Lift Recruitment are working with a leading organisation, based in Edgbaston Birmingham, and they are looking for a ZeroTrust Engineer to join their existing team. This is on an initial 6 month contract but can be extended. Day to day duties: You will design and implement ZeroTrust architecture components, focusing on NAC You will deploy NAC policies across wired and wireless networks You will define and enforce rules based on identity, device type and compliance You will collaborate with security and infrastructure teams for policy development You will monitor and optimise NAC configurations using … analytics and logs Essential Skills and Experience: You must have experience in implementing ZeroTrust or identity driven access models You must have an understanding of segmentation, endpoint compliance and enforcement You must have knowledge of secure network architectures at scale You must be familiar with Radius, 802.1X More ❯
across all aspects of our IT operations. This role demands a proactive and adaptable individual with a strong understanding of modern security principles, including zero-trust architecture. You will be responsible for managing device distribution, MDM, Google Workspace, SSO, cloud environments, and GitHub access, ensuring seamless and secure … operations for our geographically dispersed team. Responsibilities: Security Infrastructure Development: Design, implement, and maintain a secure IT infrastructure, adhering to ZeroTrust principles. Develop and enforce security policies and procedures for all IT systems and devices, taking into account diverse regional regulations and network conditions. Conduct regular security … of principles such as least privilege and separation of duty. Implement and maintain Single Sign-On (SSO) and multi-factor authentication (MFA). Implement zerotrust secure access from any location. Security Tooling & Integration: Evaluate, select, and onboard security solutions (e.g., endpoint protection, SIEM, vulnerability scanners). Integrate More ❯
define and execute enterprise-wide cyber security strategies. Develop investment cases and board-level reporting aligned with business priorities. Advise on complex transformations including ZeroTrust, SOC modernisation, cloud security, and regulatory compliance. Translate emerging threats and technology trends into actionable strategies. Guide clients through compliance with DORA … XDR, SASE, and SOAR. Practice Development Mentor consultants and support career development in advisory, architecture, and compliance domains. Produce thought leadership on topics like ZeroTrust, cloud security, and regulatory changes. Contribute to go-to-market activities including webinars, events, and publications. Build internal capabilities through methodologies, training … and delivery standards. Technical Focus Areas Secure architecture across Azure, AWS, and GCP ZeroTrust frameworks and identity management Cloud posture management and threat protection Security automation and DevSecOps integration Security Operations SOC transformation and cloud-native security ops Threat detection with XDR, NDR, and SOAR platforms Incident More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
authentication, multi-factor authentication (MFA), and Privileged Access Management (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with ZeroTrust security principles and industry standards. Regularly review strategies to address emerging cybersecurity threats. Agile Delivery Lead Agile delivery practices, ensuring timely and … align cross-functional teams. Compliance and Security Ensure identity and access management processes align with regulations like GDPR and ISO 27001. Implement frameworks like ZeroTrust and industry standards. Work closely with the security team to proactively address vulnerabilities in identity systems. What you should bring to the … and solutions. Essential Technical Skills & Qualifications Strong understanding of IAM principles and technologies. Managing Active Directory and Azure AD in enterprise environments. Familiarity with ZeroTrust and modern security principles. Business justifications, understanding costs vs. risks and benefits for security-related projects. Awareness of industry trends and the More ❯
and pipeline trends to shape strategy. Customer Engagement & Advocacy Build and nurture strong relationships with key customers, ensuring a high level of customer satisfaction, trust, and long-term partnerships. Ensure alignment between Absolute's cybersecurity solutions and mission priorities, helping agencies achieve ZeroTrust, endpoint resilience, efficiencies … Reading - UK and Ho Chi Minh City - Vietnam, Absolute Security accelerates customers' shift to work-from-anywhere through the industry's first self-healing ZeroTrust platform, ensuring maximum security and uncompromised productivity. Only Absolute is embedded in more than half a billion devices, offering a permanent digital … customers with more than 13 million activated endpoints globally. G2 recognized Absolute as a Leader in the Winter 2022 Endpoint Management and ZeroTrust Networking Grid Reports, reflecting our continued customer satisfaction across product lines. To learn more about Absolute, visit our website at or visit our YouTube More ❯
