exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
a Security Architect at Trainline, you will Define and own the enterprise-wide security architecture blueprint across corporate and product domains. Drive the Trainline Zero Trust initiative, spanning identity, device, network, and application layers. Lead secure design reviews … and threat modelling for key product and infrastructure initiatives. Develop reference architectures and reusable security design patterns. Collaborate with the IAM Engineer to architect enterprise identityandaccessmanagement Enforce secure configurations across SaaS, endpoint, and MDM platforms (e.g., CrowdStrike, Jamf, Intune). Evaluate and guide SaaS tool usage, integrations, and risk mitigation. Design … the SDLC and CI/CD. Define security controls for cloud-native services in AWS (IAM, KMS, GuardDuty, VPC security, etc.). Contribute to secure API design, secrets management, service-to-service auth, and cloud segmentation. Provide architectural governance input into vendor risk, procurement reviews, and data privacy design. Provide input as the security architecture voice in planning More ❯
ensuring a robust security posture and supporting continuous delivery of our applications. Key Responsibilities: Design and implement secure AWS cloud infrastructure, focusing on system architecture, IdentityandAccessManagement (IAM), encryption, data protection, and network security. Collaborate with the Information Security and application teams to drive cloud security initiatives and align with the broader … Terraform and Ansible for secure provisioning and management. Excellent problem-solving capabilities and strong verbal and written communication skills. Practical experience using Wiz or similar cloud security posture management tools. More ❯
ensuring a robust security posture and supporting continuous delivery of our applications. Key Responsibilities: Design and implement secure AWS cloud infrastructure, focusing on system architecture, IdentityandAccessManagement (IAM), encryption, data protection, and network security. Collaborate with the Information Security and application teams to drive cloud security initiatives and align with the broader … Terraform and Ansible for secure provisioning and management. Excellent problem-solving capabilities and strong verbal and written communication skills. Practical experience using Wiz or similar cloud security posture management tools. More ❯
hospitals and health systems to care for patients at home. We support patients across the full care journey-from early discharge and acute recovery to long-term condition managementand proactive care. We provide everything clinicians need to deliver safe, effective Virtual Care: medical-grade devices, logistics, patient onboarding, EHR integration, and an end-to-end clinical platform … infrastructure as code patterns Creating effective CI/CD delivery pipelines so that users can focus on doing the job, not deploying it Ensuring that identityandaccessmanagement deliver a secure and minimal platform while continuing to enable users. Working cross functionally with the wider organisation to migrate existing infrastructure to the new … and monitoring tooling, and building a sustainable on-call process Disaster response, resilient systems engineering, and security automation Cloud security and systems hardening An understanding of effective cost management as a key component of cloud platform administration. A bias towards action and a desire for mission-driven work Excellent communication skills, including communication with less-technical staff Experience More ❯
and Banking space. Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
and Banking space. Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with service operations procedures. · Conduct full … Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly and concisely. Plans and manages own More ❯
SaaS and self-hosted services with a strong emphasis on security, scalability, and reliability. Our responsibilities include essential System Administration and GitOps-driven initiatives that enhance deployment, configuration management, and CI/CD workflows, and Employee Lifecycle Operations. As we grow, our team is committed to championing GitOps and automation, significantly advancing OpenAI's capabilities in managing cloud … global IT Support Escalations and major incidents, with rotating on-call responsibilities. Your expertise in SaaS and System Administration will contribute to ongoing efforts to transform IT system management practices. Additionally, you will have the opportunity to operationalize and maintain GitOps workflows and CI/CD methodologies. You will partner closely with other IT and Security Teams to … and the end-user experience. You proactively develop internal tools, documentation, and runbooks to reduce friction, increase transparency, and upskill peers. You are proficient in identityandaccessmanagement (IAM), leveraging tools such as Azure/Entra ID, Jamf, and Intune to maintain strong security postures. Design and implement scalable automation workflows across ITSM More ❯
Life on the team Join Computacenters dynamic and fast-growing Consultancy Practice as an Identity Consultant, where youll be part of a collaborative, forward-thinking team … thats driving real change for major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, youll play a key role in shaping click apply for full job details More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses: interactive investor (ii) - the UK's … of DevOps practices and tools (Azure DevOps, GitHub, CI/CD). Strong knowledge of networking concepts (DNS, VPN, Firewalls, load balancers). Experience with identityandaccessmanagement in Azure. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of … annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans andaccess to an employee discount portal. Our business Enabling our clients to be better investors drives everything we do. Our business is structured around three distinct areas - our vectors More ❯
difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses: interactive investor (ii)- the UK's … of DevOps practices and tools (Azure DevOps, GitHub, CI/CD). Strong knowledge of networking concepts (DNS, VPN, firewalls, load balancers). Experience with identityandaccessmanagement in Azure. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of … annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans andaccess to an employee discount portal. You can read more about our benefitshere. Our business Enabling our clients to be better investors drives everything we do. Our business is More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
hands-on experience in securing cloud computing platforms, particularly Microsoft Azure and AWS. Have expertise in applying security controls across platforms like M365. Ensuring secure identityandaccessmanagementand configuring cloud-native tools to detect and respond to threats. Experience with container security, Infrastructure as Code (IaC), and DevSecOps practices will be a … an integral part of the shortlisting process. As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit. Our University is positive about flexible working. Blended working arrangements may be considered. Please note that More ❯
hands-on experience in securing cloud computing platforms, particularly Microsoft Azure and AWS. Have expertise in applying security controls across platforms like M365. Ensuring secure identityandaccessmanagementand configuring cloud-native tools to detect and respond to threats. Experience with container security, Infrastructure as Code (IaC), and DevSecOps practices will be a … an integral part of the shortlisting process. As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit. Our University is positive about flexible working. Blended working arrangements may be considered. Please note that More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
IT Talent Solutions Ltd
environment. Strong knowledge of Azure IaaS and PaaS services, including Functions, App Services, Azure SQL, Key Vault, and API Management. Deep understanding of cloud security, identityandaccessmanagement (Azure AD), and governance (Azure Policy, Blueprints). Familiarity with microservices, event-driven architectures, and container technologies (Docker, AKS). Ability to translate complex technical More ❯
Employment Type: Full-Time
Salary: £50,000 - £70,000 per annum, Negotiable, Inc benefits
facing networks. Demonstrated knowledge of network fundamentals. • Proficiency with logging infrastructure and tools. • Experience securing application, network and machine infrastructure to enterprise standards. This includes identityandaccessmanagement, data protection, encryption, and key and certificate management. A little more about Droit: Our award-winning platform, Adept, has been in live production since March More ❯
SIEM, IDS/IPS, firewalls and endpoint protection. Nice to haves Extensive experience in designing, implementation, maintenance and review of security controls (in areas of IdentityandAccessManagement, Network Security Design, Application. Security, Security Monitoring, Cloud (Azure/AWS/GCP) and hybrid environments). Experience in implementing Zero Trust principles. Experience in More ❯
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … security/operational network architecture design Must have proficient knowledge and experience with SIEM technologies Strong troubleshooting, reasoning and problem-solving skills Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN etc. Excellent communications skills Exceptional Time Managementand organizational skills Ability to conduct forensic analytical studies and investigations effectively and efficiently Knowledge of More ❯