ensure regular audits and compliance reviews are conducted. Champion a culture of security awareness across the organization by delivering training and setting policies that promote secure behaviours. Oversee the management of access controls, encryption standards, identitymanagement, and vulnerability management programs. Collaborate with senior leadership and legal teams to ensure compliance with data protection laws (e.g. … GDPR, CCPA) across all jurisdictions. Operational Excellence & Cost Management: Oversee the delivery of IT services across all international sites, ensuring high availability, security, and performance. Establish and manage IT budgets, vendor relationships, and service agreements to ensure JJ gets excellent value from its partners and operates efficiently Team Leadership & Stakeholder Management: Lead and mentor a diverse IT team … City Of London, England, United Kingdom 75,000.00-100,000.00 1 week ago London, England, United Kingdom 6 days ago London, England, United Kingdom 18 hours ago Director of Identity & Access Management London, England, United Kingdom 15 minutes ago London, England, United Kingdom 18 minutes ago London, England, United Kingdom 2 weeks ago London, England, United Kingdom More ❯
Overview: The Security Consultant/Architect would be providing security architecture, consulting and strategic direction to clients as part of the Enterprise Security Initiatives for a global System Integrator. Identity and Access Management as well as general security will be an area of experience allowing you to Identify and evaluate business risks & threats and internal controls which mitigate … CSO & Security director to define Security Strategy and build and nurture positive working relationships with clients Consulted and provided solutions in the areas of enterprise business/technology strategy, Identity & Access Management, Data Security, business process optimization/re-engineering, enterprise infrastructure security design & optimization Designed and implemented solutions for enterprise security infrastructure, security, identitymanagement/entitlement, disaster recovery, business continuity strategy and planning, fault tolerant infrastructure, contingency planning, crisis management, application/infrastructure integrity. The Architect/Consultant is a senior technologist that plays an important client facing consulting role. Listen to customer business problems and requirements and articulate how solutions can be structured to address them and follow this through the More ❯
to perform storytelling. You will • Work with reporting and AI tools such as PowerBI and Databricks to produce insights from a range of cyber security tools such as vulnerability management, identitymanagement, detection and response and other cyber security tools to drive cyber security position. • Meet with managers and stakeholders regularly to understand and deliver and support More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
skilled and forward-thinking 365 Engineer to join their IT Infrastructure team. This is an exciting opportunity to work in a complex hybrid environment, supporting and evolving enterprise-scale identity and access management (IAM) solutions using Microsoft Entra ID (formerly Azure AD) and related Microsoft 365 technologies. You'll act as a subject matter expert (SME) for identity … best practices in access control, authentication, and governance. Key Responsibilities Provide third-line support for IAM systems across hybrid cloud environments. Lead on the technical design and implementation of identity solutions. Monitor, identify, and resolve security risks and operational incidents. Improve the organisation's security posture through configuration of Microsoft Secure Score, Conditional Access, and PIM. Manage and migrate … single sign-on (SSO) integrations for third-party business applications. Automate identity processes and configurations using PowerShell. Required Skills & Experience Proven experience managing hybrid identity environments with Active Directory and Microsoft Entra ID . Strong scripting abilities using PowerShell . Expertise in multi-factor authentication (MFA) , Conditional Access, self-service password reset, and modern authentication methods. Understanding of More ❯
in Microsoft Azure, ensuring alignment with best practices such as Microsoft CAF and Zero Trust principles. Work with cloud engineering teams to enforce security configurations for Azure services, including Identity & Access Management (IAM), Secure Networking, Key Management (Azure Key Vault), and Data Protection (DLP, encryption). Design logging, monitoring, and incident response strategies for Azure workloads using … application, and cloud changes to mitigate risks while enabling business agility. Act as a trusted advisor to IT, OT, and cloud engineering teams on security design decisions. Ensure change management processes align with regulatory and security compliance requirements. Security Technology Evaluation & Continuous Improvement Evaluate and recommend security technologies for network security, endpoint security, identitymanagement, and threat … cloud architects, IT teams, and business stakeholders. Strong communication and advisory skills, particularly in engaging CCB and senior leadership on security risks. Experience with security governance, policies, and change management processes. Certifications (Preferred but Not Mandatory) Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) GIAC Global Industrial Cyber Security Professional (GICSP) Azure Security Engineer Associate (AZ More ❯
