use and integrate Big Data services. Security Consultant - Supports our services that have a focus on enabling security specialists using AWS Services including IdentityAccessManagement (IAM), GuardDuty, Shield, Key Management Service (KMS), CloudTrail, CloudHSM, Inspector etc. A day in the life …/or Windows). - Experience with software development lifecycle (SDLC) and agile/iterative methodologies; Experience with infrastructure as code, ops automation, and configuration management tools such as Chef, Puppet, or Ansible. - Experience around implementing cloud-based technology solutions - in a school project or while working for a … diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Awaze
security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing … Security : Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and respond to security incidents, conducting … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as, CIS, ISO 27001, NIST, andMore ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
ll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a … Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber … threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response More ❯
ll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a … Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber … threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response More ❯
engineering teams and proactively identify, assess, and remediate security risks across our product portfolio. This role will focus on secure development practices, vulnerability management, threat modelling, and driving a shift-left security culture. The ideal candidate is a pragmatic problem solver with strong technical expertise in application security … from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modelling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code & Architecture Review … GitHub Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & accessmanagement (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. More ❯
Silverfort is a cyber security company that develops a revolutionary identity protection platform. Our mission is to provide industry leading unified identity protection solutions for hybrid and multicloud environments. Using patented technology, Silverfort's platform enables strong authentication across entire corporate networks and cloud environments, without … data (ARR, Bookings, Pipeline, etc.) as well as partner-facing KPIs and metrics. Requirements 4-7 years of proven experience in operations and program management, specializing in partner collaboration Independent thinker with high energy and positive attitude who is highly detail-oriented, hyper-organized, and can manage multiple … as data management, reporting, process updates, and creating dashboards for both large- and small-scale initiatives Experience with various documentation and project management tools such as Monday, Jira or Seismic is also an asset. Preferred experience with PRM solutions - Impartner Extensive experience thriving in fast-paced More ❯
leading IT service provider. Working at Computacenter, you'll have the chance to collaborate with talented professionals, gain exposure to cutting-edge technology, andaccess continuous learning and development opportunities. What You'll Do As a CyberArk Consultant , you will play a key role in advising and implementing … CyberArk solutions for clients, helping them optimize their security posture through the use of best-in-class privileged access management. Your responsibilities will include: Consultation & Implementation : Advise and implement CyberArk solutions, ensuring successful deployment and integration with client environments Security Patch Management : Apply necessary security patches … with Windows, Active Directory, Unix, databases, and Cloud technologies (AWS, Azure). Security & IAM Knowledge : In-depth understanding of security best practices andIdentity & AccessManagement (IAM) principles. Account Onboarding : Proven experience in onboarding Windows, Unix, Active Directory, database, and cloud accounts into CyberArk. More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure managementand security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … practices such as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, IdentityandAccessManagement Vulnerability management, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS … Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure managementand security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … practices such as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, IdentityandAccessManagement Vulnerability management, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS … Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure managementand security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … practices such as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, IdentityandAccessManagement Vulnerability management, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS … Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secrets management SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more of our More ❯
Customer Success Manager - EMEA North London, United Kingdom Full-time About The Position Silverfort is a cyber security startup that develops a revolutionary identity protection platform. Our mission is to provide industry leading unified identity protection solutions for hybrid and multicloud environments. Using patented technology, Silverfort … industry innovator, being named "Best of MFA award" from Expert Insights, Microsoft Security 20/20 partner award, Homeland Security Award for Best IdentityAccessManagement platform for its agentless secure authentication and zero trust platform by Astors. As an Enterprise Customer Success Manager … Requirements Proven track record (5+ years) of relevant experience in Post Sales/Customer Success/Solution Architecture. Strong technical aptitude (cybersecurity/identity is a plus) demonstrating credibility as a strategic advisor to support customers, partners, and internal teams - a must. Demonstrated business acumen - ability to work More ❯