Cloudflare & ZTNA Specialist– (Contract) Location: Remote Type: Contract (OUTSDIE IR35) I'm looking for a hands-on Cloudflare specialist to lead the implementation of ZeroTrust Network Access (ZTNA) and Cloudflare Gateway for a non-UK-based client operating in a secure, cloud-native environment. This is a … material toward the end of delivery Required Skills & Experience Strong hands-on experience with Cloudflare Enterprise features, especially ZTNA and Gateway Proven experience implementing ZeroTrust access policies in cloud environments Experience integrating Cloudflare with Azure AD/Entra ID and SIEM tools Understanding of secure cloud networking … principles and ZeroTrust architecture Experience in multi-cloud environments (Azure required) If this role sounds like it could be right for you, then please apply now More ❯
Operations and Enterprise Security and plays a key part in building a scalable and secure identity infrastructure, with a strong emphasis on SailPoint and zerotrust principles. Your Impact: Design, implement, and manage identity lifecycle and access governance processes to support a secure and scalable IAM capability across … Collaborate with HR, IT, and engineering to integrate IAM into core employee systems and ensure accurate, policy-driven access throughout the user lifecycle. Apply zerotrust principles to enforce least privilege and implement just-in-time access across privileged roles. Support and enhance access control policies, RBAC models … such as SAML, OAuth, SCIM, and LDAP. Experience working with role-based access control (RBAC) models and automating provisioning/deprovisioning processes. Exposure to zerotrust architecture and JIT access models. Knowledge of software development practices, SDLC, and Agile methodologies. Excellent interpersonal and communication skills, with the ability More ❯
driving a full-scale transformation of our client's digital security environment, turning up the heat on legacy systems, and building a next-gen, ZeroTrust security architecture that scales with their brand. Key Responsibilities Lead and coordinate a comprehensive security improvement programme spanning multiple workstreams Manage and … continuity Leading the retirement of Active Directory, guiding the shift to modern, cloud-native identity infrastructure Remediation of penetration testing findings Transition to a zero-trust network architecture Network segmentation and decommissioning of MPLS infrastructure Optimization of Okta implementation—streamlining access, enforcing MFA, and reducing risk Design and … facilitation skills with experience leading cross-functional planning sessions Experience managing programmes in multi-site environments, preferably in the hospitality industry Deep understanding of ZeroTrust, IAM, endpoint management, and network segmentation Strong understanding of infrastructure security, risk management, and compliance requirements Practical knowledge of key security domains More ❯
driving a full-scale transformation of our client's digital security environment, turning up the heat on legacy systems, and building a next-gen, ZeroTrust security architecture that scales with their brand. Key Responsibilities Lead and coordinate a comprehensive security improvement programme spanning multiple workstreams Manage and … continuity Leading the retirement of Active Directory, guiding the shift to modern, cloud-native identity infrastructure Remediation of penetration testing findings Transition to a zero-trust network architecture Network segmentation and decommissioning of MPLS infrastructure Optimization of Okta implementation—streamlining access, enforcing MFA, and reducing risk Design and … facilitation skills with experience leading cross-functional planning sessions Experience managing programmes in multi-site environments, preferably in the hospitality industry Deep understanding of ZeroTrust, IAM, endpoint management, and network segmentation Strong understanding of infrastructure security, risk management, and compliance requirements Practical knowledge of key security domains More ❯
is transforming cybersecurity for people and organisations around the world. Keeper's affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our award-winning, zero-trust, privileged access management More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
Microsoft-centric environment. The ideal candidate will have extensive hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and ZeroTrust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure … VPNs, SD-WAN, and Virtual Desktop Infrastructure (VDI) is a plus. Your key responsibilities will include: 1. Microsoft Security & Identity Management Design and implement ZeroTrust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and Privileged Access More ❯
