s core platform and security components. Some of the challenges you will be working on: Design and maintain our core Linux-based platform ecosystem. Develop and manage our PKI, secretsmanagement, and security systems. Contribute to internal platform tooling, automation, and orchestration development. Enhance the developer experience (DX) by delivering self-service systems and pipelines. Play a key … position). Familiar with service discovery and DNS systems at scale. Experienced in containerization and orchestration (Kubernetes is a plus). Comfortable working with KVM virtualization. Skilled in configuration management and large-scale infrastructure. Passionate about automation. You look for ways to optimize workflows and reduce manual effort. Team players who thrive in a distributed team environment. Curious, autonomous More ❯
for infrastructure or API testing (preferred over Robot Framework). Familiarity with Robot Framework if you dont have Pytest for acceptance and regression testing. Exposure to HashiCorp Vault for secrets and credentials management. If the role above matches your skillset and you are immediately available or have a short notice period please send me your CV asap. Referrals: If More ❯
Low-level design and implementation of IAM services for single sign-on, identity governanc eand privilege user/secretsmanagement in AWS (using ServiceNow for governance)AWS IAM - AWS Identity Centre (SSO) - AWS Secrets Manager - Identity and Access Managememt - Active Directory - Customer Identity & Access Management (CiDAM) - API authentication Integration & development - Platform build & deployment - Risked based authentication More ❯
Low-level design and implementation of IAM services for single sign-on, identity governanc eand privilege user/secretsmanagement in AWS (using ServiceNow for governance)AWS IAM - AWS Identity Centre (SSO) - AWS Secrets Manager - Identity and Access Managememt - Active Directory - Customer Identity & Access Management (CiDAM) - API authentication Integration & development - Platform build & deployment - Risked based authentication More ❯
part of the Secure Software Development Lifecycle (SDLC). Stay Ahead of the Curve : Stay current on emerging security standards and technologies, ensuring Precisely leverages the latest advancements. Risk Management : Conduct security assessments, vulnerability management, and risk assessments to identify and mitigate potential threats. Cloud Expertise : Perform security architecture reviews across cloud, hybrid, and multi-cloud platforms (AWS … Cloud-based vulnerability scanning tools like Falcon Spotlight or Amazon Inspector, Container Security, Cloud WAFs, Endpoint Protection such as CrowdStrike Falcon or Microsoft Defender, GitHub, Infrastructure as a code, SecretsManagement Requirements And Qualifications: A bachelor's or master's degree in computer science, information technology, cybersecurity or a related field 8+ years of cloud security experience, focusing More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
lead architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secretsmanagement and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M … sector (e.g., TSO/DSO interface risks, supply chain attacks on inverters) and update architecture roadmaps accordingly SKILLS & COMPETENCIES To be successful in this role, you will demonstrate: Time management & prioritisation skills - things can get a little hectic, so the ability to effectively manage yourself and your workload is critical Excellent interpersonal and communication skills (in English or/ More ❯
lead architect on secure network topologies (IT/OT segmentation, zero-trust, IEC 62443 zones) in partnership with Network & Security Engineers Define IAM, encryption-at-rest/in-transit, secretsmanagement and key-management standards aligned with ISO 27001/27019 and NIS2 Review and select third-party security solutions; lead due diligence with EPC, O&M … sector (e.g., TSO/DSO interface risks, supply chain attacks on inverters) and update architecture roadmaps accordingly SKILLS & COMPETENCIES To be successful in this role, you will demonstrate: Time management & prioritisation skills - things can get a little hectic, so the ability to effectively manage yourself and your workload is critical Excellent interpersonal and communication skills (in English or/ More ❯
information. Accountabilities Provide subject matter expertise on security systems and engineering patterns. Develop and implement protocols, algorithms, and software applications to protect sensitive data and systems. Manage and protect secrets, ensuring they are securely generated, stored, and used. Conduct audits to monitor, identify, and assess vulnerabilities in the bank's infrastructure/software and support responses to security breaches. … Collaborate across the bank, including developers and security teams, to ensure cryptographic solutions align with business objectives, security policies, and regulatory requirements. Develop, implement, and maintain Identity and Access Management solutions and systems. Assistant Vice President Expectations Advise and influence decision making, contribute to policy development, and ensure operational effectiveness. Collaborate with other functions and business divisions. Lead a More ❯
security engineering team of around 15 people, your role will include end-to-end responsibility for projects, tooling, and systems covering EDR, DLP, Secure Web Gateway, Email Security, and Secrets Management. The successful candidate will have considerable hands-on experience in security engineering within a medium-to-large regulated environment. Hybrid working is available (2 days in central London More ❯