edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identityandaccessmanagement, mobile devices, virtualization and custom hardware, all operating at massive scale. We are looking for a Security Engineer to help More ❯
working with data and cloud technologies, including databases, cloud infrastructure, and basic cloud administration (e.g., networking, compute and storage resources, identityandaccessmanagement). Familiarity with APIs, web services, and automation through scripting or programming languages. Practical knowledge and demonstrated experience in areas … such as Data Loss Prevention (DLP), Data Privacy/Protection, DSPM/CSPM, SIEM, or vulnerability management is highly preferred. Proven success in a technical, customer-facing role within a software or SaaS company. Full spec available, please apply to Locke44 for the details. More ❯
Reigate, Surrey, United Kingdom Hybrid / WFH Options
Willis Towers Watson
globally Support continuous improvement of cloud technologies including automation, IaaC and Security by Design Assist on developing Security standards and policy implementations Manage the IDAM requirements Maintenance of Automation Runbooks and SQL Servers (IaaS and PaaS) Day to day handling of requests, covering system administration, operations governance, Azure B2B Tenant … issues, threat/vulnerability managementand incident response Maintain the Customised PowerShell functions/modules Administrate the Pipelines, Repo, Test Plan including ADO Project Management Collaborate with engineering and development teams to evaluate and identify optimal cloud solutions Qualifications The Requirements: Demonstratable in-depth experience of … DevOps concept in a cloud environment Experience of Host, Network and Permitter Security design and implementation. Have a working knowledge of Identify andAccessManagement within Azure. Should have sound knowledge on multi-Tenant environments along with Azure B2B and Entra Tenants. Familiar with Pulumi, ARM More ❯
Senior Technical Support Engineer (Shifted Work Week) UK - Remote About Ping Identity: At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It … People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the … and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, andidentityandaccess management. As a More ❯
internationally recognized membership. Demonstrable background in security architecture, including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems. Solid grasp of threat actors and mitigations for technology risks, with a passion for learning and staying current with technology advancements. Experience in leading More ❯
2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification andmanagement with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure organizational … and facilitate development of pragmatic solutions. Work with the DPO to ensure appropriate security is applied to data and provide reports/subject access requests. Design and deliver continual education and training to our colleagues to support them in identifying risks in their day-to-day operations, using … the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Managementand IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of More ❯
and facilitating development of pragmatic solutions. Working with the DPO to ensure appropriate security is applied to data and provide reports/subject access requests. Designing and delivering continual education and training to our colleagues to support them in identifying risks in their day-to-day operations. Managing … the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Managementand IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of … Three Lines of Defence Model and its application. Knowledge of vulnerability managementandIdentityandAccess management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other andMore ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Michael Page (UK)
environment, Operational Technologies. Knowledge of security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR). Experience with SIEM solutions, endpoint security, andidentity & access management. Ability to conduct risk assessments and develop mitigation strategies. What's on Offer Competitive salary and benefits package. Opportunity to More ❯
Basingstoke, Hampshire, South East, United Kingdom
LA International Computer Consultants Ltd
Level * Location: Basingstoke * Duration: 6 months (extensions expected) * IR35: Inside * Rate: £negotiable/day * Experience: Focused on one of the following: - General Windows - VMWare - IDAM/Active Directory APPLY NOW! Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in More ❯
will be intensely involved in being a highly skilled Cybersecurity practitioner in primary skills associated with GRC, as well as secondary skills - Technical (e.g., IDAM, Engineering, Network, IoT/OT security). The successful candidate will play a critical role in the Practice in support of clients and their security … Practitioner, which includes execution of operational/tactical as well as strategy & program cyber security. Able to support the cyber security roadmap andmanagement inclusive of security risk management, its development, lead a team and align security measures with enterprise IT security frameworks. Understanding of Security … evaluate risk, and ensure compliance with IEC 62443, NIST SP 800-82, NERC CIP, ISO 27001, and NIS2 frameworks or combination. Vulnerability & Risk Management: Able to implement risk mitigation strategies tailored for ICS/SCADA and IoT environments. Vendor & Third-Party Security Management: Assess and oversee More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management … etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes, security awareness, and information classification. About SiXworks SiXworks specializes in secure digital solutions, focusing on digital experimentation and cutting-edge technology in secure More ❯