on and connecting to the BRG Network to ensure the security of BRG's employees for both on-prem and cloud services through a ZeroTrust approach. This role will be responsible for building and managing Cloud and Firewall security policies and securing access to BRG resources worldwide. … expertise with Microsoft security platforms including Azure AD Conditional Access, Microsoft Defender for Endpoint/Cloud, Microsoft Sentinel, and Microsoft Purview. Strong understanding of ZeroTrust principles and cloud security best practices across hybrid environments. Hands-on experience designing, implementing, and supporting network architectures in both traditional on More ❯
on and connecting to the BRG Network to ensure the security of BRG's employees for both on-prem and cloud services through a ZeroTrust approach. This role will be responsible for building and managing Cloud and Firewall security policies and securing access to BRG resources worldwide. … expertise with Microsoft security platforms including Azure AD Conditional Access, Microsoft Defender for Endpoint/Cloud, Microsoft Sentinel, and Microsoft Purview. Strong understanding of ZeroTrust principles and cloud security best practices across hybrid environments. Hands-on experience designing, implementing, and supporting network architectures in both traditional on More ❯
in globally distributed system. Knowledge of Cyber-Security. Knowledge of Active Directory and Entra ID. Windows and Linux Servers Architecture. Knowledge and experience of ZeroTrust Architecture Solution. Knowledge of End Point Technologies. Knowledge of Backup Solutions. Code re-use and documentation. Azure knowledge is a Plus. GitHub …/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). ZeroTrust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Argo DevOps Solutions Ltd
sector, supporting delivery of quality products at speed. We solve complicated software and hardware problems using Agile approaches. Our specialisms include moving data between trust boundaries, designing secure data ingress and egress systems. Argo has substantial experience in mentoring our customers through their Agile journey. If this sounds like … Salary Sacrifice Schemes including Electric Vehicles Salary dependent on experience Other financial incentives Job Description Responsible for designing and developing infrastructure systems that leverage zerotrust architectures and infrastructure-as-code methodologies. This role focuses on robust, scalable, and secure solutions that align with stakeholder requirements. The position … Foster a culture of continuous improvement, where knowledge sharing and experimentation are encouraged. Security & Risk Management Work with security and policy stakeholders to ensure zerotrust architectures and risk management practices are integrated throughout the development process. Align solutions with security best practices and relevant compliance standards. Architecture More ❯
and secure, scalable solutions. As we continue to evolve, cybersecurity is at the core of our strategy, ensuring the protection of critical data, customer trust, and regulatory compliance. Strada is in the midst of a major transformation, separating from our previous parent company and building a security-first culture … firewalls, IAM, and vulnerability management platforms. Collaborate with infrastructure and DevOps teams to embed security into CI/CD pipelines. Lead the deployment of zero-trust architectures, security automation, and monitoring solutions. Support security incident detection, investigation, and response alongside the SOC and Red Team. Threat & Vulnerability Management … Terraform, Ansible). Deep understanding of vulnerability management, penetration testing, and security hardening. Knowledge of SOC processes, incident response, and forensics. Strong grasp of zero-trust architectures, identity security, and secure DevOps practices. Ability to work cross-functionally with IT, DevOps, compliance, and engineering teams. Preferred Qualifications Certifications More ❯
WAFs, firewalls, IAM, and vulnerability management platforms. Work with infrastructure and DevOps teams to integrate security into CI/CD pipelines. Lead deployment of zero-trust architectures, security automation, and monitoring solutions. Support security incident detection, investigation, and response with SOC and Red Team. Threat & Vulnerability Management Conduct … Terraform, Ansible). Deep understanding of vulnerability management, penetration testing, and security hardening. Knowledge of SOC processes, incident response, and forensics. Strong grasp of zero-trust architectures, identity security, and secure DevOps practices. Ability to work collaboratively across IT, DevOps, compliance, and engineering teams. Preferred Qualifications Certifications such More ❯
