security and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize Security Information and Event Management (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating … network traffic analysis. Cloud Security: Deep experience securing cloud environments, especially Azure . Familiarity with cloud-native security tools, including Azure Security Center, and identitymanagement solutions like Azure Active Directory. Cisco Meraki: Hands-on experience configuring and managing Cisco Meraki firewalls, switches, and other networking/security … appliances. Palo Alto Networks/Panorama: Expertise with Palo Alto Networks firewalls, including configuration, management, and troubleshooting of security policies and threat management. Infrastructure as Code (IaC): Strong experience with Terraform for infrastructure automation, especially in security-related use cases (e.g., securing cloud infrastructure, managing security controls). SIEM More ❯
london, south east england, united kingdom Hybrid / WFH Options
Halian
security and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize Security Information and Event Management (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating … network traffic analysis. Cloud Security: Deep experience securing cloud environments, especially Azure . Familiarity with cloud-native security tools, including Azure Security Center, and identitymanagement solutions like Azure Active Directory. Cisco Meraki: Hands-on experience configuring and managing Cisco Meraki firewalls, switches, and other networking/security … appliances. Palo Alto Networks/Panorama: Expertise with Palo Alto Networks firewalls, including configuration, management, and troubleshooting of security policies and threat management. Infrastructure as Code (IaC): Strong experience with Terraform for infrastructure automation, especially in security-related use cases (e.g., securing cloud infrastructure, managing security controls). SIEM More ❯
about IT systems, as well as standardisation, optimisation, and automation. Furthermore, this candidate will have experience architecting, optimising, engineering, implementing, and supporting directory/identity-related solutions, single sign-on (SSO) platforms, email and collaboration systems. Candidates are expected to stay aware of industry changes and plan to keep … and implementation of technology at Take-Two. What You'll Take On Own and optimise standards, policies, and automation for user accounts, permissions, and identity lifecycle management. Monitor, troubleshoot, and resolve complex IAM system issues, ensuring high availability and performance. Provide top level support for IAM assets, create and … IAM, Active Directory and Exchange solutions. 7+ years of experience in systems engineering, infrastructure, or a related technical domain, with a strong focus on identitymanagement, authentication, and enterprise email systems. Experience driving direction and enforcing standards for an IT team. Proficient with Windows Server, including installing, configuring More ❯
BELFAST ARNOTT HOUSE time type Full time posted on Posted Yesterday job requisition id R Location: BELFAST ARNOTT HOUSE, United Kingdom Thales people architect identitymanagement and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billions … Git), monitoring and visualization (Prometheus, Grafana) Experience with big data technologies such as NoSQL/RDBMS, Redis, ElasticSearch, Kafka Experience with containers and container management (Docker, Kubernetes) Experience analysing and building data telemetry, modelling, pipelines, UI visualization Experience in developing software, troubleshooting, and monitoring large scale distributed systems Implement … work with colleagues from your own or different departments. In line with Thales' Baseline Security requirements, candidates will be asked to provide evidence of identity, eligibility to work in the UK and employment and/or education history for up to three years. Some vacancies may require full Security More ❯
Experience, you will be fully responsible for managing the foundational SaaS functionality that powers the Sea intelligent marketplace for fixing freight. This includes user management, authentication, legal entity mapping, notifications, navigation, login flows, and the application wrapper—critical components that ensure a seamless, secure, and efficient user experience across … drive the roadmap for Core Experience , ensuring our platform’s foundational components are robust, scalable, and intuitive. Identify opportunities and pain points within user management, authentication, notifications, navigation, login flows, and other core functionalities , delivering solutions that improve platform usability. Deeply understand how users interact with the platform , synthesizing … various sources to optimize workflows and remove friction . Ensure that security, compliance, and user privacy best practices are embedded into authentication and user management workflows. Collaborate closely with engineering, design, and other product teams to develop and iterate on platform-wide improvements. Work with internal teams (customer support More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Sea
Experience, you will be fully responsible for managing the foundational SaaS functionality that powers the Sea intelligent marketplace for fixing freight. This includes user management, authentication, legal entity mapping, notifications, navigation, login flows, and the application wrapper—critical components that ensure a seamless, secure, and efficient user experience across … drive the roadmap for Core Experience , ensuring our platform’s foundational components are robust, scalable, and intuitive. Identify opportunities and pain points within user management, authentication, notifications, navigation, login flows, and other core functionalities , delivering solutions that improve platform usability. Deeply understand how users interact with the platform , synthesizing … various sources to optimize workflows and remove friction . Ensure that security, compliance, and user privacy best practices are embedded into authentication and user management workflows. Collaborate closely with engineering, design, and other product teams to develop and iterate on platform-wide improvements. Work with internal teams (customer support More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
