exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯
Kubernetes (AKS), cloud networking, compute & storage Terraform, Bicep, YAML for Infrastructure as Code C#/.NET (Framework, Core, .NET 8) PowerShell, Python or Bash scripting IdentityandAccessManagement, B2C or federated authentication Linux-based platforms for build/deploy environments Advantageous: Exposure to AWS for business continuity More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. · Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. · Accurately log incidents by categorising and prioritising them in line with service operations procedures. · Conduct full … Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · Data Loss Prevention (DLP) · Information Protection · IdentityandAccessManagement · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly and concisely. Plans and manages own More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses: interactive investor (ii) - the UK's … of DevOps practices and tools (Azure DevOps, GitHub, CI/CD). Strong knowledge of networking concepts (DNS, VPN, Firewalls, load balancers). Experience with identityandaccessmanagement in Azure. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of … annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans andaccess to an employee discount portal. Our business Enabling our clients to be better investors drives everything we do. Our business is structured around three distinct areas - our vectors More ❯
difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses: interactive investor (ii)- the UK's … of DevOps practices and tools (Azure DevOps, GitHub, CI/CD). Strong knowledge of networking concepts (DNS, VPN, firewalls, load balancers). Experience with identityandaccessmanagement in Azure. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of … annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans andaccess to an employee discount portal. You can read more about our benefitshere. Our business Enabling our clients to be better investors drives everything we do. Our business is More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
hands-on experience in securing cloud computing platforms, particularly Microsoft Azure and AWS. Have expertise in applying security controls across platforms like M365. Ensuring secure identityandaccessmanagementand configuring cloud-native tools to detect and respond to threats. Experience with container security, Infrastructure as Code (IaC), and DevSecOps practices will be a … an integral part of the shortlisting process. As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit. Our University is positive about flexible working. Blended working arrangements may be considered. Please note that More ❯
hands-on experience in securing cloud computing platforms, particularly Microsoft Azure and AWS. Have expertise in applying security controls across platforms like M365. Ensuring secure identityandaccessmanagementand configuring cloud-native tools to detect and respond to threats. Experience with container security, Infrastructure as Code (IaC), and DevSecOps practices will be a … an integral part of the shortlisting process. As an equal-opportunity employer, we welcome applicants from all sections of the community regardless of age, sex, gender (or gender identity), ethnicity, disability, sexual orientation and transgender status. All appointments are made on merit. Our University is positive about flexible working. Blended working arrangements may be considered. Please note that More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
IT Talent Solutions Ltd
environment. Strong knowledge of Azure IaaS and PaaS services, including Functions, App Services, Azure SQL, Key Vault, and API Management. Deep understanding of cloud security, identityandaccessmanagement (Azure AD), and governance (Azure Policy, Blueprints). Familiarity with microservices, event-driven architectures, and container technologies (Docker, AKS). Ability to translate complex technical More ❯
Employment Type: Full-Time
Salary: £50,000 - £70,000 per annum, Negotiable, Inc benefits
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identityandaccessmanagement, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the … security/operational network architecture design Must have proficient knowledge and experience with SIEM technologies Strong troubleshooting, reasoning and problem-solving skills Networking - VLAN, WAN, LAN, Routers, Switches, Access Points, Firewalls, IPS, VPN etc. Excellent communications skills Exceptional Time Managementand organizational skills Ability to conduct forensic analytical studies and investigations effectively and efficiently Knowledge of More ❯
1st Line Support queries. Collaborate with the Support team on resolving complex Microsoft 365-related issues. Automate routine or repetitive tasks to improve operational efficiency. 3. Documentation & Knowledge Management Maintain internal knowledge bases and troubleshooting documentation. Ensure accurate recording of client tenancy configurations and technical notes. Key Requirements Strong client service orientation and attention to detail. Ability to … solutions to clients. Solid analytical and troubleshooting skills. Essential Experience Microsoft SharePoint – Advanced understanding of site configurations and permission management. Microsoft Entra ID – Experience with identityandaccessmanagementand tenant setup. PowerShell – Proficient in scripting and task automation. Desirable Knowledge Microsoft Exchange Online Microsoft Purview Microsoft Teams Microsoft Copilot Benefits 25 days annual More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in SailPoint with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
CD practices Knowledge of key tools and operators including: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - image scanning Keycloak - identityandaccessmanagement Istio or OpenShift Service Mesh - microservice communication 3 Months | Inside IR35? Remote, with occasional travel to Lincoln and Newcastle £400-£550 per day? Active SC More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in StrongDM with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
our clients and internal teams on short to medium-term assignments. Skills we are looking for Proficiency in BeyondTrust with experience in developing and implementing identityandaccessmanagement solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯
strategic objectives It would be great if you also have: Experience working with public sector or business clients A background in consumer environments, such as identityandaccessmanagement, where core architectural skills were applied Looking in: Leading inclusively and Safely I inspire and build trust through self-awareness, honesty and integrity. Owning outcomes More ❯
programme of security audits and assurance to identify vulnerabilities within existing controls. Including: Monitoring the configuration and settings of security devices Reviewing the effectiveness of IdentityandAccessManagement processes and systems Assessment and prioritisation of software vulnerabilities - Be responsible for the creation of annual Network and Information Systems (NIS) reports for our regulator More ❯
programme of security audits and assurance to identify vulnerabilities within existing controls. Including: Monitoring the configuration and settings of security devices Reviewing the effectiveness of IdentityandAccessManagement processes and systems Assessment and prioritisation of software vulnerabilities - Be responsible for the creation of annual Network and Information Systems (NIS) reports for our regulator More ❯