digital services that matter Preferred Tech Stack Expertise Cloud Infrastructure : AWS (EKS, RDS, Aurora, ElastiCache, Kafka, IAM) Secure Hosting : Experience working with air-gapped or government-secure environments Secrets & IdentityManagement : HashiCorp Vault, Keycloak Automation : IaC, pipeline build automation, event relay tooling Scripting : Bash, Python, Groovy, Lambda functions Responsibilities Run, manage, and continuously evolve the AWS and secure … all services are compliant with security standards and support the change and release governance model . Build and maintain infrastructure components like event streaming (Kafka), databases (Aurora, RDS, Redis), identitymanagement (Keycloak), and caching layers. Enhance and maintain CI/CD tooling and self-service developer pipelines for tenant teams. Proactively manage and resolve tech debt by working … roadmap, collaborating with internal/external platform and infrastructure teams to support scalable and resilient services. Support critical national infrastructure tasks including platform deployments, incident/problem/change management, and continual service improvement (ITIL-aligned). Use and integrate ServiceNow (or its successor) to track and manage changes, incidents, requests, and problem records. More ❯
evolution continues, they now require a Security Access Analyst to join the team. Reporting to the Head of IT Security, the Security Access Analyst role is integral to the management and integrity of network and system access within the group. You will be responsible for ensuring that access rights are granted according to role-based access control (RBAC) principles … or equivalent hands-on experience A minimum 2 years' experience in an IT Support role and 1+ years in roles that focus on network and/or Cloud security, Identity Access Management (IAM), Role Based Access Control (RBA) and showcasing a track record of increasing responsibility Possess an analytical mind-set, enabling the assessment of security risks and … formulation of appropriate mitigation strategies Knowledge of access management solutions and identitymanagement protocols Good analytical skills to interpret access data and identify security risks Awareness of regulatory requirements affecting access controls, such as PCI-DSS and GDPR More ❯
client-facing deliverables, to a high standard The expectation will be that you have basic skill in the design and configuration of an IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally with good conceptual/practical knowledge of … Access Management (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM Knowledge of integrations of IAM platforms with SAP, Entra, AD, Okta, CyberArk, ServiceNow will also be More ❯
client-facing deliverables, to a high standard The expectation will be that you have basic skill in the design and configuration of an IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally with good conceptual/practical knowledge of … Access Management (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM Knowledge of integrations of IAM platforms with SAP, Entra, AD, Okta, CyberArk, ServiceNow will also be More ❯
client-facing deliverables, to a high standard The expectation will be that you have basic skill in the design and configuration of an IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally with good conceptual/practical knowledge of … Access Management (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM Knowledge of integrations of IAM platforms with SAP, Entra, AD, Okta, CyberArk, ServiceNow will also be More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
app journeys, helping 1.You will define and drive a transformation roadmap that enhances our digital platforms, exploits technologies like React, Flutter on platforms like AWS & improve how we deliver identitymanagement, user access management (UAM), whilst ensuring we have a solid application support service to maintain these capabilities in life. Your leadership of a team (circa … for digital channels like Web, App, Chatbots . Establish robust application support models ensuring 24x7 operational excellence , rapid incident recovery, and proactive service quality. Lead Talent Councils for talent management, skills inventories & succession planning. Led digital engineering delivery for large-scale B2B or B2C customer self-serve journeys across web and mobile. Successfully driven cloud-native modernisation programmes on … are critical . Capability Building Agile Development Culture Building Business Analysis Artificial Intelligence/Machine Learning Continuous Integration/Continuous Deployment Automation & Orchestration Software Testing Software Development Lifecycle Talent Management Performance Management An annual on-target bonus of 15% (personal and company multipliers) ~ Private healthcare for you and your family ~ Annual car allowance ~ BT Pension scheme: minimum More ❯
