Brighton, England, United Kingdom Hybrid / WFH Options
Anson McCade
focus on designing and implementing secure, scalable technologies that protect the firm’s systems and data. The firm is currently undertaking an Azure migration and is also working towards ZeroTrust, so there is plenty of opportunity to be involved in both project work and BAU. The role will see you working on secure network architectures—including firewalls … VPNs, and zerotrust models—across endpoints, data centres, and cloud environments. Candidates should bring hands-on experience in infrastructure and network security engineering. Experience with tools like Palo Alto firewalls, Cisco Meraki and micro segmentation platforms, is preferred. Knowledge of PowerShell, Python, or similar scripting languages is desirable, but not essential. This is a hybrid position based … focus on designing and implementing secure, scalable technologies that protect the firm’s systems and data. The firm is currently undertaking an Azure migration and is also working towards ZeroTrust, so there is plenty of opportunity to be involved in both project work and BAU. The role will see you working on secure network architectures—including firewalls More ❯
of security frameworks within a Microsoft-centric environment. The ideal candidate will have extensive hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and ZeroTrust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. … Experience with Layer 7 firewalls, VPNs, SD-WAN, and Virtual Desktop Infrastructure (VDI) is a plus. Your key responsibilities will include: 1. Microsoft Security & Identity Management Design and implement ZeroTrust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). Optimize Microsoft More ❯
Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement ZeroTrust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security … services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with ZeroTrust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies and integrating security into CI/CD pipelines. Hands-on experience with More ❯
Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement ZeroTrust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security … services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with ZeroTrust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies and integrating security into CI/CD pipelines. Hands-on experience with More ❯
Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement ZeroTrust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security … services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with ZeroTrust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies and integrating security into CI/CD pipelines. Hands-on experience with More ❯
Professional Architect (Mandatory) and Google Cloud Professional Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement ZeroTrust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security … services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with ZeroTrust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies and integrating security into CI/CD pipelines. Hands-on experience with More ❯
London, England, United Kingdom Hybrid / WFH Options
Mozn
implement, and manage robust IAM policies, ensuring least privilege access and secure identity federation across cloud environments. Network Security: Develop and enforce network security controls, including firewalls, VPNs, and zero-trust principles, to safeguard cloud environments. Collaboration with Cybersecurity: Work closely with the Cybersecurity team to identify risks, define security requirements, and ensure alignment across departments. Incident Response … serverless computing models and microservices. Benefits We think you'll enjoy working at Mozn. Here's why: We selectively choose to undertake projects with impact; our users and clients trust us to solve mission-critical problems We move quickly, but carefully and confidently. Iterations happen on the scale of days to weeks, and we invest considerable effort in minimizing More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
HanseVision GmbH
processes Collaborate with cross-functional BSST teams to architect secure, reliable, and scalable solutions. Deploy hybrid identity solutions, such as Active Directory, Entra ID, SSO, and MFA integrations. Design ZeroTrust architectures solutions to align with and implement least-privilege access models. Integration of security technologies, including SIEM, DLP (Data Loss Prevention), MFA, and identity and access management More ❯
Highly technical full-stack competency in globally distributed system. Knowledge of Cyber-Security. Knowledge of Active Directory and Entra ID. Windows and Linux Servers Architecture. Knowledge and experience of ZeroTrust Architecture Solution. Knowledge of End Point Technologies. Knowledge of Backup Solutions. Code re-use and documentation. Azure knowledge is a Plus. GitHub Actions, GitLab CI/CD … Networking Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). ZeroTrust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and efficient software delivery. Expertise More ❯
Highly technical full-stack competency in globally distributed system. Knowledge of Cyber-Security. Knowledge of Active Directory and Entra ID. Windows and Linux Servers Architecture. Knowledge and experience of ZeroTrust Architecture Solution. Knowledge of End Point Technologies. Knowledge of Backup Solutions. Code re-use and documentation. Azure knowledge is a Plus. GitHub Actions, GitLab CI/CD … Networking Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). ZeroTrust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and efficient software delivery. Expertise More ❯
extend beyond our walls, inspiring a culture of excellence and resilience in cybersecurity throughout the public sector. Strategic Direction Setting: Define and steer enterprise security strategies, ensuring alignment with ZeroTrust principles and architectural standards. Technology Leadership: Lead the creation and implementation of security and architectural principles, technology strategies, and tooling plans, addressing business risks and supporting policy … OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in More ❯
extend beyond our walls, inspiring a culture of excellence and resilience in cybersecurity throughout the public sector. Strategic Direction Setting: Define and steer enterprise security strategies, ensuring alignment with ZeroTrust principles and architectural standards. Technology Leadership: Lead the creation and implementation of security and architectural principles, technology strategies, and tooling plans, addressing business risks and supporting policy … OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
extend beyond our walls, inspiring a culture of excellence and resilience in cybersecurity throughout the public sector. Strategic Direction Setting: Define and steer enterprise security strategies, ensuring alignment with ZeroTrust principles and architectural standards. Technology Leadership: Lead the creation and implementation of security and architectural principles, technology strategies, and tooling plans, addressing business risks and supporting policy … OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat modelling, and containerization security. Data Security: Skilled in More ❯