solutions that leverage Microsoft 365 technologies. This role requires proficiency in both front-end and back-end development, as well as experience with automation, identitymanagement, and integration of AI into solutions. Responsibilities Develop and maintain solutions using PowerShell to automate tasks and report across large data sets … equal opportunity employer and we welcome applications from all suitable candidates. We consider all applicants for employment regardless of age, disability, sexual orientation, gender identity, family or parental status, race, colour, nationality, ethnic or national origin, religion or belief. Research suggests that applicants from underrepresented groups are less likely More ❯
troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identitymanagement, web apps , and networking components (e.g., virtual networks, security groups More ❯
account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically diverse team. Implement and manage a Mobile Device Management (MDM) solution … Cloud & SaaS Administration: Administer Google Workspace, SSO solutions, SaaS applications and cloud infrastructure (e.g., AWS, GCP, Azure), ensuring secure access and configuration. Access Control & IdentityManagement: Manage user accounts, permissions, and access control across all systems with the application of principles such as least privilege and separation of … and response. Automation & Scripting: Develop and maintain scripts and automation tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerability scanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and More ❯
Undertaking regular patch and upgrade activities across the network Providing business-focused reporting and information as required Configuring end-user devices (hardware setup, policy management, compliance) Producing clear, concise documentation for both end users and the support team What you'll need to succeed Proven experience with Windows Server … including DNS, DHCP, TCP/IP, subnetting, and VLANs Proficiency with Office/Microsoft 365 (F through to E suites) Strong understanding of modern identitymanagement and security protocols Experience with Azure (PaaS, IaaS), including security and governance aspects Capability to configure firewalls and perform advanced threat hunting … Knowledge of security tools and vulnerability management practices Excellent documentation skills for technical and non-technical audiences Problem-solving mindset with the ability to work both independently and as part of a team Strong communication skills to interface with colleagues at all technical levels What you need to do More ❯
be leading the migration of systems including including Office 365, HR, finance, and other core platforms in the business. You must have a project management and commercial mind set to complete these integrations. Key skills: Strong knowledge of Microsoft 365 administration Background in tenant to tenant migrations Solid understanding … of cloud infrastructure and networking principles Expertise in Active Directory, identitymanagement, and user access control Experience integrating HR, finance, and other business-critical systems Project Management skills Familiarity with automation tools and scripting (PowerShell, Python, Terraform) is a bonus Projects: Analyse IT environments from acquired companies More ❯
establishing a cutting-edge Security Monitoring & Analytics (SMA) capability to enhance its cyber defence operations. This initiative focuses on modernizing Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms , leveraging AI/ML-driven threat detection. As a Technical Product Owner , you will drive … Intelligence Platforms (TIP), and Forensics . Stakeholder Collaboration: Engage with Security Architecture, Security Design, and SOC teams to develop and enhance security capabilities. Backlog Management: Maintain a well-defined and prioritized product backlog , ensuring clear definitions and readiness of features. Strategic Alignment: Represent internal customer needs , aligning product direction … first culture. Who you are Required Skills & Experience: Agile Expertise: Strong understanding of Agile frameworks (SAFe, Scrum, Kanban) with experience in feature and roadmap management . Cyber Security & Engineering Knowledge: Hands-on experience in SIEM, SOAR, infrastructure security, DevOps, and analytics . Cloud & Automation: Proficiency with Kubernetes, GCP (preferred More ❯
accurate technical documentation, including design documents, implementation guides, and runbooks. Provide regular project and technical updates to internal stakeholders and customers. Collaboration and Stakeholder Management Engage with cross-functional teams (Sales, Managed Services, Security specialists) to ensure solutions are aligned with overall business strategies. Communicate effectively with stakeholders at … cloud solutions that meet customer requirements. Proven experience in delivering cloud-based projects within professional services or consultancy environments. Familiarity with Microsoft security solutions, identitymanagement, and compliance frameworks. Relevant Microsoft certifications (e.g., Microsoft Certified: Azure Solutions Architect Expert, Microsoft 365 Certified: Enterprise Administrator Expert). Experience with … Exchange, Windows Server) as a foundational background. Additional vendor certifications (e.g., VMware VCP, Veeam VMCE) or other cloud/security accreditations. ITIL or project management certifications (e.g., PRINCE2, PMP) advantageous but not essential. The Company This is CAE - Our goal is to be recognised as the most trusted and More ❯
Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures … development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with … of the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identitymanagement (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital More ❯
tooling (e.g., Terraform, Jenkins, Kubernetes). Hands-on with observability and monitoring tools (e.g., DataDog, Azure Monitor, AppDynamics). Expert in cyber security practices, identitymanagement, encryption, and secure API development. Familiarity with compliance frameworks such as GDPR and PCI-DSS. Excellent stakeholder management and communication skills More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
tooling (e.g., Terraform, Jenkins, Kubernetes). Hands-on with observability and monitoring tools (e.g., DataDog, Azure Monitor, AppDynamics). Expert in cyber security practices, identitymanagement, encryption, and secure API development. Familiarity with compliance frameworks such as GDPR and PCI-DSS. Excellent stakeholder management and communication skills More ❯