app journeys, helping 1.You will define and drive a transformation roadmap that enhances our digital platforms, exploits technologies like React, Flutter on platforms like AWS & improve how we deliver identitymanagement, user access management (UAM), whilst ensuring we have a solid application support service to maintain these capabilities in life. Your leadership of a team (circa … for digital channels like Web, App, Chatbots . Establish robust application support models ensuring 24x7 operational excellence , rapid incident recovery, and proactive service quality. Lead Talent Councils for talent management, skills inventories & succession planning. Led digital engineering delivery for large-scale B2B or B2C customer self-serve journeys across web and mobile. Successfully driven cloud-native modernisation programmes on … are critical . Capability Building Agile Development Culture Building Business Analysis Artificial Intelligence/Machine Learning Continuous Integration/Continuous Deployment Automation & Orchestration Software Testing Software Development Lifecycle Talent Management Performance Management An annual on-target bonus of 15% (personal and company multipliers) ~ Private healthcare for you and your family ~ Annual car allowance ~ BT Pension scheme: minimum More ❯
is gaining traction Many organisations are moving towards a Zero Trust approach, where nobody inside or outside the network is trusted by default. This model requires specialists who understand identitymanagement, access control and modern network design. Cloud misconfigurations are still causing problems Despite advances in tooling, simple mistakes in cloud setup continue to be a leading cause … salary: £70,000 to £100,000 GRC Specialist - Professionals who align security with risk, compliance and governance frameworks. Typical salary: £60,000 to £90,000 IAM Lead - Focused on identity and access management, a vital area as companies adopt Zero Trust models. Typical salary: £65,000 to £95,000 DevSecOps Engineer - Combining development, operations and embedded security across … Prioritising Employers are looking for more than technical knowledge, they're searching for people who can make a real impact. Core technical skills include: Incident response and threat hunting Identity and access management Zero Trust architecture Familiarity with UK regulatory standards and NCSC guidance Certifications often requested: CISSP, CISM, CISA CompTIA Security+ ISO 27001 Cloud security credentials (e.g. More ❯
Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt's Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users … with right-time, right-level access to the digital technologies and tools they need to do their best work. The Technical Account Manager will provide account management and high-level technical support to project teams and customers. They will define and oversee the inception and implementation of solutions as well as support post go-live to help support the … and Forecasting at a Regional level Manage and approve Time sheets and support invoicing activities Coordinates with CSM Qualifications: A minimum of 5+ years of of relevant experience in Identity Governance and Administration and/or Identity Access Management domain A minimum of 5+ in experience leading scoping, planning and delivery of projects and strong track record More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Digital Workplace Technology Consultant, M365, Hybrid Digital Workplace Technology Consultant required for a leading financial serviced company based in London. You will manage essential technologies, including Desktop, M365, Azure, identitymanagement, email hygiene, SharePoint storage, MS Teams/telephony services and overall Cloud infrastructure security. Hybrid working - 2 days per week on site. Limited company engagement is permitted … AV environments ITIL Able to technically manage a team of engineers and manage own and others workload M365 Technical expertise - Office/OneDrive/Teams/Sharepoint integration M365 management portal, conditional access and licence management Active Directory and Azure AD (Entra) management Skills working with cloud infrastructure (AWS or Azure) Understanding of Data networking Knowledge of … firewall requirements Windows 11 Laptop management, SCCM, Intune, Autopilot Provision of email services, and email routing technologies (eg M365 Exchange Online/Hybrid Exchange) Mail protection e.g. Mimecast Security and Threat management in an enterprise environment (eg Defender for Endpoint, Vulnerability reporting and remediation) Reasonable Adjustments: Respect and equality are core values to us. We are proud of More ❯
experience with TypeScript (including React, Next.js, Express, and Node.js), SQL, and building seamless integrations with external systems. Proficiency in implementing CI/CD pipelines and managing complex integration challenges. Identity & Access Management: Deep understanding of SCIM for user provisioning and identitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Must be capable of … where our people feel they truly belong. We value and respect individual differences, so all applications will receive fair and equal consideration without regard to ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability or age. More ❯
React, Next.js, Express, and Node.js), SQL, along with the ability to create seamless integrations with external systems. Proficient in implementing CI/CD pipelines and managing complex integration scenarios. Identity & Access Management: Understanding of SCIM for user provisioning and identitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Ability to effectively implement and … members feel truly valued. We appreciate and respect individual differences and are committed to ensuring that all applications are treated fairly and equally, regardless of ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability, or age. More ❯
