of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts … alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identitymanagement systems to ensure appropriate levels of access and privilege. … consideration for employment without regard to race, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law. Requisition ID: 5752 Reporting into: Damon Hefner, Manager Information Security Role Type: Individual Contributor More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people … and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You … have the ability to work with customers and technical teams NICE TO HAVE: Domain knowledge - Defence, Nuclear, Government, Aerospace, CNI, Transport Risk Management and Accreditation YOUR CAREER AT THALES Future opportunities will allow you to discover other domains or sites. You will be able to evolve and grow your More ❯
technology trends into actionable strategies. Guide clients through compliance with DORA, NIS2, and UK regulatory frameworks. Design comprehensive cyber security architectures that integrate cloud, identity, data, and threat protection. Build actionable implementation roadmaps considering business objectives and constraints. Evaluate and integrate partner technologies (e.g., Microsoft, AWS, GCP) for optimal … client outcomes. Deliver reusable frameworks and methodologies across common cyber challenges. Lead C-level workshops on cyber strategy, risk management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO 27001, and industry-specific standards. Facilitate threat … publications. Build internal capabilities through methodologies, training, and delivery standards. Technical Focus Areas Secure architecture across Azure, AWS, and GCP Zero Trust frameworks and identitymanagement Cloud posture management and threat protection Security automation and DevSecOps integration Security Operations SOC transformation and cloud-native security ops Threat More ❯
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft IdentityManagement systems (Active Directory, ADFS … Duties include, but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privileged access management, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
East London, London, United Kingdom Hybrid / WFH Options
Reed Technology
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft IdentityManagement systems (Active Directory, ADFS … Duties include, but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privileged access management, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. 'Hands on' technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
Umbrella inside IR35 Clearance required: Active Security Clearance is essential Key Skills/requirements Has designed, architecture and deployed the Ping One and AWS Identity and integrated the 2. Familiar to SAML and OAUTH/OIDC Competent in the logical configuration of Ping One and AWS Identity cloud … services. Technical Proficiency in IAM Tools: Expertise in using and configuring IAM tools such Ping Identity, and AWS Identity to manage user identities and access permissions. Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and … compliant with DCC Security standards. Authentication and Access Management: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications. Establishes and enforces policies and procedures for More ❯
their complex business issues from strategy to execution across different industries and technology solutions such as Manufacturing 4.0, IoT, consumer goods, healthcare, agrifoods, and identitymanagement, in one or more of the following areas: Assist clients with the development and implementation of technology and digital strategies, and the … of relevant industry and technology Thought Leadership material. Coach and mentor team members and provide performance feedback. Ensure compliance to EY quality and risk management processes across projects and other interactions. Preparation of bids/tenders and take lead on key elements of response. Skills and attributes for success … Development. Subject Matter Expert (SME)/proficient in at least one Enterprise Architecture Domain (Applications, Data, Infrastructure, Security, Integration). Experience in leadership/management roles including project management and managing teams. Ideally, you will also have: Experience within any of the following industries/sectors: Manufacturing, Retail More ❯
and vulnerabilities from cyber-attacks by developing a security road-map tailored to your unique needs. We help organisations improve processes such as threat management by building an identitymanagement programme, and establishing prevention, detection and response capabilities to cyber-attacks. Responsibilities: Ability to research, articulate, pitch … cyber risk, contributing to the development of our team through training and coaching. Managing, delivering, leading cyber security and cyber risk assignments, with the management of a portfolio of clients, across a variety of sectors and locations. Providing our clients with trusted advice, rooted in a pragmatic and agnostic … Expert knowledge of identifying, developing and communicating threat modelling. Demonstrably experienced in working as an effective member of a multi-disciplinary team. Excellent stakeholder management, presentation and communication skills. Pro-active approach to personal and professional development. Must hold, or be able to hold, an HMG Security Check (SC More ❯
specialists to ensure robust, scalable, and automated infrastructure is delivered to support national-level systems. Key Responsibilities: Design and oversee multi-cloud infrastructure (networking, identity, DNS, landing zones, etc.) with focus on reliability, performance, and security Lead infrastructure workstreams across internal teams and technical suppliers Promote automation, self-service … as-Code (IaC) and automation Understanding of DevSecOps , CI/CD , and cloud-native design patterns Broad knowledge of cloud security, compliance, governance, and identitymanagement Experience building scalable infrastructure solutions using services such as: Terraform/Deployment Manager/CloudFormation/Bicep Cloud networking, DNS, identity and access management (IAM) GCP Landing Zones, cost optimisation strategies Background in developing and maintaining architectural standards and roadmaps Desirable: TOGAF certification and other relevant cloud certifications (Google Cloud Architect preferred, Azure, AWS) Public sector, healthcare or NHS-related project experience Familiarity with clinical safety and risk managementMore ❯