Patch and secure endpoints (Windows/macOS), and mobile devices via Microsoft Intune, Jamf, or Meraki. Implement and support endpoint and network-level security controls: FortiGate, Cisco Meraki, and ZeroTrust Network Access (ZTNA) principles. Provide technical documentation, runbooks, and SOPs for security operations and system configurations. Skills Required Previous experience in a technical IT security, cloud engineering More ❯
of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and More ❯
Engineer Associate, CISSP, OSCP (Offensive Security Certified Professional), CCSP, or equivalent. Experience with container security (Docker, Kubernetes). Knowledge of NIST, ISO 27001, SOC 2 compliance frameworks. Familiarity with ZeroTrust security principles. Other Stuff NB: Please only apply if you are able to work from their Debden (IG10) offices Monday-Friday. Hybrid or remote working is not More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Engineer Associate, CISSP, OSCP (Offensive Security Certified Professional), CCSP, or equivalent. Experience with container security (Docker, Kubernetes). Knowledge of NIST, ISO 27001, SOC 2 compliance frameworks. Familiarity with ZeroTrust security principles. Other Stuff NB: Please only apply if you are able to work from their Debden (IG10) offices Monday-Friday. Hybrid or remote working is not More ❯
Engineer Associate, CISSP, OSCP (Offensive Security Certified Professional), CCSP, or equivalent. Experience with container security (Docker, Kubernetes). Knowledge of NIST, ISO 27001, SOC 2 compliance frameworks. Familiarity with ZeroTrust security principles. Other Stuff NB: Please only apply if you are able to work from their Debden (IG10) offices Monday-Friday. Hybrid or remote working is not More ❯
Architect to design secure, scalable, and resilient network architectures across the enterprise. The ideal candidate will possess deep knowledge of : Traditional network infrastructure - LAN; WAN; WIFI etc Cybersecurity including ZeroTrust Architecture Cloud Security Architecture Be capable of aligning security controls with business objectives and compliance requirements. Key Responsibilities: Lead the design and implementation of secure network architectures … policies aligned with industry best practices (e.g., NIST, ISO 27001, CIS). Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), network segmentation, and zerotrust network access (ZTNA). Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications. Lead architectural reviews and assurance of designs working … Proven experience as a Network Security Architect or in a senior network security engineering role. Experience with Cisco LAN; WAN technologies Experience with Zscaler or equivalent to drive toward ZeroTrust In-depth knowledge of network protocols, routing, switching, DNS, DHCP, and encryption standards. Strong hands-on experience with network security solutions such as firewalls (e.g., Palo Alto More ❯
delight millions of TV streamers around the world while gaining meaningful experience across a variety of disciplines. Roku is seeking a senior level Identity Engineer to help enhance its ZeroTrust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identity and access management (IAM), securing … . Enhance privileged access management and implement scalable monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. Design, implement, and continuously improve Roku's ZeroTrust Architecture, aligning with NIST SP 800-207 and SP 1800-35 guidance. Collaborate with IT, Networking, and Security teams to troubleshoot identity-related issues and support global … Azure services (Function Apps, Logic Apps, Automation Accounts, Resource Groups, etc.) Experience with AWS; GCP is a plus Solid understanding of SaaS platforms and their identity integration Understanding of ZeroTrust Architecture principles Familiarity with IT security frameworks and compliance standards (e.g., NIST, GDPR, SOC 2, PCI DSS, HIPAA) Awareness of logging, monitoring, and alerting practices related to More ❯
delight millions of TV streamers around the world while gaining meaningful experience across a variety of disciplines. Roku is seeking a senior level Identity Engineer to help enhance its ZeroTrust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identity and access management (IAM), securing … . Enhance privileged access management and implement scalable monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. Design, implement, and continuously improve Roku’s ZeroTrust Architecture, aligning with NIST SP 800-207 and SP 1800-35 guidance. Collaborate with IT, Networking, and Security teams to troubleshoot identity-related issues and support global … Azure services (Function Apps, Logic Apps, Automation Accounts, Resource Groups, etc.) Experience with AWS; GCP is a plus Solid understanding of SaaS platforms and their identity integration Understanding of ZeroTrust Architecture principles Familiarity with IT security frameworks and compliance standards (e.g., NIST, GDPR, SOC 2, PCI DSS, HIPAA) Awareness of logging, monitoring, and alerting practices related to More ❯
ensuring seamless and secure access for employees, customers, and partners. We are building a modern IAM framework that integrates across Entra ID, Entra B2C, SAP, and Workday, aligning with zero-trust principles, automation, and regulatory compliance. Role Overview The IAM Architect will lead the design, implementation, and optimization of enterprise identity and access solutions, ensuring seamless integration across … and custom-built platforms. Define IAM governance models, including role-based access control (RBAC), attribute-based access control (ABAC), and just-in-time (JIT) access. Support the adoption of zero-trust identity principles, including MFA, conditional access, and passwordless authentication. Identity Lifecycle & Automation Architect identity lifecycle management solutions, automating provisioning/deprovisioning across HR, IT, and security systems. … other enterprise applications. Deep knowledge of SAML, OAuth, OpenID Connect, SCIM, and federation protocols. Hands-on experience with identity automation, PowerShell scripting, and API-based integrations. Strong understanding of zero-trust architecture, privileged access management (PAM), and adaptive authentication. Ability to collaborate with IT, HR, DevOps, and security teams to align identity solutions with business needs. Preferred Qualifications More ❯
enterprise network technologies, alongside a strong foundation in network security fundamentals. In this role, you will collaborate closely with Security, IT, and Engineering teams to align automation workflows with ZeroTrust principles, enforce role-based access controls, and implement security best practices across network infrastructure. If you excel in cross-functional settings and have a proven track record … internal tools and dashboards to streamline network operations, optimize network workflows, and provide real-time visibility into network performance. Collaborate with security teams to align IT automation initiatives with ZeroTrust principles and compliance frameworks. Implement role-based access controls (RBAC) and mitigate security risks through automated policies. Work cross-functionally to identify areas for IT service improvement More ❯
the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and More ❯