London, England, United Kingdom Hybrid / WFH Options
Canada Life
performance, ensuring high levels of security and scalability across all cloud environments. Enforce security best practices in AKS, including network policies, RBAC (Role-BasedAccessControl), and integration with Azure Active Directory Core Services Software development experience, ideally in .NET stack. SQL skills to manage and interact with databases as More ❯
London, England, United Kingdom Hybrid / WFH Options
Conception X Enr
performance, ensuring high levels of security and scalability across all cloud environments. Enforce security best practices in AKS, including network policies, RBAC (Role-BasedAccessControl), and integration with Azure Active Directory Core Services Azure core services such as Azure Storage, including Blob, Azure VMs, Azure LB, Azure ASG, Azure More ❯
management, access governance, and policy enforcement across global regions. Support enterprise applications onboarding into Azure Entra ID, including SSO, conditional access, and role-basedaccesscontrol (RBAC). Enhance privileged access management and implement scalable monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. More ❯
management, access governance, and policy enforcement across global regions. Support enterprise applications onboarding into Azure Entra ID, including SSO, conditional access, and role-basedaccesscontrol (RBAC). Enhance privileged access management and implement scalable monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. More ❯
GitHub Actions, or similar tooling. Monitor and optimize the performance, availability, and cost-efficiency of Azure services. Implement best practices in security, identity, and compliance (e.g., Azure Policy, RBAC, Azure Security Center). Collaborate with application developers and DevOps teams to provide infrastructure support and guidance. Build and maintain automation tools for deployments, backups, patching, and monitoring. Troubleshoot More ❯
Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). • Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. • System More ❯
London, England, United Kingdom Hybrid / WFH Options
Axis Capital
and data security. Troubleshoot and resolve data pipeline issues while ensuring data integrity and quality. Implement and enforce data security best practices, including role-basedaccesscontrol (RBAC), encryption, and compliance with industry standards. Collaborate with data scientists, analysts, and business stakeholders to deliver high-quality data solutions. Monitor and optimize … code (IaC). Solid understanding of platform administration, including monitoring, logging, and cost management. Knowledge of data security, compliance, and governance in Azure, including Azure Active Directory (AAD), RBAC, and encryption. Experience working with big data technologies (Spark, Python, Scala, SQL). Strong problem-solving and troubleshooting skills. Excellent communication skills with the ability to collaborate with cross-functional More ❯
and data security. Troubleshoot and resolve data pipeline issues while ensuring data integrity and quality. Implement and enforce data security best practices, including role-basedaccesscontrol (RBAC), encryption, and compliance with industry standards. Collaborate with data scientists, analysts, and business stakeholders to deliver high-quality data solutions. Monitor and optimize … code (IaC). Solid understanding of platform administration, including monitoring, logging, and cost management. Knowledge of data security, compliance, and governance in Azure, including Azure Active Directory (AAD), RBAC, and encryption. Experience working with big data technologies (Spark, Python, Scala, SQL). Strong problem-solving and troubleshooting skills. Excellent communication skills with the ability to collaborate with cross-functional More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
HanseVision GmbH
logging tools such as Azure Monitor, Log Analytics, and Application Insights. Knowledge of identity and access management, role-basedaccess controls (RBAC), and security best practices in Azure. Strong problem-solving skills and the ability to troubleshoot complex issues. Knowledge of 3rd party tools and how they operate to achieve successful More ❯
Azure preferred , but AWS/GCP experience is also valued. Exposure to Kubernetes , Docker, and container orchestration in production. Knowledge of networking and security (firewalls, load balancers, identity, RBAC, IAM). Agile experience and strong cross-team collaboration skills. Clear communication and a proactive, solutions-focused mindset. Migrating workloads from on-premises to cloud environments. Understanding of cloud securityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Hastings Direct
security. Deep knowledge of Azure services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-basedaccesscontrol (RBAC), and identity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). More ❯
systems such as Active Directory, Azure AD/Entra ID, CyberArk, Okta, SailPoint or similar platforms. Hands-on experience with provisioning, access controls, role-basedaccesscontrol (RBAC), and authentication protocols (e.g., SAML, OAuth, LDAP, OIDC, SCIM) Hands-on experience with coding and scripting automation experience (e.g., PowerShell, Python, or other More ❯
