Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
Real Technical Solutions
Cloud Operations function, you will be responsible for ensuring that cloud-based services are available, secure, efficient, and cost-effective. This includes provisioning and managing compute, storage, networking, andidentity services, as well as supporting the use of advanced PaaS capabilities and analytics platforms. You will be in a hands-on role that demands strong technical expertise, a … in digital infrastructure. Responsibilities for the Senior Azure Engineer/Cloud Operations Lead position: Azure Cloud Engineering: Build, configure, and maintain Azure cloud environments (IaaS, PaaS, storage, networking, identity). Deploy and support Azure Landing Zones in line with enterprise architecture standards. Support the transition from IaaS to PaaS services by designing and implementing modern cloud-native solutions. … skills (e.g., Python, PowerShell) and the ability to automate routine tasks and deployment processes for efficiency and consistency. Security: Expertise in cloud security best practices, identityandaccessmanagement (IAM), encryption, and compliance frameworks (e.g., PCI DSS, NIST). Networking: Strong knowledge of cloud networking concepts, including virtual networks, subnets, security groups, load balancers More ❯
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. IdentityandAccessManagement (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. IdentityandAccessManagement (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Sanderson are working with our client on an exclusive basis to help the recruit a permanent Identity Consultant during a phase of growth in the organisation. This is a newly created role so you will need to have the depth of knowledge to be able to interpret architecture requirements whilst collaborating with developers, business analysts and architects to … deadlines. Someone at a 'mechanical level' is needed. To carry out this role successfully you will need to have a blend of the following skills; IdentityandAccessManagement knowledge Microsoft Entra Technologies Configuration Management Active Directory Security best practises Troubleshooting & Support Software Configuration Agile Methodologies Data Orchestration & Transformation The ability to More ❯
Duties: Manage incoming security requests and operational tickets, ensuring timely and effective resolution Execute day-to-day security tasks such as permission management, firewall rule updates, andaccess provisioning and deprovisioning Collaborate with internal teams to support identityandaccessmanagementand ensure adherence to security policies Maintain and improve More ❯
Duties: Manage incoming security requests and operational tickets, ensuring timely and effective resolution Execute day-to-day security tasks such as permission management, firewall rule updates, andaccess provisioning and deprovisioning Collaborate with internal teams to support identityandaccessmanagementand ensure adherence to security policies Maintain and improve More ❯
london (city of london), south east england, united kingdom
Xcede
Duties: Manage incoming security requests and operational tickets, ensuring timely and effective resolution Execute day-to-day security tasks such as permission management, firewall rule updates, andaccess provisioning and deprovisioning Collaborate with internal teams to support identityandaccessmanagementand ensure adherence to security policies Maintain and improve More ❯
Burton-On-Trent, Staffordshire, West Midlands, United Kingdom
Amtis Professional Ltd
logging systems (e.g. Datadog, Logic Monitor, SolarWinds) Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform Ensure compliance with security policies; manage IAM, PIM and RBAC access controls Respond to incidents and contribute to root cause analysis and post-mortem reviews Create and maintain comprehensive documentation and runbooks Collaborate with cross-functional teams to align … Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secrets management for containerized applications Azure Policy for Kubernetes: Implement … governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid grasp of cloud security best practices, identityandaccessmanagement, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
oxford district, south east england, united kingdom
Ellison Institute of Technology Oxford
and fully aligned with the evolving needs of our research teams and scientists driving global pathogen research. Key Responsibilities: Manage our object data storage, ensuring efficient design, tiering, andaccess controls Build and manage our research compute environment for running bioinformatics pipelines and interactive analytics Ensure the data platform meets disaster recovery standards Ensure cloud resources are managed … follow through on opportunities for improvement Requirements Essential Knowledge, Skills and Experience: Strong hands-on experience with cloud infrastructure, ideally Oracle Cloud and its portfolio, including provisioning, configuration, andmanagement of services Ability to automate everything using Terraform and appropriate toolchains In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes Solid understanding of cloud … security best practices, including identityandaccessmanagement (IAM), network security, and encryption Experience with Git or other version control systems Desirable Knowledge, Skills and Experience: Certifications in Oracle Cloud (OCI) or other cloud platforms (AWS, GCP) Experience with Jira, Confluence, or similar project management tools Knowledge of compliance frameworks and standards More ❯
