for containerized workloads Oversee Azure VMware Solution (AVS) environments, ensuring seamless integration with existing infrastructure Implement security best practices, including identityandaccessmanagement (IAM), encryption, and network security groups Monitor compliance with industry standards (e.g., ISO, SOC, NIST) and regulatory requirements Continuously evaluate More ❯
that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. … mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO 27001, GDPR). Experience with … industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security More ❯
that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. … mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO 27001, GDPR). Experience with … industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security More ❯
manager will coach and lead a globally-distributed team of Java engineers responsible for a range of security features including IdentityandAccessManagement, Auditing, TLS and Certificate Management, and Cryptography. Our company is distributed by intention. We hire the best engineers … Build roadmaps and lead prioritization; balance the right amount of structure and planning for a fast-paced engineering team Work with our Product Management team to ensure requirements and the "why" are clear Foster a culture of mutual respect and collaborative decision-making Stay true to the principles … compliance frameworks (e.g. FedRAMP) Bonus Points Experience in any of the following: Authentication protocols such as SAML, OpenID Connect or LDAP TLS and X.509 certificate management Cryptography, including hashing and encryption. You've worked in open source before and are familiar with different styles of source control workflow More ❯
operation and configuration of the Firm's cloud security toolsets, including the management of CNAPP (Cloud-Native Application Protection Platform) and CASB (Cloud Access Security Broker) technologies. Key Responsibilities: Cloud Security Architecture: Design and implement cloud-native security architectures and solutions to protect the Firm's … and troubleshooting network security, including security groups, network ACLs, and load balancers in cloud environments. IAM Solutions: Solid understanding of IdentityandAccessManagement (IAM) solutions, with experience in Microsoft Entra ID being highly desirable. Risk Assessment: Strong application and network security risk assessment More ❯
for reference and compliance purposes. Qualifications & Skills: 6+ Years in a cloud engineering role -specifically Azure Solid understanding of Azure IdentityandAccessManagement (IAM) using Entra ID and Role-Based Access Control (RBAC) Experience with scripting languages, e.g. PowerShell, Bash andMore ❯
london, south east england, united kingdom Hybrid / WFH Options
Hunter Bond
for reference and compliance purposes. Qualifications & Skills: 6+ Years in a cloud engineering role -specifically Azure Solid understanding of Azure IdentityandAccessManagement (IAM) using Entra ID and Role-Based Access Control (RBAC) Experience with scripting languages, e.g. PowerShell, Bash andMore ❯
Hands-on experience with M365 including configuration, analysis and pivoting through large data sets and security best practices Experience with IdentityandAccessManagementand M365 services - OneDrive, Teams, SharePoint, Exchange Online, etc. Proficient with Azure/M365 tenant capabilities and roles that support … an equal opportunity and affirmative action employer. Qualified applicants will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. More ❯
operation and configuration of the Firm's cloud security toolsets, including the management of CNAPP (Cloud-Native Application Protection Platform) and CASB (Cloud Access Security Broker) technologies. *No Sponsorship will be offered for this role. Key Responsibilities: · Cloud Security Architecture: Design and implement cloud-native security … and troubleshooting network security, including security groups, network ACLs, and load balancers in cloud environments. · IAM Solutions: Solid understanding of IdentityandAccessManagement (IAM) solutions, with experience in Microsoft Entra ID being highly desirable. · Risk Assessment: Strong application and network security risk assessment More ❯
risk management practices, and regulatory requirements (e.g., NIST, ISO 27001, GDPR). Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. If you are a passionate and dedicated IT Professional looking to join a dynamic and innovative organization More ❯
risk management practices, and regulatory requirements (e.g., NIST, ISO 27001, GDPR). Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. If you are a passionate and dedicated IT Professional looking to join a dynamic and innovative organization More ❯
and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger … Develop and implement security policies, processes, and procedures to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for IdentityandAccessManagementand Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function … knowledge of cloud and on-premises technology environments, including information security, physical security solutions. • Financial Industry regulations (UK and Europe) • Excellent leadership and team management skills. • Strong problem-solving skills with the ability to make sound decisions in emergency situations. • Excellent communication skills with the ability to explain More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
standards, and guidelines. Collaborate with the Compliance Manager/CISO to ensure adherence to regulatory requirements (e.g., GDPR, ISO 27001). Incident Response andManagement: Establish and maintain incident response plans and procedures. Lead technical response efforts during security incidents or breaches. Conduct post-incident analyses to prevent … preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identityandaccessmanagement, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Cobry Ltd
