Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt's Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users … team to provide a strong customer-focused sales, orientation, and launch engagement process. Develop excellent relationships with customer's C-level executives. Develop a deep understanding of customer's identity and access governance landscape and business challenges and advise on possible solutions delivered by the Saviynt product. Develop trusting relationships with customers and executive sponsors to drive product adoption … customers' needs. Plan education for customers on new features and releases. Manage renewal pipeline including potential at-risk customers to remediate and ensure a successful renewal. Assist with the management of delivery projects. Assist with transformation and process improvements across the organization. Act as the voice of the customer and collect feedback to drive continuous improvement across all areas More ❯
region. This position is responsible for selling to and supporting both end users and channel partners, leveraging all routes to market. The Sales Executive will sell our marketing leading IdentityManagement solutions by gaining a thorough understanding of the client's business and the industry in which they compete, the corresponding IT initiatives, identifying needs which the company … Demonstrate the ability to create and manage conversations at all business and technical levels of a client's organization from their CEO to a Systems Administrator. Utilize all channel management and reporting tools. Skills: Customer Focus: Act in ways that demonstrate customer focus and satisfaction by building effective relationships with customers, identifying, meeting and exceeding customer expectations, and by … in ways that demonstrate partner focus and satisfaction by building effective relationships with partners, identifying, meeting and exceeding partner expectations, and by treating partners with dignity and respect. Territory Management: Manage territory, considering each and all accounts collectively; establish accurate plans and forecasts; prioritize efforts; generate short term results while holding a long-term perspective to maximize overall territory More ❯
Location: Remote UK, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billions of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … for deploying and implementing our data security solutions in customer enterprise environments. You'll be key in evaluating the security configuration assessment and measures and providing solutions on the management of cybersecurity and information risk to the clients. Key responsibilities: Conduct audits and consulting services in the field of cybersecurity (architecture reviews and recommendations, compliance with best practices, etc. … our clients to provide them with insight into the security solutions adapted to their needs Check compliance with applicable regulations, standards, policies and guidance on cybersecurity and information risk management (PCI DSS, NIST, ISO 27000, Privacy, etc) Support the development of appropriate and proportionate documentation to inform risk management decisions, ensuring these are expressed in terms meaningful to More ❯
Location: BELFAST ARNOTT HOUSE, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More … Products (CSP): We are the worldwide leader in data protection, providing everything an organisation needs to protect and manage its data, identities and intellectual property - through encryption, advanced key management, tokenisation, and authentication and access management. Whether it's securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales CSP … to confidently accelerate their organisation's digital transformation. Job Overview: Reporting to the Associate General Counsel, Product and Regulatory Compliance, the Senior Legal Counsel will advise product management and engineering teams to ensure they are maintaining a robust and comprehensive regulatory compliance program. This role is critical to ensure Thales CSP's product teams comply with the regulatory change More ❯
cloud infrastructure engineering, on-premise infrastructure engineering, virtualization, or containerization platforms. Preferred qualifications: Experience in migrating applications and services to cloud platforms. Experience with security concepts such as encryption, identitymanagement, access control, attack vectors, and pen testing. Experience with networking concepts such as software-defined networking, routing, virtual private networks, load balancers and firewalls. Experience in prospecting … and deliver what is most helpful for the customer. You assist fellow sales Googlers by problem-solving key technical issues for our customers. You liaise with the product marketing management and engineering teams to stay on top of industry trends and devise enhancements to Google Cloud products. As a Customer Engineer, you will partner with technical Sales teams to … enterprise infrastructure expertise to support the technical relationship with customers, including technology advocacy, supporting bid responses, product and solution briefings, proof-of-concept work, and partnering directly with product management to prioritize solutions impacting customer adoption to Google Cloud. Workdirectlywith Google Cloud products to demonstrate and prototype integrations in customer and partner environments. Guide customers through assessments of existing More ❯
Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