with automated security controls. * Ensure adherence to ISO 27001, NIST, SOC 2, GDPR, and cloud security best practices. * Collaborate with cybersecurity teams to integrate zero-trust security models. * Drive resiliency planning, disaster recovery, and business continuity initiatives. Financial & Vendor Management: * Optimize IT operational budgets with a cost-effective … end automation, Infrastructure as Code (IaC), and large-scale observability. * Experience in AI-driven IT operations, predictive analytics, and automated remediation. * Strong understanding of zero-trust security, regulatory compliance, and risk management. * Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications: * Certifications: ITIL, AWS/Azure/GCP More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Ellison Institute of Technology
of Oxford and become the new home for Ellison Scholars. EIT Oxford is committed to cultivating a community where excellence is achieved through collaboration, trust, innovation and tenacity. We foster an environment where everyone's experience and expertise are valued. We are curious and resilient in our efforts to … research activities. Security & Compliance Enforce cybersecurity best practices, ensuring compliance with industry regulations and organisational security policies. Implement firewall, VPN, IDS/IPS, and zero-trust network security frameworks. Collaborate with the IT security team to proactively identify and mitigate threats. Lead incident response and troubleshooting efforts for … with the ability to manage technical teams and large-scale projects. Deep understanding of network security principles, including firewalls, VPNs, IDS/IPS, and zero-trust security. Hands-on experience with industry leading, enterprise scale network equipment and solutions Experience designing and managing SD-WAN, MPLS, and software More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
deep understanding and experience of HMG, NCSC, and international cyber standards. The role will require excellent stakeholder management and communication skills to build the trust and support necessary for successful outcomes. You will be supported by team members in a highly collaborative environment, a structured learning and development programme … threat identification/intelligence, real-time monitoring, anomaly detection) and cyber response (e.g. incident response, eradication and remediation, recovery, post-incident analysis). DevSecOps. ZeroTrust Architecture (ZTA) expertise for enterprise, cloud and air-gapped environments along with knowledge of operational use of ZeroTrust within More ❯
a group level strategic position. Key Responsibilities Lead IAM Strategy : Develop and manage the global IAM strategy to align with business and security goals. ZeroTrust Adoption : Drive the strategic implementation of ZeroTrust principles across the organization. Governance & Policy : Define IAM governance frameworks, policies, and More ❯
Hounslow, London, United Kingdom Hybrid / WFH Options
Ashdown Group
GlobalProtect, Cortex Data Lake, and DLP. Application Layer Security: Proven experience configuring Layer 7 security and App-ID, ContentID, and User-ID policies. WAF & ZeroTrust Implementations: Hands-on with WAF deployments (CloudFIare or 3rd party) and ZeroTrust frameworks. GlobalProtect: Configuration and support of GlobalProtect More ❯
GlobalProtect, Cortex Data Lake, and DLP. Application Layer Security: Proven experience configuring Layer 7 security and App-ID, ContentID, and User-ID policies. WAF & ZeroTrust Implementations: Hands-on with WAF deployments (CloudFIare or 3rd party) and ZeroTrust frameworks. GlobalProtect: Configuration and support of GlobalProtect More ❯
Vacancy not published Company Description Xalient specializes in the convergence and holistic management of identity, cybersecurity, and networking to deliver secure connectivity within a zero-trust framework. Offering world-class Identity solutions and services including IGA, PAM, customer identity, access enforcement and IAM solutions, Xalient also delivers transformative … following full technical pre-sales and project life cycle. Beneficial Experience and knowledge of providing and specifying Managed Services solutions Experience or knowledge of ZeroTrust methodology Experience in Identity Access Management Experience in laaS and Cloud Connectivity (Express Route, Direct Connect etc) We are an equal opportunities More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
will lead on the separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with ZeroTrust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The … hybrid environments. Support configuration of Entra ID and Active Directory, ensuring secure sync and filtering. Build and document least-privilege access models aligned to Zero Trust. Implement Privileged Identity Management for JIT access, break-glass accounts, and alerting. Deliver robust documentation and communicate guidance clearly to internal teams. Your … in-time access, approval workflows, alert configurations. Active Directory: Tier-0 structure, Group Policy, OU segmentation. AADC: Hybrid sync troubleshooting, filtering, and role scoping. ZeroTrust & PAW: Secure workstation policies and access controls. Contract Details: Start Date: 2nd June Contract Length: 612 Months Clearance Required: Active SC If More ❯