London, England, United Kingdom Hybrid / WFH Options
Kadence Limited
Terraform, CloudFormation, or similar tools. A solid grasp of system observability, monitoring, and alerting practices (CloudWatch, Grafana, or equivalent). Exposure to platform security principles including identity/access management, secrets handling, and environment isolation. Strong scripting and automation skills (e.g. Bash, Groovy, Python, Rust, Node.js, PHP). Comfortable partnering with engineers to improve workflows and resolve cross More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Monument Technology
Proven experience of managing and securing AWS cloud environments with configuration of key services like AWS WAF, CloudWatch, CloudTrail, Kubernetes, GuardDuty, X-Ray, Control Tower, Security Hub, Shield, Cognito, Secrets Manager, Key Management Service; Experience with corresponding services from other cloud providers is highly desirable Experience with DevSecOps tooling to setup CI/CD pipelines including Jenkins , GitHub More ❯
Proven experience of managing and securing AWS cloud environments with configuration of key services like AWS WAF, CloudWatch, CloudTrail, Kubernetes, GuardDuty, X-Ray, Control Tower, Security Hub, Shield, Cognito, Secrets Manager, Key Management Service; Experience with corresponding services from other cloud providers is highly desirable Experience with DevSecOps tooling to setup CI/CD pipelines including Jenkins , GitHub More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Revybe IT Recruitment Ltd
of microservices. Implement best practices for container orchestration and monitoring. Manage and secure sensitive information using Key Vault, ensuring proper access control and compliance with security policies. Implement automated secretsmanagement workflows. Design and maintain CI/CD pipelines using GitHub Actions. Automate testing, building, and deployment processes. Integrate with other tools and services for seamless workflows. Develop More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Spire Weather & Climate
infrastructure that we can meet SLA requirements and minimize downtime for customers Tools And Technologies AWS (Kubernetes/EKS and ECS, WAF, NLB, ACM, Network Firewall, API Gateway, ACM, Secrets Manager), Terraform, Argo CD, GitHub and GitHub Actions, Prometheus, Grafana, Alertmanager, Calico, Hashicorp Vault Spire operates a hybrid work model, and this position will require you to work a More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Stealth AI Startup
and progressive roll-outs that make releases routine. Build end-to-end observability (metrics, traces, logs, alerts) so engineers and customers trust system health. Champion security and compliance, including secretsmanagement, zero-trust networking, least-privilege IAM and audit trails ready for GDPR and SOC 2. Partner with AI and product engineers to shape runtime environments and data … with automated tests and security gates. An observability and SRE mindset, using tools such as Prometheus, Grafana, Loki or ELK and OpenTelemetry. A security-first but pragmatic approach, covering secretsmanagement, image provenance and zero-trust networking. Proficiency in at least one systems language (Go, Python or Java) and familiarity with modern event-driven architectures. The ability to More ❯
and progressive roll-outs that make releases routine. Build end-to-end observability (metrics, traces, logs, alerts) so engineers and customers trust system health. Champion security and compliance, including secretsmanagement, zero-trust networking, least-privilege IAM and audit trails ready for GDPR and SOC 2. Partner with AI and product engineers to shape runtime environments and data … with automated tests and security gates. An observability and SRE mindset, using tools such as Prometheus, Grafana, Loki or ELK and OpenTelemetry. A security-first but pragmatic approach, covering secretsmanagement, image provenance and zero-trust networking. Proficiency in at least one systems language (Go, Python or Java) and familiarity with modern event-driven architectures. The ability to More ❯
London, England, United Kingdom Hybrid / WFH Options
Stealth AI Startup
and progressive roll-outs that make releases routine. Build end-to-end observability (metrics, traces, logs, alerts) so engineers and customers trust system health. Champion security and compliance, including secretsmanagement, zero-trust networking, least-privilege IAM and audit trails ready for GDPR and SOC 2. Partner with AI and product engineers to shape runtime environments and data … with automated tests and security gates. An observability and SRE mindset, using tools such as Prometheus, Grafana, Loki or ELK and OpenTelemetry. A security-first but pragmatic approach, covering secretsmanagement, image provenance and zero-trust networking. Proficiency in at least one systems language (Go, Python or Java) and familiarity with modern event-driven architectures. The ability to More ❯
London, England, United Kingdom Hybrid / WFH Options
CME Group