an ideal step for someone early in their IT career who wants to gain hands-on experience in a big enterprise environment and learn how identityandaccessmanagement works at scale. The Role You ll be part of the team that keeps accounts andaccess running smoothly setting up new starters … managing leavers, updating permissions, and ensuring users have the right access across systems like Active Directory, Microsoft 365, and Entra ID (Azure AD) . It s a structured, process-led role , perfect for someone who s organised, detail-focused, and enjoys seeing things done properly. Key Responsibilities of the Entry Level IT Systems Admininistrator Process starter, mover, andMore ❯
an ideal step for someone early in their IT career who wants to gain hands-on experience in a big enterprise environment and learn how identityandaccessmanagement works at scale. The Role You’ll be part of the team that keeps accounts andaccess running smoothly — setting up new starters … managing leavers, updating permissions, and ensuring users have the right access across systems like Active Directory, Microsoft 365, and Entra ID (Azure AD) . It’s a structured, process-led role , perfect for someone who’s organised, detail-focused, and enjoys seeing things done properly. Key Responsibilities of the Entry Level IT Systems Admininistrator Process starter, mover, andMore ❯
premise hosted infrastructure that supports our end user devices and applications. You will be responsible for maintaining the integrity, security, and availability of domain services, ensuring seamless connectivity andaccess for all users to deliver a secure workspace, calling on your strong knowledge of Active Directory, DNS, Group Policy, and related technologies. Demonstratable experience of VDI, EDR, and … Thin Client management is also essential. You will work closely with cross-functional teams to ensure that the tailored solutions are delivered in line with the needs of the business, proactively recommending new working practices and adhering to current best practices. This role offers the opportunity to work with the latest technologies, contribute to digital transformation initiatives, and … for the product and its users to meet performance targets and KPIs. Within your first 6 months you will: Work as a team to enable identityandaccessmanagement services Define process and identify tooling that will help the team to deliver future capability repeatedly and reliably What are BAE Systems looking for from More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. IdentityandAccessManagement (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
CD pipelines and automated delivery practices. Strong integration background - experienced in microservices, REST APIs, JSON, and contemporary integration patterns. Security-first thinking, particularly around SSO, IdentityandAccessManagement, SAML, OAuth, OpenID Connect, and Active Directory. Got your attention? If you believe that you have the skills and experience for the Solutions Architect role More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Altitude-Recruitment Limited
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential.With over 25 years of experience and trusted by more than 350 institutions … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
Permanent Based in Milton Keynes £50,000 pa - £60,000 pa Information Security Officer Hybrid Our client are a leading provider of software solutions for student accommodation, event management, catering, and residential services, they help institutions streamline operations, elevate customer experiences, and unlock their full potential. With over 25 years of experience and trusted by more than … to meet you. An experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across our product portfolio, manage security environments, and serve as our central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Compliance & Assurance (30%) Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all More ❯
knowledge of Microsoft technologies such as Windows Server and Microsoft Azure. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance … and controls in infrastructure delivery. Experience implementing monitoring, logging, and alerting toolsets. Understanding of data classification, encryption standards (e.g. at rest and in transit), and secure storage/access principles. ITIL Foundation Certificate Please send CV for full job description and an informal chat. Excellent opportunity to join a high-profile market leader More ❯
knowledge of Microsoft technologies such as Windows Server and Microsoft Azure. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance … and controls in infrastructure delivery. Experience implementing monitoring, logging, and alerting toolsets. Understanding of data classification, encryption standards (e.g. at rest and in transit), and secure storage/access principles. ITIL Foundation Certificate Please send CV for full job description and an informal chat. Excellent opportunity to join a high-profile market leader More ❯
knowledge of Microsoft technologies such as Windows Server and Microsoft Azure. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance … and controls in infrastructure delivery. Experience implementing monitoring, logging, and alerting toolsets. Understanding of data classification, encryption standards (e.g. at rest and in transit), and secure storage/access principles. ITIL Foundation Certificate Please send CV for full job description and an informal chat. Excellent opportunity to join a high-profile market leader More ❯