of technical implementation experience in the domains of SAP application security, role-based access strategies, segregation of duties, identityandaccessmanagement (user provisioning, user access reviews, user terminations), and data security Proficiency in security design, configuration, testing and deployment More ❯
Strategy and Architecture: Develop and implement security strategies aligned with industry standards and best practices, ensuring all systems are secure by design. Risk Management: Assess risks, identify vulnerabilities, and create threat models for new and existing systems to prioritize security controls. Compliance and Governance: Ensure solutions comply with … organizational security standards (e.g., NIST, ISO 27001, GDPR). Solution Design: Lead the design and architecture of security solutions, including identityandaccessmanagement, data protection, network security, and application security. Technical Leadership: Collaborate with cross-functional teams (developers, DevOps, infrastructure) to integrate security … with teams to remediate findings. Incident Response: Develop incident response plans, coordinate responses to security incidents, and drive improvements from lessons learned. Stakeholder Management: Communicate security requirements and risks to both technical and non-technical stakeholders, ensuring alignment with business goals. Essential Skills and Qualifications: Security Clearance: Active More ❯
being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging security … Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability … to rank and prioritize vulnerabilities and security recommendations appropriately within the context of the infrastructure and business processes. Experience maintaining identityandaccessmanagement systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud More ❯
a handful of Windows machines. Ensure a smooth onboarding/offboarding process and resolving technical issues efficiently. Implement and maintain identityandaccessmanagement (IAM) systems, including SSO and MFA. Evaluate and recommend new technology solutions to support company growth and enhance operational efficiency. … or system administration 2+ years in an InfoSec-related role Technical Skills: Proficiency in managing SaaS platforms like Microsoft 365, and endpoint management tools (e.g., Jumpcloud). Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure … practices. Soft Skills: Excellent problem-solving and communication skills. Ability to collaborate effectively with external partners, such as an MSP. Strong organisational and project management skills. A proactive, growth-oriented mindset with the ability to scale IT processes for a rapidly growing company. Preferred Qualifications Certifications: CompTIA Security+ More ❯
and cloud services through a Zero Trust approach. This role will be responsible for building and managing Cloud and Firewall security policies and securing access to BRG resources worldwide. A proven cross-disciplinary skillset would be required to efficiently collaborate with Security, Systems and Network teams on large … with or alongside Security Operations Center (SOC) or Network Operations Center (NOC) teams, including managed service providers. Strong understanding of identityandaccessmanagement (IAM), including multi-factor authentication (MFA) and protocols such as SAML, OAuth2, and Kerberos. Working knowledge of authentication platforms and … operational limitations. Highly organized, with the ability to manage multiple priorities and project timelines. Ability to see beyond constraints of the existing environments andidentity opportunities for improvement. Strong organizational ability. More ❯
and cloud services through a Zero Trust approach. This role will be responsible for building and managing Cloud and Firewall security policies and securing access to BRG resources worldwide. A proven cross-disciplinary skillset would be required to efficiently collaborate with Security, Systems and Network teams on large … scale projects. Key Responsibilities: Lead the administration, configuration, and lifecycle management of all corporate firewalls, including Palo Alto Networks firewalls and GlobalProtect VPN. Manage security infrastructure projects from design through implementation, documentation, and support. Identify and implement improvements to enhance performance, reliability, and scalability of perimeter and cloud … with or alongside Security Operations Center (SOC) or Network Operations Center (NOC) teams, including managed service providers. Strong understanding of identityandaccessmanagement (IAM), including multi-factor authentication (MFA) and protocols such as SAML, OAuth2, and Kerberos. Working knowledge of authentication platforms andMore ❯
practices in North America with over 60,000 users. The company delivers a complete platform of solutions for dental practices including Denticon Practice Management, Apteryx XVWeb Digital Imaging, and Legwork Patient Relationship Management. Planet DDS is committed to creating value for its dental practice clients by solving the … improve business performance SLO's. 2+ years of experience with Production operations including 24x7 on-call support, escalation/paging with OpsGenie, incident management, RCA (Root Cause Analysis) and retrospective analysis. 2+ or more years in hands-on technical roles (such as site reliability engineer, software engineer, DevOps … multiple cloud and on-premise environments using tools such as Terraform, Bicep, PowerShell, Ansible. Knowledge of fundamental cloud security (e.g., identityandaccessmanagement, firewalls, etc.) Strong collaboration and communication skills in a hybrid environment using Microsoft Teams, email and calendar. Bachelor's Degree More ❯
Kubernetes). Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform) to streamline provisioning andmanagement of cloud resources. Monitor, optimise, and troubleshoot cloud infrastructure performance, security, and costs, utilising monitoring tools and logging frameworks Implement and enforce cloud … security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC, SOC2). What we look for Bachelor's degree or equivalent experience in Computer Science or related field Proven experience (3 years) as More ❯
Windsor, Berkshire, South East, United Kingdom Hybrid / WFH Options
Centrica
Responsibilities : Enhance cloud platform functionality, security, and compliance Drive service improvements and operational excellence Conduct risk assessments and manage escalations Recommend IT service management best practices Integrate security into cloud solutions Automate infrastructure provisioning with IaC tools Monitor and troubleshoot system performance Maintain … secure and compliant environments Collaborate with application and data teams Develop disaster recovery strategies Implement governance processes and policies Optimize monitoring, alerting, and incident management Technical Skills : Expertise in cloud engineering and automation Strong CI/CD processes and tools skills Proficiency in managing EntraID Conditional Access … Proficiency with IaC, cloud networking, and security Strong skills in Azure App registrations, Enterprise Apps and associated permissions Administration of identityandaccessmanagement Knowledge of Azure services and cloud platform technologies Experience with role-based access control and managed identities Familiarity More ❯
London, England, United Kingdom Hybrid / WFH Options
Deutsche Bank