professionals into an integrated global team. This team will play a crucial role in enabling the ongoing transformation of our agencies and functions. Revolutionize identitymanagement at WPP! We're seeking an OKTA maestro to orchestrate our global platform, pushing the boundaries of security and user experience. Dive … into deployments, integrations, and migrations, maximizing automation and fostering seamless collaboration. If you're passionate about innovation and delivering a first-class identity experience to a global audience, this is your chance to shine. What you'll be doing: Be part of a new in-house OKTA technical team … external customers from a support perspective delivering a first-class service experience Ensure that audit standards are adhered to in regard to attestations and management of identities and service accounts Assist in reporting on all aspects of the OKTA environments for security and audit requirements Support the implementation of More ❯
Implement and enforce IT Standard Operating Procedures (SOPs) Provide IT support, onboarding, and troubleshooting for employees Manage vendor relationships and contracts Oversee IT asset management, including software and hardware tracking Security & Compliance Develop and implement security policies; monitor threats and respond to incidents Maintain cybersecurity best practices, including endpoint … workflows Ensure compliance with legal, regulatory, and industry standards Manage user identities and implement Single Sign-On (SSO) integrations Infrastructure & Support Oversee mobile device management and OS updates Lead business continuity and disaster recovery planning Maintain IT documentation and support change management processes Support video production workflows, including … secure file management and archiving Web Hosting & Cloud Services Manage AWS services (EC2, S3, RDS, IAM) Optimize website uptime, performance, and hosting setup Monitor and manage DNS, SSL certificates, and website security Growth & Innovation Stay current with emerging tech and recommend improvements Lead or contribute to IT projects Conduct More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
DataCareers
GPO) Active Directory : Multiple forests and domains MS SQL : Basic troubleshooting Office 365 : Setup and configuration to best practices Cloud Platforms : Microsoft Azure (IaaS, Identitymanagement), AWS Virtualization : VMware, Hyper-V SAN and Clustering : Dell, HP SANs, Windows NLB System Center : SCOM, SCCM, DPM, SCVMM Backup Technologies : Veeam … DPM, Commvault Infrastructure as Code : Terraform, Bicep Firewall Management : Fortigate, Draytech, Sophos Scripting : Automation using PowerShell Compliance and Security Frameworks : Familiarity with various standards What We Offer: An engaging role with varied customers. Opportunities to work on innovative technology and development projects. Comprehensive benefits package including training and certifications. More ❯
is on the cutting edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … security with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identitymanagement and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management … a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. Our inclusive culture empowers Amazonians to deliver the best results for our More ❯
and service desk teams. Role responsibility Cloud Knowledge and Services: Manage and troubleshoot cloud services, preferably Azure. Understanding of SaaS, PaaS, and IaaS. SaaS Management: deploying and managing SaaS solutions. Networking: knowledge of IP networking, routers, switches, and firewalls. Windows: deployment, management, and troubleshooting of Windows clients and … secure system design and AI security implications. Cloud Services: Microsoft 365: configuring Microsoft 365 services like Exchange Online, SharePoint Online, OneDrive, and Power Platform. IdentityManagement: knowledge of Microsoft Entra and Active Directory, including user authentication and authorisation. Networking Details: understanding of IPV4 subnetting and VLANs, preferably Cisco More ❯
knowledge of M365 services including Teams, Exchange Online, SharePoint Online, and OneDrive for Business. Understanding of network requirements for Unified Communications, including QoS, bandwidth management, and firewall configuration Familiarity with Microsoft MDM, AutoPilot, and Device Management. Experience with Microsoft Defender, Microsoft Purview, and other cloud security technologies. Experience with … Session Border Controllers and Teamslink is a plus. Knowledge of security practices for Azure and M365, including DLP, ATP, identitymanagement, and data protection compliance. Desirable Skills: DevOps & Automation: Familiarity with DevOps practices, Azure DevOps, CI/CD pipelines, PowerShell, and automation scripting. Monitoring & Management: Experience with More ❯
activity, the role will involve supporting IT operations to maintain business continuity and efficiency. The ideal candidate will possess advanced technical expertise, strong project management abilities, and a dedication to guiding integrations from inception to completion. Core responsibilities: Assess and analyse IT environments of acquired companies, identifying risks and … finance, and other business-critical systems . Solid understanding of cloud infrastructure (AWS, Azure, Google Cloud) and networking principles . Expertise in Active Directory, identitymanagement, and user access control . Experience with data migration strategies and tools (e.g., ShareGate, BitTitan, Power Automate). Strong project managementMore ❯