Description Position Description: The IAM Senior Engineer will be responsible for supporting the development and delivery of Privileged Account Management (PAM) solutions for our on-prem and cloud infrastructure. This is a multifaceted role that involves engineering, hands-on support, and advanced troubleshooting responsibilities as well support of project-based work for two leading PAM platforms (Hashicorp and CyberArk … . Position Responsibilities: Assist in the buildout of Hashicorp Vault enterprise in a highly available environment Streamline application onboarding and migration as it relates to secretsmanagement within Hashicorp Vault and CyberArk Work with IT teams across the company to ensure Hashicorp Vault and CyberArk are adopted consistently and effectively Build upon the Hashicorp Vault foundation by adding … training, guidance and mentorship for junior staff Qualifications: Hands-on PAM solution experience, SaaS/Cloud based vendors preferred Proven experience with automation, CI/CD, orchestration, and configuration management Experience with CI/CD tools such as Jenkins Experience with image lifecycle management using tools such as Packer Experience with Infrastructure as Code (IaC) using tools such More ❯
modelling exercises for cloud-native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerability management, and compliance monitoring. Design … demonstrable expertise in designing, implementing, securing, and managing a wide range of AWS security services . Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secretsmanagement, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring, and supporting the … Code (IaC) , particularly Terraform, and implementing relevant security checks. Solid experience with container security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerability management programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex security concepts clearly to technical More ❯
London, England, United Kingdom Hybrid / WFH Options
Funding Circle
modelling exercises for cloud-native applications, microservices, and infrastructure components. Manage internal and external penetration testing engagements for Funding Circle applications, services, and cloud infrastructure. Oversee and enhance vulnerability management processes, focusing on strategic remediation, root cause analysis, and preventative measures. Contribute to drive implementation of security automation across cloud infrastructure configuration, vulnerability management, and compliance monitoring. Design … demonstrable expertise in designing, implementing, securing, and managing a wide range of AWS security services . Proven, hands-on experience architecting, building, and integrating security tooling (SAST, DAST, SCA, secretsmanagement, IAST) and automated security controls within CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Strong track record of defining, implementing, measuring, and supporting the … Code (IaC) , particularly Terraform, and implementing relevant security checks. Solid experience with container security and securing container orchestration platforms (Kubernetes/EKS). Proven ability contributing significantly to vulnerability management programs, including advanced triaging, root cause analysis, risk assessment, and strategic remediation planning. Strong communication and influencing skills, with the ability to articulate complex security concepts clearly to technical More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Rocket Lab
infrastructure that we can meet SLA requirements and minimize downtime for customers Tools and Technologies: AWS (Kubernetes/EKS and ECS, WAF, NLB, ACM, Network Firewall, API Gateway, ACM, Secrets Manager), Terraform, Argo CD, GitHub and GitHub Actions, Prometheus, Grafana, Alertmanager, Calico, Hashicorp Vault Spire operates a hybrid work model, and this position will require you to work a More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Revolent Group
using tools like TeamCity, Jenkins, GitLab CI/CD, Nexus, and Nolio . Administer Linux and Windows infrastructure , including Load Balancers and performance tuning. Apply Git workflows and repository management strategies to enable seamless version control. Leverage your SQL skills to automate data-related processes like data migrations and environment setup. ✅ Preferred (Nice to Have): Banking/Financial Services … knowledge — especially around wholesale lending and Loan IQ . Experience with monitoring and observability tools such as APPD, ELK Stack, or Grafana. Understanding of DevSecOps principles , including vulnerability scanning, secretsmanagement, and compliance automation. Further experience with CI/CD integration and pipeline automation across enterprise tools. 🌟 What’s In It for You: 8–10 weeks of paid More ❯
Basildon, Essex, England, United Kingdom Hybrid / WFH Options
eTech Partners
