compliance with data protection policies and technical controls Provide support and guidance for Azure-related incidents, changes, and requests Contribute to the development of cloud governance frameworks and cost management strategies Participate in project planning and delivery, providing Azure expertise where needed Keep documentation up to date, including technical configurations, procedures, and support materials Support business continuity and disaster … Skills and Experience: Strong experience designing, deploying, and supporting Azure cloud infrastructure Proficiency in scripting/automation tools (e.g., PowerShell, Terraform, ARM, Bicep) Solid understanding of networking, security, and identitymanagement in Azure Familiarity with Azure Monitor, Azure Policy, Azure Security Center, and cost management tools Ability to work collaboratively with both technical and non-technical teams More ❯
GitHub, Terraform, Docker, Kubernetes, and automated testing and monitoring. Data & Integration : Skilled in data modelling, APIs, messaging systems (e.g., Kafka), and ETL pipelines. Security & Compliance : Knowledge of secure design, identitymanagement, and regulatory standards (e.g., GDPR). Problem Solving : Proven ability to lead teams in diagnosing and resolving complex technical issues. Project Planning : Strong skills in planning, risk … management, and cross-functional coordination. Education & Certifications: Degree in a relevant field or equivalent experience. Architecture certifications (e.g., TOGAF, ArchiMate) are a plus but not required. Why Join Us? Join our team and contribute to a culture of innovation, collaboration, and excellence. Bring your expertise to a team that values bold ideas, technical excellence, and collaborative success. If you … considered for and treated during employment without regard to race, color, creed, religion, sex, national origin, citizenship status, disability status, protected veteran status, age, marital status, sexual orientation, gender identity, genetic information, or any other characteristic protected by law. RX is in the business of building businesses for individuals, communities and organizations. We elevate the power of face-to More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identitymanagement and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This role More ❯
cyber security leadership role within complex, high-security environments. In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, risk management, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identitymanagement and federation, firewalls, SIEM, vulnerability scanning … and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery, ideally within ITIL-aligned environments. Ability to translate complex security concepts into clear, actionable guidance for stakeholders at all levels. Skilled in relationship management, with the confidence to challenge and influence suppliers to ensure security outcomes are realistic, achievable, and deliver value for money. This role More ❯
practice . Primary People Experience (PX) Tech responsibilities include maintaining Allvue's PX tech stack, taking the lead on technical support and solutions to improve PX processes and data management, while also ensuring data integrity and security of employee data across Allvue's corporate application landscape . Primary analytics responsibilities i nvolve working closely with employee data and building … artner closely with PXBPs and Finance team to deliver analytics to the business. Utilize existing technology to automate and provide real-time data and analytics where possible. Partner with IdentityManagement team to configure and manage Single Sign-On (SSO) and SAML for the PX tech stack Growth opportunities in the People Operations and Total Rewards space available … as an HR/PX tech and analytics subject matter expert . Deep e xper tise with HR/PX systems, specifically, ADP Workforce Now, and ideally, iCIMS, Learning Management Systems, and e mployee survey tools . C ommunicat e clearly in English, both written and verbal , with interpersonal skills to effectively collaborate with internal stakeholders and external partners More ❯
regulatory requirements. Other responsibilities include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures to enhance efficiency and effectiveness … practices. Secure Design: Collaborate with development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with all relevant group standards, policies … and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identitymanagement (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital certificates, Principles of securing mobile More ❯
UK government security standards (e.g. NCSC guidance, ISO27001, JSP 440) Proven experience designing and implementing secure systems in enterprise or government settings Familiarity with cloud platforms (AWS/Azure), identitymanagement, secure networking, encryption, and SIEM Strong communication and stakeholder engagement skills, able to advise both technical and business teams Desirable Experience Background in central government, defence, or More ❯
and design patterns. Strong understanding of application architectures, including microservices, API-driven platforms, cloud infrastructure (AWS), and DevOps practices. Familiarity with single sign-on technologies (OAuth, SAML, OpenID Connect), identitymanagement, and enterprise security practices. Expertise in managing operational app deployments at scale with knowledge of crash reporting, device constraints, and network efficiency. Knowledge of modern app development More ❯
and design patterns. Strong understanding of application architectures, including microservices, API-driven platforms, cloud infrastructure (AWS), and DevOps practices. Familiarity with single sign-on technologies (OAuth, SAML, OpenID Connect), identitymanagement, and enterprise security practices. Expertise in managing operational app deployments at scale with knowledge of crash reporting, device constraints, and network efficiency. Knowledge of modern app development More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