in this role you should have: Strong hands-on IAM engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identitymanagement, authentication, authorization and identity federation. Expertise with single sign on, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock … routes, dynamic proxies and filter chains, or implementing PingIDM based data links. Experience in partnering with security, product, engineering and compliance teams, to embed identity-first principles into the DevSecOps lifecycle. You may be assessed on the key critical skills relevant for success in role, such as risk and … less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions. Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. More ❯
Cannock, Staffordshire, United Kingdom Hybrid / WFH Options
Veolia
security architectures that protect our critical infrastructure, drawing on your understanding of network design, system hardening, cloud security best practices, and potential areas like identitymanagement or data protection. What are we looking for? Experience in a senior infrastructure role with deep technical knowledge of one or more More ❯
City of London, Greater London, United Kingdom Hybrid / WFH Options
Deltra Group
troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering, and vulnerability management Proficient in cloud services, especially in environments using virtual machines, identitymanagement, web apps, and networking components (e.g., virtual networks, security groups More ❯
Hiring Manager: Neeraj Gangal Talent Acquisition Advisor: Sarah Dinneen Job Code Level: SRP3 Your Impact: The OpenText MF Cloud Customer Management team is responsible for the delivery of Strategic Success Management throughout the Customers' cloud journey from post-sales to value realization to renewal. We're looking for … to track outcomes. Nurture a reference and manage customers through successful full renewal. What you will need to succeed: Business Planning and Strategic Program Management : has significant experience running large-scale enterprise-wide transformation Customer programs and is familiar with Business Analysis and Project Management methodologies. Strong experience … in customer ownership roles (customer success, consulting, sales, account management). Previous experience in working with large enterprise organizations and a proven track record of measurably impacting your customer's results. Strong working experience with security domains including Application Security (AppSec), IdentityManagement, and data security with More ❯
Design. You will also be driving discussion with Client and Business Users on Solution Design. Key responsibilities: Experience in architecting e-commerce platforms, inventory management, and order fulfillment, Marketing, Loyalty. Define technology roadmaps, ensuring alignment with business objectives and scalability requirements. Evaluate and select appropriate technology stacks, cloud services … ecommerce is plus Good experience in working with DevOps teams to enhance CI/CD pipelines and ensure smooth deployments. Define best practices for identitymanagement, authentication etc. Your Profile Key Skills/Knowledge/Experience Good experience with solutioning and designing. Strong understanding of marketing automation, CRM … and data analysis Knowledge of SQL, data modelling, and data warehousing. Excellent communication, technical documentation, and project management skills. Togaf certified Certification in cloud specific solution architect Familiarity with cloud-based integrations (e.g., AWS, Azure) Experience with Agile project management methodologies Rewards & Benefits TCS is consistently voted a More ❯
Design. You will also be driving discussion with Client and Business Users on Solution Design. Key responsibilities: Experience in architecting e-commerce platforms, inventory management, and order fulfillment, Marketing, Loyalty. Define technology roadmaps, ensuring alignment with business objectives and scalability requirements. Evaluate and select appropriate technology stacks, cloud services … ecommerce is plus Good experience in working with DevOps teams to enhance CI/CD pipelines and ensure smooth deployments. Define best practices for identitymanagement, authentication etc. Your Profile Key Skills/Knowledge/Experience Good experience with solutioning and designing. Strong understanding of marketing automation, CRM … and data analysis Knowledge of SQL, data modelling, and data warehousing. Excellent communication, technical documentation, and project management skills. Togaf certified Certification in cloud specific solution architect Familiarity with cloud-based integrations (e.g., AWS, Azure) Experience with Agile project management methodologies Rewards & Benefits TCS is consistently voted a More ❯
ll have the opportunity to shape our DevOps culture and practices. You'll collaborate with our engineering team to establish best practices for infrastructure management, security protocols, and deployment strategies. Your expertise in startup environments and medical technology will be crucial in building scalable, compliant solutions that support our … aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in Azure, focusing on Web Apps … implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identitymanagement solutions in Azure Strong More ❯
ll have the opportunity to shape our DevOps culture and practices. You'll collaborate with our engineering team to establish best practices for infrastructure management, security protocols, and deployment strategies. Your expertise in startup environments and medical technology will be crucial in building scalable, compliant solutions that support our … aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in Azure, focusing on Web Apps … implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identitymanagement solutions in Azure Strong More ❯
Responsibilities: Manage and optimise a hybrid IT environment (on-prem & Azure) Architect and deploy Azure-based solutions Administer Hyper-V clusters, networking, storage, and identitymanagement systems Automate tasks using PowerShell and configuration tools Implement and uphold robust security protocols Provide 3rd-line support and maintain system documentation … Exchange, and virtualisation PowerShell scripting proficiency Excellent communication, problem-solving, and organisational skills Benefits Include: Generous holiday entitlement Staff discount on legal and wealth management services Income protection & life assurance (3x salary) Salary exchange pension scheme Employee Assistance Programme To apply confidentially, contact Profectus today. More ❯