major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, youll play a key role in shaping secure, scalable solutions. Youll also enjoy the benefits of working for … Europes leading independent IT providerwith a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting at … teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Join Us. Drive Innovation. Deliver Impact. More ❯
as-Code (IaC) and automation Understanding of DevSecOps , CI/CD , and cloud-native design patterns Broad knowledge of cloud security, compliance, governance, andidentitymanagement Experience building scalable infrastructure solutions using services such as: Terraform/Deployment Manager/CloudFormation/Bicep Cloud networking, DNS … identityandaccessmanagement (IAM) GCP Landing Zones, cost optimisation strategies Background in developing and maintaining architectural standards and roadmaps Desirable: TOGAF certification and other relevant cloud certifications (Google Cloud Architect preferred, Azure, AWS) Public sector, healthcare or NHS-related project experience Familiarity with … clinical safety and risk management in digital health Participation in on-call operational support rotas This is a hands-on leadership role ideal for someone who thrives in complex environments and enjoys shaping future-ready cloud platforms. If you're passionate about automation, infrastructure design, and cloud excellence More ❯
You'll have the opportunity to apply your knowledge to some of the highest profile projects and customers in the market. With open access to thought leaders and major industry players you'll get exposure to leading edge technologies which will enable you to advance your skills. What … and software vendors Track record of leading large technical teams in the Pre-sales and execution phases Experience in collaborating with Senior IT Managementand executives at the C-level Capability to lead and own the entire customer engagement process, starting with the preliminary interaction to the successful … Collaboration services, Modern Management, andIdentity & AccessManagement Certifications in Microsoft solution areas such MS365, Azure, IDAMand Security would be an advantage Current information for our applicants Business as usual? Not quite. Of course, the Corona crisis also presents us with More ❯
key role in scaling and supporting global IT operations across EMEA. This is a hands-on role focused on infrastructure, identityandaccess, automation, and creating world-class internal systems. You’ll partner with product, security, and commercial teams while supporting a growing remote-first workforce … and London office. Key Responsibilities: Own identityandaccessmanagement systems, including configuration and ongoing support of Okta, SSO, and IAM policies Identify and implement automation across user lifecycle management, SaaS provisioning, and IT workflows Provide IT support coverage during EMEA hours … re Looking For: 3+ years in a support, systems engineer, or IT manager role at a software vendor Experience with identityandaccess tools such as Okta and SSO Strong knowledge of AWS environments Proficiency in macOS and MDM tools (e.g., Kandji, JAMF) Ability to write More ❯
london, south east england, United Kingdom Hybrid / WFH Options
CD Recruitment
key role in scaling and supporting global IT operations across EMEA. This is a hands-on role focused on infrastructure, identityandaccess, automation, and creating world-class internal systems. You’ll partner with product, security, and commercial teams while supporting a growing remote-first workforce … and London office. Key Responsibilities: Own identityandaccessmanagement systems, including configuration and ongoing support of Okta, SSO, and IAM policies Identify and implement automation across user lifecycle management, SaaS provisioning, and IT workflows Provide IT support coverage during EMEA hours … re Looking For: 3+ years in a support, systems engineer, or IT manager role at a software vendor Experience with identityandaccess tools such as Okta and SSO Strong knowledge of AWS environments Proficiency in macOS and MDM tools (e.g., Kandji, JAMF) Ability to write More ❯
cybersecurity department to align security policies and ensure compliance with organisational standards. Configure, deploy, and manage devices using Microsoft Intune for mobile device management (MDM) and mobile application management (MAM). Monitor system performance and ensure optimal operation of the Microsoft 365 environment. Intune deployment and … configuration including device management, troubleshooting and support. Monitoring and reporting. Conduct regular security audits and risk assessments. Provide technical support and training to end-users. Competent in … endpoint managementand configuration within O365 environment. Stay up to date with the latest Microsoft 365 features and updates. Service Availability andManagement: Engage and manage IT supply chain and technology partners to ensure SLAs are delivered. Oversee and ensure highly available systems, fix problems, andMore ❯
edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identityandaccessmanagement, mobile devices, virtualization and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identitymanagementand authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management … diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. Our inclusive culture empowers Amazonians to deliver the best results for our More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), • Cryptographic techniques … and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This role More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), • Cryptographic techniques … and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This role More ❯
industry best practices (e.g., ISO 27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full lifecycle of company laptops and devices, from procurement and configuration to deployment, patching, and secure decommissioning. Implement MDM (Mobile Device Management … scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding/offboarding processes. Collaboration Tools & Intranet: Lead the implementation andmanagement of internal collaboration tools, including the development of an intranet or SharePoint environment to support knowledge sharing, document management, and employee … Experience designing and implementing collaboration platforms (e.g., Microsoft SharePoint, intranet portals) to improve internal communication and knowledge management. Excellent communication, problem-solving, and project management skills. Experience working across multiple time zones and international teams. Relevant certifications (CISSP, CISM, ITIL, PMP, etc.) are a plus. About the candidate More ❯
london, south east england, united kingdom Hybrid / WFH Options
Quinbrook Infrastructure Partners
industry best practices (e.g., ISO 27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full lifecycle of company laptops and devices, from procurement and configuration to deployment, patching, and secure decommissioning. Implement MDM (Mobile Device Management … scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding/offboarding processes. Collaboration Tools & Intranet: Lead the implementation andmanagement of internal collaboration tools, including the development of an intranet or SharePoint environment to support knowledge sharing, document management, and employee … Experience designing and implementing collaboration platforms (e.g., Microsoft SharePoint, intranet portals) to improve internal communication and knowledge management. Excellent communication, problem-solving, and project management skills. Experience working across multiple time zones and international teams. Relevant certifications (CISSP, CISM, ITIL, PMP, etc.) are a plus. About the candidate More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic … techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic … techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This More ❯
of at least one of the major public Cloud Service Providers (GCP, AWS or Azure) and the security features they provide (Key & Secret management, IAM, Service Accounts, Workload/VM Identities, TLS/PKI, Load Balancing, storage encryption, data localization, etc.). Experience on developing & comprehending source code … Ruby, Rust, Go, Python, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, accessmanagement, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols … identifying and mitigating security vulnerabilities on software running on cloud platforms (OWASP Web Top10 vulnerabilities, data encryption, transport layer protections, insecure configurations, secrets management, etc.). Experience with cloud confidential computing, virtualization, enclaves, containers, and workload attestation technologies. Problem solving skills, analytical thinking, and willingness to learn/ More ❯
of at least one of the major public Cloud Service Providers (GCP, AWS or Azure) and the security features they provide (Key & Secret management, IAM, Service Accounts, Workload/VM Identities, TLS/PKI, Load Balancing, storage encryption, data localization, etc.). Experience on developing & comprehending source code … Ruby, Rust, Go, Python, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, accessmanagement, and secrets management technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied cryptography and cryptographic protocols … identifying and mitigating security vulnerabilities on software running on cloud platforms (OWASP Web Top10 vulnerabilities, data encryption, transport layer protections, insecure configurations, secrets management, etc.). Experience with cloud confidential computing, virtualization, enclaves, containers, and workload attestation technologies. Problem solving skills, analytical thinking, and willingness to learn/ More ❯
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … s. Evaluate and implement CIS critical security controls where necessary. Provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training More ❯
the cutting edge of security for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identityandaccessmanagement, mobile devices, virtualization, and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identitymanagementand authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying More ❯
