standards, and guidelines for cloud services, ensuring alignment with regulatory requirements and internal security frameworks. Provide expertise and guidance on data protection, network security, andidentityandaccessmanagement within cloud platforms. Preferably, assess and enhance the security of Salesforce, including data security, access controls, and compliance. Desirable Qualifications: 6+ years of More ❯
standards, and guidelines for cloud services, ensuring alignment with regulatory requirements and internal security frameworks. Provide expertise and guidance on data protection, network security, andidentityandaccessmanagement within cloud platforms. Preferably, assess and enhance the security of Salesforce, including data security, access controls, and compliance. Desirable Qualifications: 6+ years of More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
environments. Strong hands-on experience with Microsoft Azure services (e.g., Azure Virtual Network, Azure Kubernetes Service, Azure DevOps, Azure Monitor). Solid understanding of networking, identityandaccessmanagement (IAM), and security best practices in cloud environments. Experience in regulated industries, preferably financial services, with a strong grasp of compliance and governance requirements. Proficiency More ❯
years of experience with at least one major cloud provider (Azure, AWS, or GCP). Over 5 years of experience in networking, firewalls, endpoint security, identityandaccessmanagement, and data protection. In-depth understanding of cloud service models (IaaS, PaaS, SaaS). Hands-on experience with industry-leading security tools across network, data … skills; able to present to both technical and non-technical audiences. Resilient, flexible, and capable of managing multiple demands both planned and Effective multitasker with strong project and time management abilities. Practical problem-solver with a focus on actionable, realistic solutions. Core Competencies Client Excellence - Understands client needs, manages conflict Innovation & Resourcefulness - Innovates, drives for results Teamwork & Interpersonal … Skills - Communication, team collaboration Expertise - Business acumen, technical proficiency Integrity - Acts with integrity and builds trust Leadership - Vision, strategic thinking, change management, talent development More ❯
years of experience with at least one major cloud provider (Azure, AWS, or GCP). Over 5 years of experience in networking, firewalls, endpoint security, identityandaccessmanagement, and data protection. In-depth understanding of cloud service models (IaaS, PaaS, SaaS). Hands-on experience with industry-leading security tools across network, data … skills; able to present to both technical and non-technical audiences. Resilient, flexible, and capable of managing multiple demands—both planned and Effective multitasker with strong project and time management abilities. Practical problem-solver with a focus on actionable, realistic solutions. Core Competencies Client Excellence - Understands client needs, manages conflict Innovation & Resourcefulness - Innovates, drives for results Teamwork & Interpersonal … Skills - Communication, team collaboration Expertise - Business acumen, technical proficiency Integrity - Acts with integrity and builds trust Leadership - Vision, strategic thinking, change management, talent development More ❯
skilled and experienced Google Cloud Technical Architecture Associate Manager to join the Google Cloud group within Accenture Technology in the UK. The group engineers and implements infrastructure, tools, access, and telemetry for systems that enable orchestration of Google-scale services. In this role, you will be responsible for leading the technical delivery of cloud solutions, primarily focused on … Code (Terraform), CI/CD pipelines, and scripting (Bash, Python, Perl, etc.) to automate routine tasks Strong understanding of cloud security best practices and tools (IdentityandAccessManagement, firewalls, encryption) Hands-on experience with networking across cloud and on-premise systems (TCP/IP, subnets, VPC, load balancing, DNS) Proven experience leading small … providing technical guidance and mentorship to junior team members Strong communication skills with the ability to articulate complex technical concepts to both internal and client technical, non-technical, andmanagement stakeholders Experience in site reliability engineering or IT production systems operations including troubleshooting and debugging live incidents Excellent problem-solving abilities with demonstrable examples of implementing technical innovation More ❯
models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, andaccess logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function on threat modelling, security reviews, and AI-specific control design. Enterprise Integration: Integrate with … enterprise IdentityandAccessManagement (IAM) systems, enforcing Role-Based Access Control (RBAC) and least privilege principles. Compliance Support: Conduct vulnerability scans, manage pen-test remediation, and assist in internal and regulatory audits (FCA, PRA). Required Knowledge & Experience: Proven experience delivering greenfield AI systems in production with secure-by-design architecture. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