and application issues Manage and mentor junior DevOps engineers Skills, Knowledge and Expertise 5+ years of experience in AWS cloud infrastructure design, implementation, andmanagement Proficient programming skills in at least one language, preferably Python or Go Extensive experience in deploying cloud platforms at scale using AWS Organisations … Control Tower/Landing Zones Expert-level experience with Infrastructure as Code tooling such as Ansible, CloudFormation or Terraform Extensive background in Configuration Managementand Automation Strong knowledge of Linux/Unix systems administration Expert-level experience in AWS Networking/TCP/Firewalls/Certs Advanced proficiency … implementing security controls in a cloud environment including SIEM, Guard Duty, Shield, Inspector and Security Hub Experience with CI/CD pipeline development andmanagement Best practice configuration of IdentityandAccessManagementand IAM Identity Center Preferred Qualifications AWS More ❯
london, south east england, united kingdom Hybrid / WFH Options
Digital Skills ltd
and application issues Manage and mentor junior DevOps engineers Skills, Knowledge and Expertise 5+ years of experience in AWS cloud infrastructure design, implementation, andmanagement Proficient programming skills in at least one language, preferably Python or Go Extensive experience in deploying cloud platforms at scale using AWS Organisations … Control Tower/Landing Zones Expert-level experience with Infrastructure as Code tooling such as Ansible, CloudFormation or Terraform Extensive background in Configuration Managementand Automation Strong knowledge of Linux/Unix systems administration Expert-level experience in AWS Networking/TCP/Firewalls/Certs Advanced proficiency … implementing security controls in a cloud environment including SIEM, Guard Duty, Shield, Inspector and Security Hub Experience with CI/CD pipeline development andmanagement Best practice configuration of IdentityandAccessManagementand IAM Identity Center Preferred Qualifications AWS More ❯
to continue to learn and improve, including coaching/mentoring others. This role will specialise in all aspects of information/cyber security management, as well as business and regulatory compliance using cloud web services in large scale computing environments. Responsibilities: Expertise - Knowledge of cloud technologies and the … AWS services (such as Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon DynamoDB/RDS databases, AWS IdentityandAccessManagement (IAM), Security, Identity, & Compliance, etc). Solutions - Provide advice and support the delivery technical engagements with partners and … technical activities such as solution review. BASIC QUALIFICATIONS 7+ years of technical specialist, design and architecture experience 10+ years of security, compliance and risk management experience 5+ years of cloud based solution (AWS or equivalent), system, network and operating system experience 7+ years of external or internal customer More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identityandaccessmanagement, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends … features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), andidentity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience … an AWARD WINNING package which includes - discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme - At Hastings Direct we understand that mental health cannot not be scheduled, that's why we More ❯
bexhill, south east england, united kingdom Hybrid / WFH Options
Hastings Direct
responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identityandaccessmanagement, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends … features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), andidentity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience … an AWARD WINNING package which includes - discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme - At Hastings Direct we understand that mental health cannot not be scheduled, that's why we More ❯
brighton, south east england, united kingdom Hybrid / WFH Options
Hastings Direct
responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identityandaccessmanagement, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends … features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), andidentity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience … an AWARD WINNING package which includes - discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme - At Hastings Direct we understand that mental health cannot not be scheduled, that's why we More ❯
proven experience designing, building and managing modern Directory capabilities for Cloud and self-hosted applications. You will be responsible for the design, implementation, andmanagement of GSK's Directory infrastructure. This role is critical in ensuring the reliability, security, and efficiency of our Directory environment, which supports authentication … authorization, and policy enforcement across the enterprise. In this role you will Support the design, implementation andmanagement of GSK's Directory infrastructure. The role requires supporting the product owner and architects in driving improvement in the directory services and broader IAM domain. Ensure that GSK's regulatory … Why you? Qualifications & Skills: We are looking for professionals with these required skills to achieve our goals: Significant experience in identityandaccessmanagement, with a focus on Azure Entra ID (Azure Active Directory). Proven experience in implementing and managing Azure Entra ID More ❯
an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting … regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports … the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction More ❯
an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting … regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports … the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
newport, wales, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