s Azure and AWS environments, identifying misconfigurations, excessive permissions, insecure interfaces, and other weaknesses Work with cloud and DevOps teams to design and implement remediation steps - covering IAM refinement, networksegmentation, encryption practices, API security, and data access controls Promote strong cloud security hygiene across the organisation, ensuring new deployments follow best practice and remain compliant with internal More ❯
knowledge of Azure. Maintain comprehensive documentation of the infrastructure, configurations, and procedures. Ensure security best practices are implemented across on-premise environments, with a particular focus on firewalls and network segmentation. Providing BAU support for the businesses and supporting the junior engineers with escalation issues. Ensure detailed and comprehensive information is captured for each ticket, including user details, issue More ❯
a governance framework for OT systems across all manufacturing sites. Security and Risk Management Assess and improve the security posture of OT environments in coordination with IT security. Implement networksegmentation, monitoring, and secure remote access practices for OT systems in collaboration with Morgan's network team. Ensure compliance with cybersecurity frameworks (e.g., NIST, ISA/IEC More ❯
maintain UML and SysML models supporting the design, integration, and delivery of secure system architectures. Produce detailed architecture artefacts (component, class, sequence, and activity diagrams). Collaborate with solution, network, and security architects to ensure alignment with Zero Trust principles . Maintain model integrity and traceability across multiple design layers. Support architecture reviews and governance boards , providing modelling best … high-quality technical artefacts . Desirable: Familiarity with MODAF, TOGAF, or NATO Architecture Framework (NAF) . Experience within Defence Digital , MOD , or other UK Government secure programmes. Understanding of networksegmentation, IAM, and policy enforcement mechanisms (PEP/PDP). Exposure to Agile , DevSecOps , or secure systems engineering environments. Interested? If you hold active DV clearance and have More ❯
projects (P2V, V2V) Cloud & Hybrid Environments Delivered secure cloud architectures across Azure, AWS, and VMware Implemented access via API, CLI, and management portals Security Architecture & Controls Developed IAM and networksegmentation models Applied backup, disaster recovery, and encryption strategies Automation & Configuration Management Used Infrastructure as Code (IaC) and Desired State Configuration for automated, compliant deployments Virtualisation & Migration Built More ❯
pipelines for application and infrastructure deployments. Monitoring & Troubleshooting: Implement observability solutions (CloudWatch, Datadog, Splunk) and resolve incidents promptly. Security & Compliance: Apply AWS security best practices, including IAM, encryption, and network segmentation. Cost Optimization: Monitor and optimize AWS resource usage for cost efficiency. Collaboration: Work with cross-functional teams on deployments, migrations, and performance tuning. Essential Skills & Experience Proven experience More ❯
design Technical skills needed (at least 1): Experience of data flow analysis Ideally some experience on Cyber/Information Security - particularly firewall system upgrade projects Experience of working on NetworkSegmentation projects More ❯
Excellent ability to learn new technologies, systems, and languages A keen interest in embedded systems, IoT and hardware Demonstrated hardware security skills either in professional or hobbyist sphere Strong network protocol analysis using tools such as Wireshark An understanding of reverse engineering, experience using tools such as Ghidra, with particular focus on ARM and x86 architectures Ability to script … to allow it to be serviceable long into the future Attempting to bypass a custom digital rights management system to provide assurance that their product is adequately secure Testing networksegmentation and infrastructure on a variety of ships, including cruise ships and oil rigs Working in ICS environments using a risk-averse methodology using document review, visual survey More ❯
Hertfordshire, England, United Kingdom Hybrid/Remote Options
Cpl Life Sciences
/11 and Microsoft 365: Deep understanding of modern desktop environments and integration with Microsoft cloud services. Networking Fundamentals: Solid understanding of TCP/IP, DNS, DHCP, VPN, and network segmentation. If you are interested please apply or send your CV to luke.sandilands@cpl.com More ❯