models (LLMs), retrieval-augmented generation (RAG) pipelines, agentic workflows, and document intelligence systems. Cybersecurity & Privacy: Integrate cybersecurity and data privacy controls across all AI workflows, including encryption, anonymisation, andaccess logging. Collaborate with CISO: Work closely with the Chief Information Security Officer (CISO) function on threat modelling, security reviews, and AI-specific control design. Enterprise Integration: Integrate with … enterprise IdentityandAccessManagement (IAM) systems, enforcing Role-Based Access Control (RBAC) and least privilege principles. Compliance Support: Conduct vulnerability scans, manage pen-test remediation, and assist in internal and regulatory audits (FCA, PRA). Required Knowledge & Experience: Proven experience delivering greenfield AI systems in production with secure-by-design architecture. More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
security best practices. Define and enforce security policies, standards, and governance frameworks. Evaluate and integrate security tools (e.g., Microsoft Defender, Sentinel, Entra ID). Support incident response and vulnerability management processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security … frameworks (e.g., NIST, CIS, ISO 27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identityandaccessmanagement, and network security. Excellent stakeholder engagement and documentation skills. If intrested please apply with the most up to date CV More ❯
Borehamwood, Hertfordshire, United Kingdom Hybrid / WFH Options
Interaction Recruitment
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO Our Team Together we engineer and build the infrastructure, tools, accessand telemetry for systems that enable orchestration of Google-scale services. Join us and help build what matters. We are seeking a Google Cloud Technical Architecture Manager to join … networking) to enable scalable and secure Google Cloud adoption Strong communication skills with the ability to articulate complex technical concepts to both internal and client technical, non-technical andmanagement stakeholders Set yourself apart: Proven experience leading small technical teams to deliver outcomes in a project setting, providing technical guidance and mentorship to junior team members Experience with … CI/CD pipelines and scripting (e.g. Bash, Python, Perl etc.) to automate routine tasks Strong understanding of cloud security best practices and tools (e.g. IdentityandAccessManagement, firewalls, encryption) Hands-on experience with networking across cloud and on-premises systems (e.g. TCP/IP, subnets, VPC, load balancing, DNS) Experience in site More ❯
deploying Azure services across an organisation Microsoft Azure operational and monitoring tools Strong understanding of IAC tools: Terraform, Bicep, or ARM templates Understanding of Microsoft identityandaccessmanagement products such as Entra ID, Entra ID Connect, Conditional Access, SSO protocols, and Active Directory Domain Services. Microsoft Azure and its relevant build More ❯
deploying Azure services across an organisation Microsoft Azure operational and monitoring tools Strong understanding of IAC tools: Terraform, Bicep, or ARM templates Understanding of Microsoft identityandaccessmanagement products such as Entra ID, Entra ID Connect, Conditional Access, SSO protocols, and Active Directory Domain Services. Microsoft Azure and its relevant build More ❯
breaking, ultra-secure, high performance, cloud-based data infrastructure for the enterprise. Our proprietary technology solutions drive performance and reduce costs while helping our clients to improve the managementand sharing of data across their organisations. In 2024, Aker Systems won the Breakthrough Culture Awards highlighting growth companies putting culture first. In 2020 Aker Systems was recognised as … workloads using Kubernetes (AKS) Collaborate with software engineers and solution architects to ensure deployment consistency, environment parity, and system security Support secure configuration of networking, identity, andaccessmanagement in Azure Help integrate platform components with client environments, participating in deployments, troubleshooting, and documentation Drive observability and resilience across environments using tools like Prometheus More ❯
of working Experience with algorithms and data structures. Experience in Observability practices with logging, metrics, tracing, and alerting. Experience with Infrastructure as Code. Understanding of identityandaccessmanagement, and application security. We use Datadog and BigPanda for our observability stack, Terraform for our cloud infrastructure, and EntraID as our IAM solutions but we … to be an equal opportunities employer. This means that we do not discriminate on the basis of anyone's race, religion, colour, national origin, gender, sexual orientation, gender identity, gender expression, age, marital status, veteran status, pregnancy or disability, or any other basis protected under applicable law. Conforming with applicable law, we can reasonably accommodate applicants' and employees More ❯
with colleagues. This role has the option to grow towards either a principal engineering role (a technical specialist leader) or an engineering manager (a team leader with line management) position at Vivacity, through structured career progression pathways. About us At VivaCity, we make cities smarter, safer, and more sustainable. We have over 5,000 AI sensors around the … familiar with the problem space, and you know when and how to ask for help. Requirements for the role: Expertise in Apache Kafka (ideally Kafka Strimzi), including broker management, scaling, upgrades, and integration with high-throughput data pipelines. Experience managing PostgreSQL databases, including load analysis, query optimisation, and role management. Experience with modern cloud infrastructure as GCP/… common DevOps tools and CI/CD processes. Proficiency with infrastructure management tools (e.g. Ansible, Chef, Puppet) Knowledge of information security principles, including identityandaccessmanagementand authentication/authorisation processes. Experience in a start-up or scale-up environment. Passion for sustainability, transport or smart cities. You don't need More ❯
regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identityandaccessmanagement, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK More ❯
servers, networks, cloud platforms, and end-user computing environments. The role will also support key projects on our technology roadmap, including infrastructure upgrades and cloud migrations. Duties and responsibilities Infrastructure Management • Administer and maintain on-premises and cloud-based infrastructure (e.g., Microsoft Windows Server, M365). • Monitor system performance and ensure high availability and reliability. • Implement and maintain … VPNs, and network security, collaborating with MSPs/Vendors as required. Cloud & Systems Administration • Manage Microsoft Defender, Entra ID, Exchange Online, SharePoint, and Intune. • Support identityandaccessmanagement across cloud and hybrid environments. Project Delivery • Contribute to infrastructure upgrade and migration projects. • Assist in planning and implementing new systems and services. • Document infrastructure … external standards. • Support implementation of security controls and participate in audits. • Collaborate with the security team to address vulnerabilities and incidents. Supporting additional work as reasonably required by management from time to time. This list is not exhaustive. Skills and experience Essential • Proven experience in infrastructure engineering or systems administration. • Strong knowledge of Microsoft technologies (Windows Server, M365 More ❯
be working on We are recruiting for a Head of Security Architecture & Engineering to join our team. In this role, you will be responsible for the leadership and operational management of the Security Architecture and Engineering team at Ki, actively collaborating with Ki's Technology & Product teams to devise and execute strategic initiatives that drive a 'secure, private … and ensure a robustly secure platform and product are in place in light of emerging threats and regulatory requirements. You'll be an expert in IdentityandAccessManagement, including privileged user controls and secrets management, with a good understanding of security topics in Azure, GCP, serverless, container platforms, and Infrastructure as More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of assigned controls, documenting results clearly and raising issues where appropriate Ensure timely delivery of assigned control … of quality and accuracy. Strong understanding of Cyber Security Domains including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, IdentityandAccessManagement, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have/bring: Experience working in a regulated environment. Experience within the … Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who are we? We're the More ❯
field or equivalent practical experience. 6 years of experience in information security and engineering, working with cloud-based infrastructure environments. 4 years of experience with identityandaccessmanagement with tech stacks (e.g., Active Directory, GCP, Entra ID, Palo Alto, Cisco), enterprise architecture and cloud architecture with one cloud platform. Preferred qualifications: Certification in … or disaster recovery. Excellent written and verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner. Excellent attention to detail and time management skills. Ability to travel up to 30%. About the job In this role, you will be responsible for helping clients effectively prepare to mitigate, and respond to … threats than anyone. Responsibilities Lead, coordinate, and conduct technical security assessments for cloud-based security infrastructures and platforms. Assist clients with designing and implementing architecture enhancements, security configurations, identity protections, cloud workflows, and appropriate countermeasures to defend against threats and attacker techniques. Build scripts, tools, or methodologies to enhance Mandiant's on-premise active directory or Cloud assessment More ❯
both visionary direction and practical stewardship across all core domains-ranging from Wintel server estates through network architecture to end-point administration, Unix systems integration, database stewardship, storage management solutions, backup technologies, and cloud-based services. You will act as the ultimate escalation point for complex technical challenges while collaborating extensively with architectural teams on solution design. Your … responsibilities extend to overseeing seamless service delivery; imparting expert guidance on portfolio management; ensuring robust risk mitigation; managing substantial budgets; orchestrating disaster recovery strategies; nurturing team development; maintaining exhaustive documentation; evaluating vendor relationships; reporting on key metrics; supporting regional operations; managing third-party providers; planning upgrades; enforcing stringent security protocols; and championing continuous enhancement throughout the infrastructure lifecycle. … What you bring: * Extensive experience exceeding ten years in IT infrastructure management within large-scale multinational organisations with at least five years occupying senior or regional leadership positions.* Profound technical proficiency encompassing Wintel platforms (Windows Server 2016/2019/2022), Linux system administration, enterprise-grade databases (SQL/Oracle), VMware virtualisation (SRM/Aria monitoring), Exchange Online More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