leading global organisation, supporting enterprise-level database, web, and SharePoint environments. You will provide third-line support for critical systems, managing SQL Server, SharePoint, Azure services, web applications, and identitymanagement infrastructure. Working in a dynamic team, you'll ensure system availability, performance optimisation, and deliver key upgrades and deployments. Key Responsibilities: Provide third-line support for database … team members and supporting wider business projects. Skills & Experience: Strong experience with Microsoft SQL Server, SharePoint, and Azure cloud services . Knowledge of web application infrastructure, SSO, MFA , and identity management. Proven experience in system architecture, performance tuning, and troubleshooting . Project management skills and ability to lead on deployments and upgrades. Excellent stakeholder engagement and communication skills. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
leading global organisation, supporting enterprise-level database, web, and SharePoint environments. You will provide third-line support for critical systems, managing SQL Server, SharePoint, Azure services, web applications, and identitymanagement infrastructure. Working in a dynamic team, you'll ensure system availability, performance optimisation, and deliver key upgrades and deployments. Key Responsibilities: Provide third-line support for database … team members and supporting wider business projects. Skills & Experience: Strong experience with Microsoft SQL Server, SharePoint, and Azure cloud services . Knowledge of web application infrastructure, SSO, MFA , and identity management. Proven experience in system architecture, performance tuning, and troubleshooting . Project management skills and ability to lead on deployments and upgrades. Excellent stakeholder engagement and communication skills. More ❯
a Web Infrastructure Engineer (SQL) to join the firm in Birmingham. Responsibilities: * Provide support and SME direction on the firms SQL estate, SharePoint estate, Azure Cloud Services, SSO and IdentityManagement, working with Business Service teams and vendors in supporting and improving the service offerings. * Management of Azure SharePoint cloud services, SSO and SQL estate globally, ensuring … availability, load balancing and disaster recovery solutions are operational. * Management of Web and SharePoint farm estate globally, ensuring operational uptime and deliver improvement to services through code releases and deployments. Skills: * Expecting this person to come from an Infrastructure background with strong technical skills with Windows Servers (DNS, Clustering), SharePoint 2019, operational support for SQL and IIS for web More ❯
and coordinate across departments like DevOps, Security, and Development to ensure seamless cloud operations within a global business. The Lead Cloud Engineer will get heavily involved in: Cloud Infrastructure Management - Azure skills are critical for this role Cloud Service Deployment and Maintenance Security & Compliance Performance Monitoring & Cost Control Leadership & Collaboration - you'll get the chance to build and scale … team of cloud engineers and system administrators over time. The Ideal Candidate You'll have a strong technical background in cloud engineering and/or systems engineering with recent management and/or leadership experience. You'll have deep hands-on expertise with Azure (including subscriptions, services, networking, and identitymanagement) Proven experience managing and optimising cloud More ❯
Partner closely with PXBPs and Finance team to deliver analytics to the business. Utilize existing technology to automate and provide real-time data and analytics where possible. Partner with IdentityManagement team to configure and manage Single Sign-On (SSO) and SAML for the PX tech stack. Growth opportunities in the People Operations and Total Rewards space are … years as an HR/PX tech and analytics subject matter expert. Deep expertise with HR/PX systems, specifically ADP Workforce Now, and ideally, iCIMS, Learning Management Systems, and employee survey tools. Excellent communication skills in English, both written and verbal, with interpersonal skills to collaborate effectively with internal stakeholders and external partners. Ability to independently develop project More ❯
Responsibilities: Architect and deliver robust, secure, scalable Azure platforms aligned with CLIENT's cloud strategy and regulatory requirements. Design cloud landing zones, subscription models, and core services, including networking, identity, monitoring, and governance. Drive platform automation using Infrastructure as Code (IaC) with Terraform and Bicep. Implement and advocate DevOps practices like CI/CD, GitOps, infrastructure automation, and environment … consistency. Build and maintain deployment pipelines using Azure DevOps and GitHub Actions. Enhance platform stability with self-healing patterns and automated remediation. Enforce Azure governance through Management Groups, Policies (including DENY effects), RBAC, and tagging strategies. Collaborate with security teams to integrate DevSecOps practices and ensure platform compliance with CLIENT's internal standards and industry regulations. Enable and support … Privileged IdentityManagement (PIM), Conditional Access, and Zero Trust controls. More ❯
standards. Collaborate with engineering and IT teams to ensure secure-by-design principles are embedded in systems and products. Maintain and update security tools including SIEM, endpoint protection, and identitymanagement systems. Investigate security incidents, perform root cause analysis, and recommend corrective actions. Assist in compliance efforts with standards such as ISO 27001, NIST, and MOD-specific frameworks More ❯
