etc. - Compute, such as VMs and App Service - Governance and architecture, such as landing zones, Azure Policy - Defender for Cloud - Entra, such as Azure RBAC and Entra Domain Services Has a proven track record of Microsoft security obsession and wants to be among like-minded professionals Holds AZ or More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Embarcaderomediagroup
synthetic monitoring Solid understanding of networking (TCP/IP, Load Balancing, DNS, Routing) Good knowledge of DevSecOps practices - including security scanning, IAM, and RBAC Experience with FinOps - tagging, budgeting, cost optimisation Experience with Windows and Linux Operating Systems Understanding of progressive delivery methods (canary, blue/green) Familiarity with More ❯
Containers, lifecycle rules, access policies, secure access patterns. Azure Web Apps and additional cloud services where needed. Maintain and enhance IaC for RBAC, Entra ID (Azure AD), and secure external access. Support flexible deployments and environment replication across dev/test/prod. DevOps & Deployment Automation Build and More ❯
Saviynt, and CyberArk. Technical Familiarity: Experience with Active Directory, Azure AD, and core Microsoft technologies. Compliance Understanding: Knowledge of role-basedaccesscontrol, least privilege, segregation of duties, and compliance standards such as GDPR, FCA guidelines, and ISO 27001. Detail-Oriented: Strong More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group More ❯
birmingham, midlands, united kingdom Hybrid / WFH Options
Tilt Recruitment Limited
cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group More ❯
Kent, Broomfield, United Kingdom Hybrid / WFH Options
Tilt Recruitment
cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group More ❯
West Midlands, Bilbrook, Staffordshire, United Kingdom Hybrid / WFH Options
Tilt Recruitment
cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
Python, SQL, and Scala for data processing. Strong understanding of Azure networking, security, and IAM , including Azure Private Link, VNETs, Managed Identities, and RBAC . Deep knowledge of enterprise-scale data architecture patterns , including Lakehouse, Medallion Architecture, and hub-and-spoke models . Strong problem-solving skills and ability More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from: Enterprise identity, including provisioning, JML, certification, RBAC, entitlement management, policy management, data access governance, identity analytics; Customer IAM (CIAM), including registration, customer experience, authentication, multi-channel, privacy; Access management, including More ❯
Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security Principles: Ensure segregation of duties and More ❯
services like Azure Data Factory , Azure Data Lake , or Azure Synapse . Understanding of Azure’s security and identity management practices (e.g., IAM, RBAC). Snowflake Data Warehouse Experience : Designing and optimizing Snowflake schemas for efficient querying. Implementing ETL/ELT pipelines to load and transform data in Snowflake. More ❯
services and REST APIs Experience in mentoring, serving as a tech lead, or leading an engineering team Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require 5+ years of software development experience 2+ years of experience contributing to the system design More ❯
and other specific services on Kubernetes) CircleCI DataDog Auth0 (we use it, but we would rather not have to) RoleBasedAccessControl JsonSchema Pusher (we use it to push notifications to our Frontend Web App) LocalStack (we use it to mock More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-basedaccesscontrol (RBAC), and identity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g. More ❯
Norwich, Norfolk, United Kingdom Hybrid / WFH Options
Hamilton Barnes
of backup, restore, and disaster recovery strategies using PostgreSQL-native tools. Familiarity with database security best practices, including role-basedaccesscontrol and encryption. Excellent problem-solving and analytical abilities to diagnose and resolve performance and reliability issues. Strong communication skills More ❯
required. Ensure access and data security compliance across all databases, administering user accounts and user access (role-basedaccesscontrol). Install and configure database servers, establish database instance(s) in a private cloud environment. Proactively monitor system health More ❯
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Azad Technology Partners
or other front-end JavaScript framework. Designing and implementing RESTful services. Knowledge of Active Directory and developing and applying of role-basedsecurity models. 3 years of experience integrating configuration management methodologies and techniques, including branching and merging. 3 years of experience developing More ❯