with plenty of space to influence how things are done. What you'll be doing Architecting and optimising network infrastructure across Azure environments Designing and supporting Cloudflare implementations - WAF, ZeroTrust, CDN, DNS, edge security Advising on best practice for network security, connectivity, resilience, and performance Supporting delivery teams by translating technical requirements into scalable architecture Coaching junior More ❯
Infrastructure Manager and wider team to ensure performance, security, and resilience across the estate.?????? :Designing and deploying LAN, WAN, WLAN, and SD-WAN solutionsManaging network performance, troubleshooting, and upgradesImplementing zero-trust principles, VPNs, firewalls, and policy-based routingSupporting Azure VNet design and integrationActing as a technical escalation point for all networking issues?:3+ years in a network infrastructure More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
training, supplier reviews, and client security assessments. ?? What You Bring Strong knowledge of security tools and infrastructure: WAFs, SIEM, AV, firewalls, TCP/IP, and more. Familiarity with OWASP, zero-trust, SASE, and risk-based vulnerability management. A background in infrastructure or networks. Working towards or holding certifications like CISSP, GCIA, Security+, CCNA/CCNP. Understanding of ISO27001 More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Henderson Scott
knowledge of relevant frameworks and standards including: PCI-DSS GDPR NIST CSF CIS Critical Security Controls Cyber Essentials Plus Hands-on experience across Cloud Security, Identity and Access Management, ZeroTrust, Security Service Edge (SSE), and SASE Proven ability to bridge the gap between technical and non-technical stakeholders when communicating security issues A passion for continuous improvement More ❯
security platforms, especially Defender and Sentinel Strong grasp of cloud and hybrid security models, particularly within Azure Knowledge of core security frameworks and methodologies including defence-in-depth and zerotrust Excellent stakeholder engagement skills, able to communicate complex technical topics clearly to non-technical audiences A collaborative, forward-thinking mindset with a drive for innovation and transformation More ❯
by identifying, segmenting, and enforcing compliance of every connected thing in a real-time and at scale. Our unified security platform enables enterprises and government agencies to focus on ZeroTrust segmentation, IT/OT convergence, and OT/ICS innovation, all supporting our mission and vision. Join us as we secure the world with our products. We … with their digital realities, including all asset types - IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organisations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to More ❯
needs and risks. Provide advanced expertise in SASE solutions, leveraging Netskope, SZScaler, and Palo Alto SASE products (Prisma Access, Prisma SD-WAN) to address secure access, cloud security, and Zero-trust networking requirements. Conduct risk assessments, identify vulnerabilities, and recommend effective solutions to mitigate risks and improve security posture. Provide architectural guidance and design security solutions that align More ❯
Aylesbury, Buckinghamshire, United Kingdom Hybrid / WFH Options
Skyhigh Security
with a complete, market-leading security platform built on a modern cloud stack. Our industry-leading suite of products radically simplifies data security through easy-to-use, cloud-based, ZeroTrust solutions that are managed in a single dashboard, powered by hundreds of employees across the world. With offices in Santa Clara, Aylesbury, Paderborn, Bengaluru, Sydney, Tokyo and … or other Customer Success platforms. It would be great if you also have the following, but they are not required : Experience working specifically with solutions such as SWG, CASB, ZeroTrust, Endpoint Security, or similar. Cybersecurity certifications (CISSP, CISM, or equivalent) are a plus. PMP project management certification Company Benefits and Perks: We believe that the best solutions More ❯
to-end lifecycle of privileged and infrastructure access, including onboarding, provisioning, session management, monitoring, and deprovisioning. Drive modernization and automation initiatives, including vaulting, just-in-time (JIT) access, and zerotrust implementations. Technology & Architecture: Oversee the architecture, engineering, and operations of PAM platforms. Partner with infrastructure, cloud, and DevSecOps teams to integrate PAM into hybrid and cloud-native … leading privileged access or identity security functions in complex, regulated environments. Demonstrated success leading PAM in a multinational financial institution or critical infrastructure context. Deep knowledge of PAM technologies, zerotrust principles, and identity governance integration. Skills: Strong understanding of regulatory expectations in financial services related to identity and access. Ability to influence across technical and executive audiences More ❯
to-end lifecycle of privileged and infrastructure access, including onboarding, provisioning, session management, monitoring, and deprovisioning. Drive modernization and automation initiatives, including vaulting, just-in-time (JIT) access, and zerotrust implementations. Technology & Architecture: Oversee the architecture, engineering, and operations of PAM platforms. Partner with infrastructure, cloud, and DevSecOps teams to integrate PAM into hybrid and cloud-native … leading privileged access or identity security functions in complex, regulated environments. Demonstrated success leading PAM in a multinational financial institution or critical infrastructure context. Deep knowledge of PAM technologies, zerotrust principles, and identity governance integration. Skills: Strong understanding of regulatory expectations in financial services related to identity and access. Ability to influence across technical and executive audiences More ❯
concise communication skills, able to work effectively and democratically in a small team Flexible in approach Endpoint protection – CrowdStrike Attack surface/exposure management – RunZero Knowledge of adopting a ZeroTrust approach to security(new) Knowledge of incident management runbooks Due to the volume of applications received for positions, it will not be possible to respond to all More ❯