grow and improve IT operations. Key Responsibilities Provide expert-level support and root-cause analysis for persistent or critical technical issues. Support infrastructure-related tasks such as servers, networking, identitymanagement, and security tools (e.g., EDR/MDR/SOC). Work with third-party vendors and MSP partners to ensure seamless IT operations. Create and maintain detailed More ❯
teams, supporting Amazon Foundational Security Services, to provide our customers with secure by default security services. We dive deep into security technologies such as new access control design patterns, identity security services, access control, authorization, authentication, and life cycle management to support our customers as Amazon continues to scale and grow. We are looking for software professionals from … or improvement of standard operating procedures (SOP) Knowledge of professional software engineering & best practices for full software development life cycle, including coding standards, software architectures, code reviews, source control management, continuous deployments, testing, and operational excellence Proficient troubleshooting and anticipating problems that affect the performance, reliability, or availability of software systems PREFERRED QUALIFICATIONS Experience with any combination of the … following: threat modeling, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security Bachelor's degree in computer science or equivalent Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language Experience in building production software Experience working cross-organizationally and leading strategic team efforts requiring work from multiple More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across … recommendations to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identitymanagement, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust … and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector Compliance Drive the identification and remediation of platform-specific security risks by leading discussions with more senior stakeholders and acting as a point of escalations. Ensure compliance with legal, regulatory, and professional obligations More ❯
from the firm's cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across … recommendations to mitigate risks. Security Design and Architecture Assurance Review and approve security architecture designs for new services, platform upgrades, and major integrations, with a focus on data privacy, identitymanagement, and access controls. Ensure alignment with firm-wide security policies, particularly in relation to cloud security, data loss prevention, AI governance, and information governance. Champion zero trust … and defence-in-depth strategies across all applicable platforms, ensuring alignment with the strategy and architecture of the Digital Trust team. Risk Management and Legal Sector Compliance Drive the identification and remediation of platform-specific security risks by leading discussions with more senior stakeholders and acting as a point of escalations. Ensure compliance with legal, regulatory, and professional obligations More ❯
Security Ensure UNIX systems are hardened and compliant with security frameworks. Manage OS-level security policies including firewall rules, kernel parameters, selinux policies and secure configurations. Integrate systems for identity and privileged access management. Support audit, forensic, and security event investigations in coordination with InfoSec teams. Regularly review and remediate security vulnerabilities identified by Qualys, Nessus, or other scanning … incident response planning, patching SLAs, and compliance reporting. Design and maintain logging, audit trails, and syslog/SIEM integrations Authentication, Authorization, and Directory Services Integrate UNIX systems with enterprise identitymanagement platforms Implement and enforce secure access controls, sudo policies, and RBAC schemes. Collaborate with IAM and InfoSec teams on audit readiness, access provisioning, and PAM integrations. Monitoring … understanding of centralized authentication/authorization. Proficiency in shell scripting (bash, ksh, sh); strong familiarity with Python, and Ansible. Proven experience with infrastructure-as-code principles, Git-driven config management, and CI/CD pipelines leveraging GitHub Actions and Ansible/AWX Familiarity with automated validation, monitoring, logging, and alerting frameworks. Passion for automating operations tasks, reducing technical debt More ❯
relevant to this role: Proven experience in a pre-sales or solution consulting role within the cyber security domain Strong knowledge of security technologies such as XDR, SIEM, EDR, identitymanagement, email security, cloud security, etc. Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIS, NIST, GDPR) Excellent communication and presentation skills, both technical and non-technical … we're looking for, please do consider applying and highlight your transferable skills and experience. We embrace diversity in all its forms, valuing individuals regardless of age, disability, gender identity or reassignment, marital or civil partner status, pregnancy or maternity status, race, colour, nationality, ethnic or national origin, religion or belief, sex, or sexual orientation. Your perspective and potential More ❯
managing security and compliance under HIPAA, FDA, and NIST Knowledge of GDPR, ISO 27001, SOC 2 and international security standards Experience with cloud-native environments (e.g., AWS), data encryption, identitymanagement, and secure software development practices Strong communicator who can translate security priorities to technical and non-technical audiences Experience supporting FDA submissions, audits, and documentation Demonstrated ability More ❯
in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience. Extensive experience and expertise in any combination of the following: threat modeling experience, secure coding, identitymanagement and authentication, software development, cryptography, system administration and network security experience. Experience using Large Language Models (LLM) in security engineering. Preferred Qualifications Master's or PhD in More ❯