on experience configuring and managing Google Workspace or equivalent platforms. (Admin Console, user provisioning, security settings, etc.) Preferred familiarity with identityandaccessmanagement tools (e.g., JumpCloud, Okta, Azure AD). Comfort running technical workshops or customer training sessions -you can translate tech into … value and are comfortable leading calls. Experience working in cross-functional teams, including working with Sales, Project Management, and Support. Strong organisational skills with the ability to manage multiple projects and priorities. Excellent communication skills -you can build trust with customers and explain technical stuff without jargon. A … it for you We value continuous professional & personal development- and we're committed to it! You'll have time allocated for professional development, access to self-paced training, and be part of a close-knit team with a clear vision of making a difference. Why Cobry? Our team More ❯
cloud computing platforms, particularly Microsoft Azure and AWS. Have expertise in applying security controls across platforms like M365. Ensuring secure identityandaccessmanagementand configuring cloud-native tools to detect and respond to threats. Experience with container security, Infrastructure as Code (IaC), and … shortlisting process. As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit. Our University is positive about flexible working. Blended working arrangements may More ❯
You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site More ❯
You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. - Delivery - As a consultant you will often go on-site More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Tokenovate
a Platform Software Lead/Architect, you will lead the design, implementation, and evolution of the Tokenovate platform services — spanning identityandaccessmanagement (IAM), observability, cloud infrastructure, and platform APIs. You will define and own the technical roadmap for core platform services, ensuring … they are secure, scalable, and well-integrated into the product ecosystem. You will work closely with product management, engineering teams, and leadership to balance delivery with platform excellence. This is a hands-on leadership role, ideal for someone passionate about building resilient and observable platforms, guiding technical teams … architects practitioners. Establish and champion engineering practices across the platform including testing, monitoring, deployment, and security standards. Collaboration & Delivery Work closely with product managementand engineering leadership to shape the platform roadmap and deliver robust, reusable services. Collaborate with security, operations, and compliance teams to ensure platform services More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Tokenovate
a Platform Software Lead/Architect, you will lead the design, implementation, and evolution of the Tokenovate platform services — spanning identityandaccessmanagement (IAM), observability, cloud infrastructure, and platform APIs. You will define and own the technical roadmap for core platform services, ensuring … they are secure, scalable, and well-integrated into the product ecosystem. You will work closely with product management, engineering teams, and leadership to balance delivery with platform excellence. This is a hands-on leadership role, ideal for someone passionate about building resilient and observable platforms, guiding technical teams … architects practitioners. Establish and champion engineering practices across the platform including testing, monitoring, deployment, and security standards. Collaboration & Delivery Work closely with product managementand engineering leadership to shape the platform roadmap and deliver robust, reusable services. Collaborate with security, operations, and compliance teams to ensure platform services More ❯
Cambridge, south west england, United Kingdom Hybrid / WFH Options
Tokenovate
a Platform Software Lead/Architect, you will lead the design, implementation, and evolution of the Tokenovate platform services — spanning identityandaccessmanagement (IAM), observability, cloud infrastructure, and platform APIs. You will define and own the technical roadmap for core platform services, ensuring … they are secure, scalable, and well-integrated into the product ecosystem. You will work closely with product management, engineering teams, and leadership to balance delivery with platform excellence. This is a hands-on leadership role, ideal for someone passionate about building resilient and observable platforms, guiding technical teams … architects practitioners. Establish and champion engineering practices across the platform including testing, monitoring, deployment, and security standards. Collaboration & Delivery Work closely with product managementand engineering leadership to shape the platform roadmap and deliver robust, reusable services. Collaborate with security, operations, and compliance teams to ensure platform services More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with … Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly andMore ❯
the Cyber Security Response team and the quality of third party services and deliverables, reviewing performance, and driving continuous improvement. Take the lead management responsibility for all cyber security event monitoring and incident response services received from all partner organisations with particular focus on the company’s Manage … threats that may go undetected in our environment that have evaded our automated security tools and defences. Accountable for Cyber Security incident response management including the establishment, maintenance and improvement of cyber security incident response plans, procedures, and playbooks. Manage post-incident activity to include scheduling and chairing … Automation and Response (SOAR), running red-team exercises and tabletop crisis war games. Working knowledge of SIEM and SOAR solutions, IdentityandAccessManagementand Data Loss Prevention tools and technologies preferably including FortiSIEM, Q-Radar, Sentinel, Darktrace, Microsoft Defender. Log correlation and analysis More ❯
from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer facing … You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site … methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations - Significant experience in IT security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios More ❯
from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer-facing … You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery: As a consultant, you will often go on-site … methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations Significant experience in IT security, compliance and risk management, including privacy, controls, etc Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios More ❯