Get to know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move … through the digital world, putting Identity at the heart of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we're looking for lifelong learners and people who can make us better … can inspire and motivate a team, as well as collaborate effectively with cross-functional teams. Broad understanding of Okta's Workforce and Customer Identity solutions. Proven success working with/selling into SMB, but also large, strategic customers. Strong technical expertise in security and/or identityMore ❯
internationally recognized membership. Demonstrable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems. A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways … Life At PA encompasses our people's experience at PA. It's about how we enrich people's working lives by giving them access to unique people and growth opportunities and purpose-led meaningful work. Our purpose guides how we work with our clients and our teams, and … without reference to their age, background, disability, genetic information, parental or family status, religion or belief, race, ethnicity, nationality, sex, sexual orientation, gender identity (or expression), political belief veteran status, or other by any other range of human difference brought about by identityand experience. We More ❯
At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a … culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is … and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, andidentityandaccess management. We're More ❯
workflows to improve performance and scalability. Refactoring existing pipelines into reusable templates to support the onboarding of new datasets. Azure SQL: Integrating database access with Microsoft Entra ID for improved identityandaccess management. Designing and implementing STAR schema models to support analytical workloads. More ❯
software development projects, including coordinating with cross functional teams, managing priorities. Deliver high-quality results within deadlines. Experience in Azure DevOps and Security Policies (IDAM). Experience working with PowerApps Pipeline/Azure DevOps pipeline. Manage users and contacts including security roles and permissions. Resolve user technical issues and provide … range of benefits so to enhance both health and career growth. Salary depending on experience and background. Health Benefits: 24/7 GP Access, Counselling Services, Virtual Physiotherapy, Discounted Gym Memberships, Virtual Gym Classes, Discounted Private Health Cover, Eye Care Discounts. Wealth Benefits: Shopping Discounts, Debt Support, Money More ❯
software engineering and IT patterns. Strong documentation and decision-recording capabilities. Experience in on-prem and hybrid cloud solutions. Strong security awareness, including identityandaccess management. Expertise in observability and monitoring solutions. What They Offer : Learning Opportunities: Access to training, workshops, and professional More ❯
Databricks and Data Warehouse solutions (must have). Expertise in integration architecture and design patterns. Protocols and formats SOA, Rest, JSON, XML, etc. IdentityandAccess management. Cloud to Cloud integration & Cloud to On Premise integration. Front End and Back End integrations, network and infrastructure managementMore ❯
become a professional and develop in Support sphere? Than this role is definitely for you. We are looking for a Support Specialist with SSO, IDAM, Microsoft EMS who will be the Microsoft specialist for Microsoft EMS 365 within the organization. The candidate will be mentoring the other members of the More ❯
will be a highly skilled Cybersecurity practitioner in primary skills associated with Network Security, as well as secondary skills in Technical areas such as IDAM, Engineering, GRC, and IOT/OT security. The successful candidate will support clients' security roadmap and compliance requirements through Assessments, Design reviews, and Upgrades. Your … in consulting. Knowledge of cybersecurity frameworks and standards. Strong troubleshooting, analytical, and problem-solving abilities. Excellent communication and interpersonal skills. Knowledge of project management for OT security projects. About Infosys Infosys is a global leader in next-generation digital services and consulting, enabling clients in 54 countries to More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
and perform reviews to provide assurance of information security controls effectiveness. Be responsible for establishing and implementing the information security and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure … Proven experience in a GRC Analyst role Experience of mentoring or managing team members Strong knowledge of Security controls across Microsoft based technologies, Endpoints, IdAM, Networks, Applications, Email and Cloud. Experience of authoring governance documentation (standards, policies, reporting, proposals, analysis). Experience of delivering culture, training and awareness programmes. Experience More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios UK&I Limited
Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise in these areas More ❯