Bicep or ARM templates Support applications running in Azure App Services, Function Apps and other services Set up monitoring and incident response with Azure Monitor and Application Insights Manage secrets and access control to support secure cloud practices Work closely with developers and stakeholders to deliver scalable, reliable solutions Skills and Experience: 3+ years' experience in a DevOps Cloud … Engineering role Practical experience with Azure DevOps and CI/CD pipeline Working with Agile methodologies and project management tools like JIRA. Proficient in Scripting languages such as PowerShell, Bash or Python Hands-on experience with Docker and containerisation Desirable: Logistics industry experience ERP experience Team leading/mentoring experience My client is looking to recruit URGENTLY, please send More ❯
OpenShift configurations. * Must be comfortable validating platform components and installation scripts. * Experience migrating applications and operators between OpenShift clusters. * Hands-on familiarity with the following operators: o HashiCorp Vault - secretsmanagement o Red Hat Quay - internal container registry o Clair - container image vulnerability scanning o Keycloak - identity and access management o OpenShift Service Mesh (Istio) - microservices communications More ❯
London, England, United Kingdom Hybrid / WFH Options
Ticketmaster
and management. Proficient in scripting languages such as PowerShell, Bash, and Python, with a track record of automating complex workflows and enhancing operational efficiency. Strong working knowledge of configuration management tools like Ansible, Chef, and Octopus, with experience implementing infrastructure-as-code best practices. Experienced in the configuration, administration, and optimization of both Windows and Linux server environments . … and managing virtual environments. Experienced in infrastructure provisioning using Terraform or AWS CloudFormation , applying infrastructure-as-code principles for scalable, repeatable deployments. Hands-on experience with data store and secretsmanagement solutions , including tools like HashiCorp Vault and Consul, ensuring secure and compliant system operations. Strong experience working with and integrating RESTful APIs , enabling efficient system interoperability and More ❯
London, England, United Kingdom Hybrid / WFH Options
Miro
a Cloud native environment and automation Experience designing, implementing and managing security capabilities at scale 5+ years AWS, 3+ years IAC (Terraform) and automation (Python) experience (WAF, IAC, SCPs, SecretsManagement, Kubernetes) 5-8 years of experience within Cloud Security Experience working within SaaS companies Experience with incident handling and on-call What's in it for you More ❯
a Cloud native environment and automation Experience designing, implementing and managing security capabilities at scale 5+ years AWS, 3+ years IAC (Terraform) and automation (Python) experience (WAF, IAC, SCPs, SecretsManagement, Kubernetes) 5-8 years of experience within Cloud Security Experience working within SaaS companies Experience with incident handling and on-call What's in it for you More ❯
London, England, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have – Deep Specialist … Level: AWS Core IT Security Principles: Expert–level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi–account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long–term Strategies for Cloud IT Security Must Have – Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … security implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Cloud IT security strategies Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … security implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Cloud IT security strategies Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
London, West End, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
challenges creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identity and access management solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements: Must Have - Deep Specialist … Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS Identity Management: Advanced expertise in IAM, SSO, and identity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate security processes and systems Container & Kubernetes … implementation Programming Skills: Strong coding abilities for security automation and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI More ❯
infrastructure-as-code (IaC) using tools such as Terraform. Own CI/CD pipelines and DevX workflows in collaboration with the dev teams. Implement and monitor security controls, identity management (Entra ID), and network configurations. Support container orchestration, and workload deployment using Kubernetes and AKS. Improve observability by implementing logging, monitoring, and alerting systems (e.g. Azure Monitor, Datadog, etc. … and Kubernetes (AKS). Prior experience or expertise with these is a plus. Security-first mindset : Deep appreciation for secure-by-default design. Familiar with principles like least privilege, secretsmanagement, threat modeling, and how to embed security controls into infrastructure and CI/CD pipelines. Cross-functional collaboration : Comfortable partnering with other engineers, product managers, sales, marketing More ❯