deliver intelligent, Application Programming Interface (API)-first software for treasury, payments, working capital, and financial data automation. Our products include multi-bank cash management, link-based payouts and collections, investment portals, and Enterprise Resource Planning (ERP) integrated financial tools. We operate as a fast-moving FinTech with the … Build products that embed Artificial Intelligence (AI) across workflows (invoice matching, approvals, cash flow prediction) Your skills and experience Previous experience of product management in FinTech, SaaS, or platform companies with proven success building API-first or embedded financial products (ERP integrations, Bank APIs, or AI driven modern … build a robust integration with APIs, make meaningful contributions on API design, data modelling and software architecture Strong understanding of IdentityandAccessManagement (IAM) concepts, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), andidentityMore ❯
reigate, south east england, United Kingdom Hybrid / WFH Options
Client Server
IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal … experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good … knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting More ❯
based security testing to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-Based Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. Vulnerability … Management & Defect Tracking Identify, document, and track security defects, working closely with development teams to resolve vulnerabilities . Provide detailed security test reports , including risk assessments and mitigation strategies. Collaborate with stakeholders to prioritize and remediate security findings . 4. Collaboration & Security Awareness Work closely with security architects … conduct penetration testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identityandaccessmanagement (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . More ❯
Design, implement, and manage robust security measures across networks, endpoints, cloud platforms, and IT infrastructure to safeguard systems and data. Oversee the deployment andmanagement of firewalls, intrusion detection systems (IDS), endpoint security solutions, and zero-trust architectures. Collaborate with IT and DevOps teams to embed security into … cloud environments (AWS, Azure, Google Cloud) and application development lifecycles. Implantation andmanagement of SOC and EDR functions. Conduct regular vulnerability assessments, penetration testing, and red-team exercises, working closely with external partners to continuously test and improve security defences. Develop a comprehensive risk register, prioritising risks based … security architectures, network security, cloud security, and endpoint protection. Hands-on expertise in firewalls, IDS/IPS, SIEM solutions, IAM (IdentityandAccessManagement), and zero-trust frameworks. Strong knowledge of secure software development practices (DevSecOps) and modern application security methodologies. Experience with forensic More ❯
roadmap for Corporate, working closely with senior stakeholders, systems owners, and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll, and our Corporate … Company where corporate applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures, and policies to ensure compliance with legal and regulatory requirements. Liaise with internal … Significant and relevant progressive IT experience. Experience of being in a practical solution planning and technical architecture design role is essential e.g., SaaS, IdentityandAccess Management. Good understanding of emerging and innovative technologies, how to shape, deliver, and leverage those technologies. Experience of architecture business More ❯
Cloud), network security, and endpoint protection Hands-on experience with SIEM tools, intrusion detection, firewalls, and threat analysis Knowledge of identityandaccessmanagement (IAM), zero-trust architectures, and encryption techniques Experience conducting vulnerability assessments, and risk analysis Strong analytical and problem-solving skills More ❯
and maintaining Infrastructure as Code (IaC) solutions to automate provisioning and configuration management Implementing security best practices, including identityandaccessmanagement (IAM), encryption, and compliance Working with development and application teams to improve culture and practices Maintaining documentation for infrastructure, processes … tools such as Terraform, ARM Templates, Ansible, or Kubernetes Possess experience with hybrid cloud and multi-cloud environments And have: Progressive computer systems managementand support experience, preferably in a multi-site enterprise-scale environment Experience with Microsoft Azure cloud services and solutions Experience in cloud infrastructure engineering More ❯
to ensure remediation actions are taken in a timely manner Providing oversight, guidance and assurance that supports the continual improvement of security risk management across the organisation Ensuring managed services continuously meet our security requirements, including vendor and supply chain, data centre providers and SaaS services Building effective … matter expertise in at least one security domain, for example, security & risk management, cryptography, security assessment and testing, identityandaccessmanagementand security detection/response/forensics Cloud security knowledge and experience Ability to undertake threat models and risk assessments More ❯
have experience in: Delivering and maintaining of enterprise security solutions/architecture for (but not limited to) the following areas: IdentityandAccessManagement, Cloud Security - Azure, AWS or GCP, Network Security, DevSecOps, Security Monitoring & Remediation, Defense in Depth Security Architecture, particularly Zero Trust … Secure Software Development Life Cycle best practices and architecture frameworks such as TOGAF or SABSA Strong understanding and knowledge of Information Security risk management tools and techniques Demonstrable knowledge of cyber security frameworks, including but not limited to: ISO27001, PCI-DSS, CIS Benchmarks, Cloud Platform Well Architected Frameworks. More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Kent, Broomfield, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
West Midlands, Bilbrook, Staffordshire, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation andmanagement of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use … policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and playbooks. Collaborating with third-party led security tests, assessments and audits of our information security information security policies, procedures, and systems. Identifying … Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, andaccessmanagement, etc. Ability to work in a small high performing team, collaborating with other technical resources whilst aligning to the security More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation andmanagement of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use … policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and playbooks. Collaborating with third-party led security tests, assessments and audits of our information security information security policies, procedures, and systems. Identifying … Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, andaccessmanagement, etc. Ability to work in a small high performing team, collaborating with other technical resources whilst aligning to the security More ❯