure Landing Zone aligned with enterprise-grade security, governance, and compliance standards. Define and configure IdentityandAccessManagement (IAM), including role-based access control, policies, and directory service integration. Architect the networking, storage, monitoring, and logging layers required to support a More ❯
Senior Microsoft Security Consultant Permanent Home based in the UK (no sponsorship can be offered) SC Cleared or eligible for SC Clearance Key Responsibilities: Lead the design, implementation, andmanagement of Microsoft 365 security technologies , including Microsoft Defender suite, SIEM/XDR, and related tools. Configure and deploy Microsoft Azure, Entra, and Purview to meet enterprise security requirements. … certifications in Azure (AZ), Security (SC), Power Platform (PL), Modern Work (MS), and Copilot/AI are highly desirable. Deep understanding of enterprise security architecture, identityandaccessmanagement, and threat protection. Excellent communication skills and the ability to translate complex technical concepts into actionable guidance. More ❯
Setups for various OCI Services including Oracle Analytics Cloud (OAC), Autonomous Databases (ADW/ATP), Oracle Integration Cloud (OIC) Environments Configure, Manage and Support Oracle IdentityandAccessManagement (IAM) Setups, including SSO Federation with identified IDPs and SPs in the customer landscape Collaborate with Security Architects, DBAs and Application Support Leads to address … and fix the identified vulnerabilities Manage the complete infrastructure using Terraform and Ansible toolsets Your Profile Key skills/knowledge/experience: Hands-on experience with configuration andmanagement of OCI Network Services and Components covering different OCI VCN topologies, Gateways, different types of route tables, security list Hands-on experience with Oracle Enterprise Linux Administration activities including … Security Setups Proven experience in large-scale data migration projects Expertise in Terraform, Ansible tool sets Experience with Oracle SaaS Environments and PaaS Services integrations Excellent communication and stakeholder management skills Desirable skills/knowledge/experience: Analytical and problem-solving mindset Strong leadership and mentoring capabilities Ability to manage multiple priorities in fast-paced environment Rewards & Benefits More ❯
bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identityandaccessmanagement, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or More ❯
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the More ❯
led perspective (e.g., application level, environment level, network level, network policies, mapping attack paths, and building mitigations). Hands-on exposure and knowledge of Cyber & network security, e.g. management of firewalls, IDS, Web Gateways etc. Familiarity with deploying Infrastructure as Code and using CI/CD technologies, such as Azure DevOps. Hands-on experience working with cloud networking … as Icinga or Elastic Stack. Network Security certifications (especially Cloud centric) would be advantageous. Proven ability to design and deploy zero-trust security solutions, including identityandaccessmanagement, micro segmentation, and continuous authentication, in complex organisational structures would be an advantage. All profiles will be reviewed against the required skills and experience. Due More ❯
search engines (Elasticsearch, Solr, OpenSearch, or vendor-native). Implement API-driven integrations with third-party systems (e.g., Adobe, Avid, broadcast systems, DAMs, cloud storage). Configure user access, metadata schemas, and distribution workflows. Contribute to CI/CD pipelines, containerized deployments, and monitoring setup. Leadership & Collaboration Provide technical leadership to developers and operations teams. Partner with product … broadcast/MAM integration (Avid, Dalet, Viz One, Adobe). Familiarity with AI/ML in media workflows (auto-tagging, transcription, object recognition). Hands-on experience with identity/accessmanagementand content security. Cloud certifications (AWS/Azure/GCP). More ❯
search engines (Elasticsearch, Solr, OpenSearch, or vendor-native). Implement API-driven integrations with third-party systems (e.g., Adobe, Avid, broadcast systems, DAMs, cloud storage). Configure user access, metadata schemas, and distribution workflows. Contribute to CI/CD pipelines, containerized deployments, and monitoring setup. Leadership & Collaboration Provide technical leadership to developers and operations teams. Partner with product … broadcast/MAM integration (Avid, Dalet, Viz One, Adobe). Familiarity with AI/ML in media workflows (auto-tagging, transcription, object recognition). Hands-on experience with identity/accessmanagementand content security. Cloud certifications (AWS/Azure/GCP). More ❯
