is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
is secure by design and properly validates inputs. Verify access permissions and role-basedaccess controls (RBAC) to ensure proper authorisation and authentication mechanisms. Perform feature testing to ensure new features and updates meet requirements and function as intended. Collaborate with development More ❯
HVE ecosystem (e.g., HPe). Competence in BAU infrastructure management, alerting and notification configuration, and dashboards/reporting configuration Role-BasedAccessControl expertise. This role is ideal for a highly skilled professional eager to make an impact in More ❯
HVE ecosystem (e.g., HPe). Competence in BAU infrastructure management, alerting and notification configuration, and dashboards/reporting configuration Role-BasedAccessControl expertise. This role is ideal for a highly skilled professional eager to make an impact in More ❯
HVE ecosystem (e.g., HPe). Competence in BAU infrastructure management, alerting and notification configuration, and dashboards/reporting configuration Role-BasedAccessControl expertise. This role is ideal for a highly skilled professional eager to make an impact in More ❯
london (croydon), south east england, United Kingdom
Church International Limited
HVE ecosystem (e.g., HPe). Competence in BAU infrastructure management, alerting and notification configuration, and dashboards/reporting configuration Role-BasedAccessControl expertise. This role is ideal for a highly skilled professional eager to make an impact in More ❯
familiar with multi-instance, multi-server environments. Strong knowledge of Sprinklr Modern Care's administrative features, including user management, role-basedaccesscontrol, and customization. Ability to manage implementation projects, including project planning, timeline management, and resource allocation. Ability to analyze business More ❯
At least two years of hands-on production experience on Linux, OpenShift Good knowledge on Linux, Kubernetes and OpenShift Rolebasedaccesscontrol in relation to OpenShift roles and SCC's Good troubleshooting skills on OpenShift and Kubernetes Good troubleshooting skills in More ❯
large-scale tech programmes. Strong knowledge of vendor management, contract governance, and third-party controls. Familiarity with ERP Platforms Understanding of access controls (RBAC), licence and identity management. Financial governance experience including Azure cost optimisation and reporting. Solid knowledge of GDPR and global data protection standards. Experience working in More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-basedaccesscontrol (RBAC), and identity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g. More ❯
Log Analytics, and Application Insights . Improve security and compliance using Azure Security Center, Key Vault, and role-basedaccesscontrol (RBAC) . Troubleshoot and resolve issues in CI/CD pipelines, deployments, and infrastructure. Collaborate with developers, cloud engineers More ❯
Norwich, Norfolk, United Kingdom Hybrid / WFH Options
Hamilton Barnes
of backup, restore, and disaster recovery strategies using PostgreSQL-native tools. Familiarity with database security best practices, including role-basedaccesscontrol and encryption. Excellent problem-solving and analytical abilities to diagnose and resolve performance and reliability issues. Strong communication skills More ❯
required. Ensure access and data security compliance across all databases, administering user accounts and user access (role-basedaccesscontrol). Install and configure database servers, establish database instance(s) in a private cloud environment. Proactively monitor system health More ❯
and other specific services on Kubernetes) CircleCI DataDog Auth0 (we use it, but we would rather not have to) RoleBasedAccessControl JsonSchema Pusher (we use it to push notifications to our Frontend Web App) LocalStack (we use it to mock More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Barclays
with OpenShift or Kubernetes, or other container platforms. Guide teams through the adoption of secure, scalable, and maintainable technology practices with a focus on RBAC, ABAC, and ReBAC models. Utilise SQL and data processing techniques to inform technical decisions and feature design. Key Skills: Strong technical background in Java, with More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Pest Control South Africa
RHEL 7, 8, and 9 VMware vSphere proficiency In-depth knowledge of Red Hat Satellite, Hybrid Cloud Console, and Insights Delinea Centrify AD/RBAC for Linux Advanced troubleshooting skills using tools like strace, tcpdump, iostat, mpstat General SQL/RDBMS skills LAMP stack experience Scripting proficiency in BASH, Python More ❯
to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-BasedAccessControl), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber … testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government More ❯
service communication. Configuring identity-aware proxy (IAP) services and secure APIs with authentication and authorization layers. Developing policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC) + Just-in-Time (JIT) access. Automating IAM More ❯
service communication. Configuring identity-aware proxy (IAP) services and secure APIs with authentication and authorization layers. Developing policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC) + Just-in-Time (JIT) access. Automating IAM More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Duel
GCP, or Azure). Awareness of security best practices in application and infrastructure security. Some exposure to IAM, role-basedaccesscontrol, and identity management principles. Some experience working with penetration testing findings and basic security audits. In-person and More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
user roles to ensure appropriate access levels and security settings. Define role-basedaccess controls (RBAC) to enforce segregation of duties (SoD) and prevent unauthorised access to sensitive data/transactions, and maintain role hierarchies within NetSuite More ❯
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness of IAM regulatory requirements and risk-based frameworks. Consultancy Background is highly favourable More ❯