the necessary operational knowledge to specify network changes, assuring continued network availability. The OT Network Security Engineer will support Site Focal Point with technical insight necessary for secure file management according to policies and have a role in new system implementation and incident response. It is key for the OT Network Security Engineer to have in-depth understanding of … the implementation of key network controls such as segmentation to isolate different parts of the OT environment, zoning to secure conduits for communication between zones and firewall management. Change Management: Implement change control processes to ensure that network changes are appropriate tested and approved without disruption to critical OT operations. Incident Management: Support the technical response to operational … technology-related incidents, ensuring rapid resolution to minimize downtime and operational disruption. Device Management: Harden devices such as switches, routers, firewalls by partnering and coordinating with the R&D OT Security Team and other key stakeholders aligned to GSK standards and proportionate to risk. Wireless Security: Support the security of OT communication protocols by enabling encryption, authentication or using More ❯
Location: Stafford, VA (on-site) Type: Full-Time Qualifications: 5+ years of Experience in Oracle EBS Supply Chain Management modules R12/R11 Bachelor's degree in computer science/IT-related/Technical field or equivalent experience. U.S. Citizenship is required due to the nature of the project and security requirements. Oracle EBS Expertise in R12.2 and deep … Scrum methodology-if you're Agile, we want you! Knowledge of the Fixed Asset (FA) Module , SOA/BPEL Programming , or Java . Bonus points for familiarity with Oracle IdentityManagement and LDAP ! The Benefits of Working with Us: Competitive Salary & Bonuses - Your expertise matters, and we value that. Opportunities for Growth - We believe in investing in our More ❯
as your business demands them. AWS Security is on the cutting edge of security for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization, and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each team member's growth as … IP - Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification More ❯
Location: BELFAST ARNOTT HOUSE, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More … Products (CSP): We are the worldwide leader in data protection, providing everything an organisation needs to protect and manage its data, identities and intellectual property - through encryption, advanced key management, tokenisation, and authentication and access management. Whether it's securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales CSP … and motivations for applying. Applicants must have a valid work permit in the UK. In line with Thales' Baseline Security requirements, candidates will be asked to provide evidence of identity, eligibility to work in the UK and employment and/or education history for up to three years. Some vacancies may require full Security Clearance which can require further More ❯
practices in cloud services. Technical Skills: Extensive experience with Microsoft Azure, including IaaS, PaaS, and SaaS. Proficient in cloud architecture design and deployment. Strong knowledge of networking, security, and identitymanagement in cloud environments. Experience with DevOps practices and automation tools, such as Terraform or Azure DevOps. What's on Offer: Competitive compensation with 42 days of annual More ❯
practices in cloud services. Technical Skills: Extensive experience with Microsoft Azure, including IaaS, PaaS, and SaaS. Proficient in cloud architecture design and deployment. Strong knowledge of networking, security, and identitymanagement in cloud environments. Experience with DevOps practices and automation tools, such as Terraform or Azure DevOps. What's on Offer: Competitive compensation with 42 days of annual More ❯
Expertise (ASH & Private Cloud Focus) Lead design and deployment of Azure Stack Hub (ASH) infrastructure, ensuring performance, scalability, and resilience. Enable core services (IaaS, PaaS) on ASH with secure identitymanagement and hybrid connectivity. Oversee operational aspects including patching, monitoring, upgrades, and troubleshooting. Guide the design, configuration, and management of virtualization platforms (e.g., VMware, Hyper-V), storage … solutions, networking, and compute infrastructure in private cloud environments. Champion automation, orchestration, and Infrastructure-as-Code practices across the delivery lifecycle. III. Complex Technology Landscape Management Lead integration efforts across ASH, private cloud, and legacy/on-premise systems, addressing interoperability and migration challenges. Implement robust security practices and API management strategies across multi-cloud and hybrid stacks. … Navigate complex, regulated environments with a deep understanding of data sovereignty, latency needs, and disconnected operations. IV. Leadership & Management Inspire and lead high-performing technical teams, fostering a culture of excellence and collaboration. Communicate complex technical concepts clearly to non-technical stakeholders and senior leadership. Empower team members, delegate effectively, and make timely, informed decisions under pressure. Manage vendor More ❯
Positions Available As the successful Data Engineering Manager/Lead Cloud Data Engineer/Consultant you will have: Relevant commercial experience in a Cloud Data Engineering role Team management experience (essential) Practical experience working with cloud platforms (Azure, AWS, GCP) Hands-on experience with SQL, Data Pipelines, Data Orchestration and Integration Tools Experience in data platforms on premises/… data pipelines Identifying and patching issues and bugs identified in the pipeline/architecture Working as part of a data specialist team to deliver quality service Providing access and identitymanagement to onboard new customers onto the pre-existing platform Communicating with key stakeholders to define data requirements Urgent roles and genuinely a career-changing opportunity. Click 'apply More ❯
implementing security solutions at the business division level or equivalent PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Experience in cyber security incident response within corporate … candidates. Amazon is committed to a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