Our unified data security platform addresses vulnerabilities in hybrid multicloud environments, defends against threats, and makes it easier to discover, assess, and fix data exposure risks. Whether implementing a ZeroTrust model or preparing for the post-quantum computing era, we help businesses worldwide protect their most sensitive data, wherever it is. Our commitment to solving the world … and Innovation Awards, as well as recognition from industry giants such as Microsoft, Intel, ServiceNow, and Snowflake. Our team includes industry leaders and cryptography experts, creating a culture of trust, innovation and collaboration where every voice is valued. Recognized as a Great Place to Work, we're looking for passionate individuals to help us shape the future of data … a force united in our mission to tackle the world's most formidable data challenges head-on. Our roster boasts industry trailblazers and cryptography virtuosos, fostering a culture of trust and performance where innovation thrives. Recognized as a Great Place to Work, we invite passionate individuals to shape the future of data security alongside us. Dive into a workplace More ❯
Days Ago Job requisition id: JR467068 Who is Forcepoint? Forcepoint simplifies security for global businesses and governments. Our all-in-one, cloud-native platform facilitates the adoption of ZeroTrust principles and helps prevent the theft or loss of sensitive data and intellectual property, regardless of where people are working. With over 20 years in business, 2.7k employees More ❯
Management, Ops Security, CT Shared Services The Security Workspace and Access Team (SWAT) focuses on Security Consulting, Access Control Administration, Outsource Governance, Security Compliance and Governance, and Enabling a ZeroTrust Architecture. These areas guide our efforts to secure data, manage access, and support the broader organization's operational needs. We strive to raise the security bar across More ❯
environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure programmes. Experience integrating cybersecurity into engineering More ❯
is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You'll Be Doing... Verizon is proudly leading the way in the implementation of advanced solutions … in a fast-paced environment that requires you to collaborate with multiple functions and partners to bring a concept to life. You can quickly build rapport and gain the trust of others. You have an ability to convey complex ideas in a straightforward manner and can inspire our sales teams and business customers to become excited about new possibilities. … and analytical skills. A deep understanding of 5G/LTE technologies, standards and deployment architectures (including RAN, Core Networks, transport). Experience in working with 5G security protocols and zerotrust models. Certifications or accreditations related to designing, building or managing wireless networks. Proven ability to clearly explain complex technical concepts to a non-technical audience. Deep understanding More ❯
london, south east england, united kingdom Hybrid / WFH Options
Verizon
is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You'll Be Doing... Verizon is proudly leading the way in the implementation of advanced solutions … in a fast-paced environment that requires you to collaborate with multiple functions and partners to bring a concept to life. You can quickly build rapport and gain the trust of others. You have an ability to convey complex ideas in a straightforward manner and can inspire our sales teams and business customers to become excited about new possibilities. … and analytical skills. A deep understanding of 5G/LTE technologies, standards and deployment architectures (including RAN, Core Networks, transport). Experience in working with 5G security protocols and zerotrust models. Certifications or accreditations related to designing, building or managing wireless networks. Proven ability to clearly explain complex technical concepts to a non-technical audience. Deep understanding More ❯
and leadership in a complex hybrid delivery model. Key Responsibilities: Lead design and continuous improvement of access models for business units and newly acquired entities. Guide the implementation of ZeroTrust-aligned governance controls, including RBAC and risk-based access models. Own and review complex role analysis, redundancy elimination, and role standardization efforts. Act as the primary offshore More ❯
and leadership in a complex hybrid delivery model. Key Responsibilities: Lead design and continuous improvement of access models for business units and newly acquired entities. Guide the implementation of ZeroTrust-aligned governance controls, including RBAC and risk-based access models. Own and review complex role analysis, redundancy elimination, and role standardization efforts. Act as the primary offshore More ❯
IT industry with focus on cyber security solutions and environment Extensive experience in Cyber Security, in the areas of MSS, MS security suite, Cyber Defence, SOC Services, Cyber Transformation, ZeroTrust Passionate for hunting new customers Proven track record of achieving sales targets and growing business Experience in selling to the Public Sector is essential, with a deep More ❯
while maintaining strong security controls Evolving our identity capabilities Leading initiatives that transform how we manage digital identities throughout their lifecycle Focusing on automation and self-service Evangelising on ZeroTrust principles to get everyone’s buy in and helping them to understand the vision and how we implement it. What You Can Expect From Us We won More ❯
while maintaining strong security controls Evolving our identity capabilities Leading initiatives that transform how we manage digital identities throughout their lifecycle Focusing on automation and self-service Evangelising on ZeroTrust principles to get everyone’s buy in and helping them to understand the vision and how we implement it. What you can expect from us We won More ❯
anonymous investigations across the surface, deep, and dark web-helping national security, defense, law enforcement, and enterprises uncover critical insights while staying protected. Designed from the ground up with zero-trust principles and built on globally scaled infrastructure, Silo for Research addresses today's toughest cybersecurity challenges, allowing investigators to work smarter, faster, and safer. Trusted by more More ❯
while maintaining strong security controls Evolving our identity capabilities Leading initiatives that transform how we manage digital identities throughout their lifecycle Focusing on automation and self-service Evangelising on ZeroTrust principles to get everyone's buy in and helping them to understand the vision and how we implement it. What you can expect from us We won More ❯
while maintaining strong security controls Evolving our identity capabilities Leading initiatives that transform how we manage digital identities throughout their lifecycle Focusing on automation and self-service Evangelising on ZeroTrust principles to get everyone’s buy in and helping them to understand the vision and how we implement it. What you can expect from us We won More ❯