will involve the following: * Endpoint monitoring and analysis. * Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert … knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing * Knowledge of Cloud computing, computer network defence, identitymanagement, incident management and network security. * Significant experience within a SOC environment. * Incident response experience * Qualification/Certification in Cyber Security Desirable * IT Qualifications/Certifications such More ❯
ensure all actions are performed in a timely and compliant manner Understand the concepts and have strong experience of O365 and on Prem environments, Group policies, user and device management Be an SME on the RMM tool(s) used in the business and manage scheduled and on demand scripts, patching workflow, but also monitoring, administration, and remote support Administer … O365 Administer and maintain the joiners/movers/leavers process in a timely and secure way Provide expertise on windows services such as DNS, DHCP, GPO, PowerShell, Scripting, IdentityManagement, AAD or Hybrid environment management Build and distribute corporate hardware while maintaining inventory and asset registers Contribute to the change management process as and when More ❯
and peripherals with Engineering. Maintains local and network credentials and provisions access to vulnerability scanning systems. Responsible for integration of Vulnerability assessment tooling with other security and IT systems management tools (i.e. Splunk, ServiceNow) Responsible for developing and maintaining standard processes and operating procedures, creating technical architecture diagrams and system build documentation. Responsible for operating the scanning tools and … maintaining coverage along with supporting the vulnerability management and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Works with vulnerability management team to build asset repositories and asset scan policies Work closely with customer delivery managers to prioritize daily tasks and participate in technical meetings with customers' technical specialists. Provide Tier 2/… support for incidents relating to security tools/solutions. Continuously improve customers' security deployments and integrate new technologies and services. Technical Skills & Competencies 5+ years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues 2+ years of experience with performing systems administration in Windows, Linux, VMware environments More ❯
Fully remote An established organization in the cybersecurity is seeking an IT Infrastructure Manager to lead the operational delivery of its cloud platforms, core infrastructure, endpoint management, and enterprise tools. This role is central to maintaining secure, scalable, and resilient technology environments that support both external services and internal operations. Key responsibilities: Evolve and maintain core infrastructure (Azure) External … Platform management and Support (AWS) Third party vendor management Security Compliance and Identitymanagement (ISO 27001 and External EntraID) SME across IT enabled projects Support and Collaboration (Level 3) Amongst evidence of the above we are looking for the bellow: Management of Azure and AWS infrastructure (multi-cloud environment) Microsoft 365 - Intune, Entra ID and More ❯
Chesterfield, Derbyshire, England, United Kingdom Hybrid / WFH Options
LANGLAND CONSULTANTS LTD
WAN, Microsoft, Meraki, Network Security, Firewalls & VPNs. Take ownership of escalated issues as 3rd line support and resolving any queries within SLA Resolution of configuration and deployment issues, ensuring management of core IT Infrastructure operations thru system monitoring and maintenance Working with VMWare, Windows Server, AD, Exchange, O365, Azure and other Microsoft technologies Ensure that 3rd party applications are … develop good working relationships with colleagues, other departmental members and suppliers, consultancy partners and third parties. Support their server and storage infrastructure thru on premise and cloud infrastructure. Manage identitymanagement technologies, IaaS management tools to maximise the speed of routine tasks. Enforce client device security standards for mobile Fones, laptops, PCs & tablets. Infrastructure Engineer/Analyst More ❯
ensure regular audits and compliance reviews are conducted. Champion a culture of security awareness across the organization by delivering training and setting policies that promote secure behaviours. Oversee the management of access controls, encryption standards, identitymanagement, and vulnerability management programs. Collaborate with senior leadership and legal teams to ensure compliance with data protection laws (e.g. … GDPR, CCPA) across all jurisdictions. Operational Excellence & Cost Management: Oversee the delivery of IT services across all international sites, ensuring high availability, security, and performance. Establish and manage IT budgets, vendor relationships, and service agreements to ensure JJ gets excellent value from it's partners and operates efficiently Team Leadership & Stakeholder Management: Lead and mentor a diverse IT More ❯