ensure seamless integration of applications, including SQL integration, into Azure environments. Apply security best practices, including configuring Azure Security Center policies, managing role-basedaccesscontrol (RBAC), and ensuring compliance with DoD standards. Assist in the automation of operational tasks using Infrastructure-as-Code tools like Terraform or Bicep. Participate More ❯
ensure seamless integration of applications, including SQL integration, into Azure environments. Apply security best practices, including configuring Azure Security Center policies, managing role-basedaccesscontrol (RBAC), and ensuring compliance with DoD standards. Assist in the automation of operational tasks using Infrastructure-as-Code tools like Terraform or Bicep. Participate More ❯
Azure services such as Azure Monitor, Log Analytics, and Security Center . Expertise in database backup, recovery, and disaster recovery planning. Experience implementing security best practices, including RBAC, encryption, and auditing . Strong understanding of performance tuning techniques , including indexing strategies and query optimization. Familiarity with PowerShell scripting and Infrastructure as Code (IaC) tools such as Terraform or More ❯
Azure Kubernetes Service (AKS) Azure SQL/PostgreSQL Azure Blob Storage Azure Service Bus/Event Grid Azure Key Vault and Azure Monitor Azure AD (B2B/B2C) for RBAC and authentication API & Integration Strategy: Define an API-first architecture (RESTful/JSON) for: Data submission from manufacturers Data consumption by NHS Trust systems and procurement tools Integration with MHRA More ❯
alignment of IAG solutions with business objectives, security policies, and regulatory requirements. Solution Development: Lead the development and deployment of IAG solutions, including role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC), and privilege management. Design workflows for user provisioning, de-provisioning, access requests More ❯
data-driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … SCPs). Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., “*” or wildcard actions), and recommending fine-grained least-privilege models. Azure Active Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity … Account Keys, and Organization-level policies. Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organization/Folder/Project-level least-privilege structures. Kubernetes RBAC & Cloud-Native Identities Solid grasp of Kubernetes RBAC entities—Role, Cluster Role, Role Binding, ClusterRoleBinding—and how they map to Kubernetes More ❯
system scalability and performance. Ensure cloud security and compliance with best practices using Azure Security features such as NSGs, Azure Firewall, and Role-BasedAccessControl (RBAC). Support and manage Azure Virtual Desktop (AVD) environments. Oversee general Windows Server management, including Active Directory, DNS, and Group Policy. Perform troubleshooting … system scalability and performance. Ensure cloud security and compliance with best practices using Azure Security features such as NSGs, Azure Firewall, and Role-BasedAccessControl (RBAC). Support and manage Azure Virtual Desktop (AVD) environments. Oversee general Windows Server management, including Active Directory, DNS, and Group Policy. Perform troubleshooting More ❯
London, England, United Kingdom Hybrid / WFH Options
Degreed Inc
SAML, webhooks, and bulk or streaming ETL tools (MuleSoft, Boomi, SnapLogic, Azure Data Factory) and integrations with data warehouses or BI tools. Security architecture covering encryption, IAM, SSO, RBAC, data‐privacy, and auditing. Stellar communication skills—capable of translating between executive, functional, and technical stakeholders; comfortable presenting to CXO and architecture review boards. Strong organizational skills, attention to detail More ❯
ID, Entra B2C, and other identity platforms. Lead integration efforts across SAP, Workday, SaaS applications, and custom-built platforms. Define IAM governance models, including role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC), and just-in-time (JIT) access. Support the adoption of zero-trust identity More ❯
data-driven mindset for analyzing IAM logs and evaluating risk. -On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally … SCPs). Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., “*” or wildcard actions), and recommending fine-grained least-privilege models. Azure Active Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity … Account Keys, and Organization-level policies. Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organization/Folder/Project-level least-privilege structures. Kubernetes RBAC & Cloud-Native Identities Solid grasp of Kubernetes RBAC entities—Role, Cluster Role, Role Binding, ClusterRoleBinding—and how they map to Kubernetes More ❯
not essential Knowledge with Azure native patching and servicing mechanisms such as Azure Update Management Good understanding of Active Directory and Entra ID Identity & Access Management concepts including RBAC and PIM Understand methods available to monitor, control and report on Azure costs Experience and knowledge with AWS beneficial At Sword, our core values and culture are basedMore ❯