Security Senior Consultant experienced in working on a range of projects covering the breadth of Cyber Security including: Cyber Strategy Development, Cyber Programme Managementand Definition, Cyber Maturity Assessments, Cyber Transformation and Cyber Risk. You will join an expanding team of over 1,000 Cyber professionals across EMEIA … based on the cyber security threats and risks they face Pragmatic approach to identifying and explaining cyber risks within complex transformation initiatives Project managementand delivery experience across the following Cyber Security areas: frameworks (e.g. NIST CSF, CPMI … IOSCO, ISO, 'Profile' - Financial Services sector-specific distillation of the NIST CSF, etc.), assessments, implementation, roadmap definition (tactical and strategic), strategy, risk identification andmanagement, controls framework, programme managementand target operating modelling Understanding of the Financial Services Cyber Security threat landscape and the UK Financial More ❯
IG and DS Strong experience in PingOne Advanced Identity Cloud with experience in designing implementing and managing scalable identityandaccessmanagement IAM solutions Should have experience in integrating PingOne Advanced Identity cloud with existing Applications and infrastructure in place … Strong experience in the Ping Identity Platform and products with deep knowledge of PingOne AIC ForgeRock … Identity Cloud and Ping Gateway ForgeRock IG Minimum 5 years experience in Design development and implementation of ForgeRock IdentityandAccessMore ❯
World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity … building a world where Identity belongs to you. Okta is looking for a Regional Alliances Manager with strong deal, strategy and relationship management experience to partner with Okta's Regional System Integrators with the aim of extending and enhancing Okta's channel eco-system in the … across all levels of partner and prospect organizations; Current knowledge of the trends and market leading companies in the broader Cloud Computing andIdentityAccessManagement ecosystem; Experience with Cloud Software Vendors and their strategies/business motion What you can look forward to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing … Security : Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and respond to security incidents, conducting … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, andMore ❯
our industry's most exciting space. Security Consultant: Supports our services that have a focus on enabling security specialists using AWS Services including IdentityAccessManagement (IAM), GuardDuty, Shield, Key Management Service (KMS), CloudTrail, CloudHSM, Inspector, etc. About AWS Diverse Experiences AWS …/or Windows). - Experience with software development lifecycle (SDLC) and agile/iterative methodologies; Experience with infrastructure as code, ops automation, and configuration management tools such as Chef, Puppet, or Ansible. - Knowledge of the primary AWS services such as EC2, ELB, RDS, VPC, Route53, and S3. - Experience More ❯
IT infrastructure, ensuring high availability and performance across all systems. Develop and implement best practices for system maintenance, monitoring, and support. Core Projects Management: Manage and oversee critical infrastructure projects, including network replacement initiatives. Ensure all projects are completed on time, within scope, and on budget while minimizing … to Microsoft Enterprise solutions, including Office 365, Microsoft Azure, and Dynamics 365, enhancing collaboration, productivity, and security across the organisation. IdentityandAccessManagement (IAM): Lead IAM initiatives to implement robust security protocols that guarantee secure access to systems and data. Develop … Hyper-V and VMware for server and application hosting. Networking: Strong understanding of network infrastructure, including LAN, WAN, VPNs, and security protocols. Monitoring andManagement Tools: Familiarity with system and network monitoring tools to proactively identify and resolve issues. Ideal Candidate Profile: Experience: A minimum of 5 years More ❯
london, south east england, united kingdom Hybrid / WFH Options
Pulse Recruit
IT infrastructure, ensuring high availability and performance across all systems. Develop and implement best practices for system maintenance, monitoring, and support. Core Projects Management: Manage and oversee critical infrastructure projects, including network replacement initiatives. Ensure all projects are completed on time, within scope, and on budget while minimizing … to Microsoft Enterprise solutions, including Office 365, Microsoft Azure, and Dynamics 365, enhancing collaboration, productivity, and security across the organisation. IdentityandAccessManagement (IAM): Lead IAM initiatives to implement robust security protocols that guarantee secure access to systems and data. Develop … Hyper-V and VMware for server and application hosting. Networking: Strong understanding of network infrastructure, including LAN, WAN, VPNs, and security protocols. Monitoring andManagement Tools: Familiarity with system and network monitoring tools to proactively identify and resolve issues. Ideal Candidate Profile: Experience: A minimum of 5 years More ❯