government. To read more about our business area, please visit Corporate Services and Transformation Key Responsibilities: Lead and develop an active Security Operations team focused on threat detection, incident management, and prevention of data breaches or service disruptions. Build and mature the Security Operations Centre (SOC) with a focus on cyber risks, threat intelligence and proactive incident avoidance. Oversee … register and advising on appropriate mitigation strategies. Oversee the planning and execution of cyber audits and present findings to senior leadership. Provide expert guidance on malware analysis, secure access, identitymanagement, and digital estate safeguarding. Build strong partnerships across Essex and beyond, working closely with peers, vendors, and regional bodies to stay ahead of emerging threats. Experience Needed More ❯
that consistently innovate in reducing on-call time and ensuring the team spend their time on the highest-value tasks. Key job responsibilities - Communicate effectively at multiple levels of management and engineering, building trust across the organization, and demonstrating discretion with sensitive information. - Identify and drive continuous process improvements at unprecedented scale. - Support and deliver scalable security solutions across … language experience - Knowledge of networking protocols such as HTTP, DNS and TCP/IP PREFERRED QUALIFICATIONS - 2+ years of any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security experience - Experience with AWS products and services - Experience with programming languages such as Python, Java, C++ Amazon More ❯
Incident Response and proficiency in at least one of the following domains: Malware Analysis/Reverse Engineering; Digital Forensics; Security Tool Development & Automation; Programming/Scripting; Network & OS Security; IdentityManagement Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience More ❯
in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience. Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security experience. Experience using Large Language Models (LLM) in security engineering. Preferred Qualifications Master's or PhD in More ❯
in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience. - Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security experience. - Experience using Large Language Models (LLM) in security engineering. PREFERRED QUALIFICATIONS - Master's or PhD in More ❯
IT Cloud Engineer, you will have: Hands-on experience with Microsoft Azure. An understanding virtual networks, VPNs, firewalls, and load balancers. Experience implementing security measures like encryption, firewalls, and identity management. Knowledge of CI/CD pipelines, containerisation, and Infrastructure as Code (IaC) tools. Experience developing and delivering cloud-based solutions. Knowledge across multiple cloud technologies, with the ability More ❯
Your technical and domain expertise will make you the trusted SME in cybersecurity and operations, working with the Head of Risk to implement proactive and skilled end-to-end management and coordination of cybersecurity incidents. The ideal candidate will have strong working knowledge and experience in the management of complex cyber incidents, along with a track record of … technical and non-technical problem-solving skills. Expert-level knowledge of security management principles, procedures, and standards, including vulnerability management, event management, application security, identitymanagement, and incident response. (Incident Response work to strengthen our client's response maturity) Ability to communicate effectively with both technical and non-technical stakeholders, and to prepare written reporting … and presentational content with level-appropriate messaging up to the executive level. The candidate should be strategic, systematic, and able to work well under pressure. Technical Skills: Excellent stakeholder management and communication skills are imperative. This is an excellent opportunity to join a niche consulting organization focused on private businesses and organizations based in London. More ❯
Overview: The Security Consultant/Architect would be providing security architecture, consulting and strategic direction to clients as part of the Enterprise Security Initiatives for a global System Integrator. Identity and Access Management as well as general security will be an area of experience allowing you to Identify and evaluate business risks & threats and internal controls which mitigate … CSO & Security director to define Security Strategy and build and nurture positive working relationships with clients Consulted and provided solutions in the areas of enterprise business/technology strategy, Identity & Access Management, Data Security, business process optimization/re-engineering, enterprise infrastructure security design & optimization Designed and implemented solutions for enterprise security infrastructure, security, identitymanagement/entitlement, disaster recovery, business continuity strategy and planning, fault tolerant infrastructure, contingency planning, crisis management, application/infrastructure integrity. The Architect/Consultant is a senior technologist that plays an important client facing consulting role. Listen to customer business problems and requirements and articulate how solutions can be structured to address them and follow this through the More ❯
London, England, United Kingdom Hybrid / WFH Options
Identify Solutions
working opportunity and is required to start ASAP. Consultants MUST hold current and active SC Clearance. Key Skills Creating Security Controls Reviewing existing Security Policies Strong understanding of Privileged IdentityManagement and Access Management Extensive experience reviewing Security Tools Exceptional Stakeholder Management Skills Ability to produce accurate, clear and informative reports/documentation If you’d More ❯