suite of business-critical applications, including but not limited to: Atlassian suite (Jira, Confluence) Developer and product tools such as TeamCity, Bitbucket, Stoplight, Cucumber Studio, WebDMS, FEC, Document Management Systems CRM & ERP tools like HubSpot and SAGE Google Workspace (Admin Console) and other SaaS platforms Analyse existing application usage and workflows to identify inefficiencies, recommend improvements, and implement … assess needs, propose solutions, and improve workflows. Maintain accurate IT documentation, configuration records, and knowledge base articles for supported applications. Manage onboarding and offboarding processes related to application accessand user provisioning. Support local tech teams with day to day support on an ad-hoc basis Provide input into the deployment of customer-facing IT requirements aligned to … to work independently onsite while collaborating effectively with global teams. Desirable (but not essential) ITIL Foundations Certification Experience supporting Mac and Windows environments Familiarity with identityandaccessmanagement, SSO, and federation technologies Experience with scripting or automation tools (e.g., PowerShell, Python, Google Apps Script) Industry certifications (e.g., CompTIA A+, Google Workspace, Microsoft) What More ❯
Maintain the corporate Business Case Management systems for all departments, including upgrades, security vulnerability patching and server maintenance - Responsible for Microsoft 365 platform identityandaccessmanagement for users in the 365 suite of applications e.g., SharePoint, Entra, Teams, Power BI and exchange etc - Technical support of the Council VOIP Telephone system More ❯
Maintain the corporate Business Case Management systems for all departments, including upgrades, security vulnerability patching and server maintenance - Responsible for Microsoft 365 platform identityandaccessmanagement for users in the 365 suite of applications e.g., SharePoint, Entra, Teams, Power BI and exchange etc - Technical support of the Council VOIP Telephone system More ❯
Maintain the corporate Business Case Management systems for all departments, including upgrades, security vulnerability patching and server maintenance - Responsible for Microsoft 365 platform identityandaccessmanagement for users in the 365 suite of applications e.g., SharePoint, Entra, Teams, Power BI and exchange etc - Technical support of the Council VOIP Telephone system More ❯
bristol, south west england, united kingdom Hybrid/Remote Options
Leonardo
Learn to integrate security into the systems engineering lifecycle, from requirements analysis through to implementation and operations. Develop practical knowledge of security technologies, such as identityandaccessmanagement (IAM), public key encryption (PKI), encryption, firewalls, and intrusion detection/prevention systems (IDPS), and how they fit into architectural designs. Role Requirements All of … up to 12 additional flexi-days each year. Secure your future Benefit from our award-winning pension scheme with up to 15% employer contribution. Your wellbeing matters Free access to mental health support, financial advice, and employee-led networks championing inclusion and diversity (Enable, Pride, Equalise, Armed Forces, Carers, Wellbeing and Ethnicity). Rewarding performance All employees are More ❯
and hybrid Cloud platforms (e.g., AWS, Azure, Google Cloud). Experience designing and deploying secure Cloud architectures and reference frameworks. Familiarity with Cloud security tools, identityandaccessmanagement, encryption, and compliance standards. Excellent communication skills and the ability to work effectively with clients and cross-functional teams. Relevant security certifications preferred (e.g., CCSP More ❯
and hybrid Cloud platforms (e.g., AWS, Azure, Google Cloud). Experience designing and deploying secure Cloud architectures and reference frameworks. Familiarity with Cloud security tools, identityandaccessmanagement, encryption, and compliance standards. Excellent communication skills and the ability to work effectively with clients and cross-functional teams. Relevant security certifications preferred (e.g., CCSP More ❯