activity, the role will involve supporting IT operations to maintain business continuity and efficiency. The ideal candidate will possess advanced technical expertise, strong project management abilities, and a dedication to guiding integrations from inception to completion. Core responsibilities: Assess and analyse IT environments of acquired companies, identifying risks and … finance, and other business-critical systems . Solid understanding of cloud infrastructure (AWS, Azure, Google Cloud) and networking principles . Expertise in Active Directory, identitymanagement, and user access control . Experience with data migration strategies and tools (e.g., ShareGate, BitTitan, Power Automate). Strong project managementMore ❯
activity, the role will involve supporting IT operations to maintain business continuity and efficiency. The ideal candidate will possess advanced technical expertise, strong project management abilities, and a dedication to guiding integrations from inception to completion. Core responsibilities: Assess and analyse IT environments of acquired companies, identifying risks and … finance, and other business-critical systems . Solid understanding of cloud infrastructure (AWS, Azure, Google Cloud) and networking principles . Expertise in Active Directory, identitymanagement, and user access control . Experience with data migration strategies and tools (e.g., ShareGate, BitTitan, Power Automate). Strong project managementMore ❯
AWS Security is on the cutting edge of security for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization, and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat More ❯
are secured by configuring appropriate policies, scanning for vulnerabilities, and managing runtime security. Cloud Security: Design, implement, and manage security across Azure, focusing on identitymanagement, data protection, and network security. Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate … Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusion detection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to improve code security Desirable: Proficiency in More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
As this is a lead role, communication skills are critical, including the ability to translate complex paradigms into easy-to-understand pieces and stakeholder management for technical change. Working within the architecture team and alongside engineering teams, your workload would include (but is not limited to): Design and document … work under pressure. Have a desire to keep up with the latest tools and techniques. A deep understanding of Azure components. Key areas: API Management Azure SQL and MI Functions Networking Data Factory Databricks IdentityManagement (Entra) Proven experience with pipeline creation/management, specifically in More ❯
Expert understanding of firewall/IPS/IDS principles and practices. Analyse and advise on new security technologies and program conformance. Good understanding of IdentityManagement/device access controls including multi-factor authentication. Understanding of a Microsoft Windows Active Directory environment. Good understanding of the Microsoft Windows … Ubuntu preferred) security and patching practices Scripting experience (PowerShell and Python preferred, utilising SOAP and REST API technologies) Be able to demonstrate excellent problem management skills. Excellent business communication skills, with the skills to communicate at all levels. Excellent time management and prioritisation skills# Experience completing external security … working with PCIDSS Experience of working with Cyber Essential Plus Experience in Financial Services or working in a regulated and secure environment. Good project management skills, utilising tools such as Jira More ❯
Security Engineer II, Vulnerability Management and Remediation Operations Job ID: Amazon Support Services Pty Ltd Embark on a Mission to Fortify Amazon's Defenses as a Security Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Security Engineer to join our … Vulnerability Management and Remediation Operations (VMRO) team in Sydney, Australia. The VMRO team is responsible for discovering, assessing, triaging, detecting, and driving the remediation of vulnerabilities across the Amazon ecosystem. Key job responsibilities Analyse public and private vulnerability disclosures and exploit code. Deeply understand and assess the technical details … vulnerability detection mechanisms across a diverse technical ecosystem 3 years experience troubleshooting networking, operating systems, applications, or cloud services. 3 years experience in vulnerability management and remediation roles PREFERRED QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identityMore ❯
About Us FlexTrade Systems is a provider of customized multi-asset execution and order management trading solutions for buy- and sell-side financial institutions. Through deep client partnerships with some of the world's largest, most complex and demanding capital markets firms, we develop the flexible tools, technology and … assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS Control Tower, Azure, and Microsoft O365. Conduct or coordinate regular security assessments, penetration tests … security engineering role, focusing on designing and implementing security solutions and managing security infrastructure, both on-premise and cloud. Experience working with privilege and identitymanagement solutions. Experience with operating system security and system hardening. Knowledge of network security principles, protocols, and technologies. Strong analytical and problem-solving More ❯
strategies for improvement and optimization. Ensure system compatibility and seamless interoperability across the in-house infrastructure. Requirements Proven experience supporting and deploying Microsoft 365 (IdentityManagement, Teams, Exchange Online, SharePoint Online, OneDrive). Third-line support experience with Windows Server and Active Directory (2008–2022). Knowledge of More ❯