bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identityandaccessmanagement, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or More ❯
bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identityandaccessmanagement, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or More ❯
bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identityandaccessmanagement, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical … endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP, CISM, Microsoft security certs). Cloud security or architecture qualifications. Knowledge of automation, scripting, or SOAR platforms. Experience in OT or More ❯
search engines (Elasticsearch, Solr, OpenSearch, or vendor-native). Implement API-driven integrations with third-party systems (e.g., Adobe, Avid, broadcast systems, DAMs, cloud storage). Configure user access, metadata schemas, and distribution workflows. Contribute to CI/CD pipelines, containerized deployments, and monitoring setup. Leadership & Collaboration Provide technical leadership to developers and operations teams. Partner with product … broadcast/MAM integration (Avid, Dalet, Viz One, Adobe). Familiarity with AI/ML in media workflows (auto-tagging, transcription, object recognition). Hands-on experience with identity/accessmanagementand content security. Cloud certifications (AWS/Azure/GCP). More ❯
search engines (Elasticsearch, Solr, OpenSearch, or vendor-native). Implement API-driven integrations with third-party systems (e.g., Adobe, Avid, broadcast systems, DAMs, cloud storage). Configure user access, metadata schemas, and distribution workflows. Contribute to CI/CD pipelines, containerized deployments, and monitoring setup. Leadership & Collaboration Provide technical leadership to developers and operations teams. Partner with product … broadcast/MAM integration (Avid, Dalet, Viz One, Adobe). Familiarity with AI/ML in media workflows (auto-tagging, transcription, object recognition). Hands-on experience with identity/accessmanagementand content security. Cloud certifications (AWS/Azure/GCP). More ❯
search engines (Elasticsearch, Solr, OpenSearch, or vendor-native). Implement API-driven integrations with third-party systems (e.g., Adobe, Avid, broadcast systems, DAMs, cloud storage). Configure user access, metadata schemas, and distribution workflows. Contribute to CI/CD pipelines, containerized deployments, and monitoring setup. Leadership & Collaboration Provide technical leadership to developers and operations teams. Partner with product … broadcast/MAM integration (Avid, Dalet, Viz One, Adobe). Familiarity with AI/ML in media workflows (auto-tagging, transcription, object recognition). Hands-on experience with identity/accessmanagementand content security. Cloud certifications (AWS/Azure/GCP). More ❯
include - a foundation in infrastructure - Virtual machines/compute resources, Networking (DNS, VPNs, subnets, firewalls, load balancers), Storage solutions (blob/object storage, file shares), Identityandaccessmanagement (IAM, Active Directory, Azure AD, etc.) You will act as an initial point of contact for cloud-related support requests via phone, email, chat, or … ticketing systems. Providing First and Second Line Cloud Support, diagnose and resolve common issues related to cloud infrastructure, services, and connectivity, Incident Management & Escalation, Log, categorize, and prioritize Incidents and Service Requests accurately and escalate complex or unresolved issues to senior engineers or relevant resolver groups while ensuring detailed documentation. Working in a small, cross functional teams to … follow up on outstanding vendor tickets to ensure timely resolution. Experience using ticketing and monitoring systems (e.g., ServiceNow, Jira, Datadog, Azure Monitor, CloudWatch) Understanding of ITIL principles and incident management workflows 36 hours per week - on a late and early shift pattern Out-of-Hours Incident Support Stoke on Trent Office Permanent, Full Time More ❯
suite of business-critical applications, including but not limited to: Atlassian suite (Jira, Confluence) Developer and product tools such as TeamCity, Bitbucket, Stoplight, Cucumber Studio, WebDMS, FEC, Document Management Systems CRM & ERP tools like HubSpot and SAGE Google Workspace (Admin Console) and other SaaS platforms Analyse existing application usage and workflows to identify inefficiencies, recommend improvements, and implement … assess needs, propose solutions, and improve workflows. Maintain accurate IT documentation, configuration records, and knowledge base articles for supported applications. Manage onboarding and offboarding processes related to application accessand user provisioning. Support local tech teams with day to day support on an ad-hoc basis Provide input into the deployment of customer-facing IT requirements aligned to … to work independently onsite while collaborating effectively with global teams. Desirable (but not essential) ITIL Foundations Certification Experience supporting Mac and Windows environments Familiarity with identityandaccessmanagement, SSO, and federation technologies Experience with scripting or automation tools (e.g., PowerShell, Python, Google Apps Script) Industry certifications (e.g., CompTIA A+, Google Workspace, Microsoft) What More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Leonardo
Learn to integrate security into the systems engineering lifecycle, from requirements analysis through to implementation and operations. Develop practical knowledge of security technologies, such as identityandaccessmanagement (IAM), public key encryption (PKI), encryption, firewalls, and intrusion detection/prevention systems (IDPS), and how they fit into architectural designs. Role Requirements All of … up to 12 additional flexi-days each year. Secure your future Benefit from our award-winning pension scheme with up to 15% employer contribution. Your wellbeing matters Free access to mental health support, financial advice, and employee-led networks championing inclusion and diversity (Enable, Pride, Equalise, Armed Forces, Carers, Wellbeing and Ethnicity). Rewarding performance All employees are More ❯
sensitive information. Accountabilities Provision of subject matter expertise on security systems and engineering patterns. Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems. Managementand protection of secrets, ensuring that they are securely generated, stored, and used. Execution of audits to monitor, identify and assess vulnerabilities in the banks infrastructure/software … including developers and security teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements. Development/Implementation and maintenance of IdentityandAccessManagement solutions and systems. Vice President Expectations To contribute or set strategy, drive requirements and make recommendations for change. Plan resources, budgets, and policies; manage and … will train, guide and coach less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions.. Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability More ❯
Oxford, England, United Kingdom Hybrid / WFH Options
Hlx Life Sciences
configuration, and scaling using Terraform , Kubernetes , and related tools Design and maintain object storage , compute clusters , and disaster recovery solutions Implement best practices in DevSecOps , identityandaccessmanagement , and network security Collaborate with data scientists, researchers, and software engineers to deliver reliable, scalable systems Ideal Profile: Strong background in cloud platform engineering or More ❯
banbury, south east england, united kingdom Hybrid / WFH Options
Hlx Life Sciences
configuration, and scaling using Terraform , Kubernetes , and related tools Design and maintain object storage , compute clusters , and disaster recovery solutions Implement best practices in DevSecOps , identityandaccessmanagement , and network security Collaborate with data scientists, researchers, and software engineers to deliver reliable, scalable systems Ideal Profile: Strong background in cloud platform engineering or More ❯
notice. Here's what we're looking for: Extensive UK Defence sector experience, ideally with Army programmes and stakeholders. Security architecture expertise across UK Defence, identityandaccessmanagement, and secure integration. Modelling skills in Sparx Enterprise Architect, using ArchiMate and NAFv4, and applying model-driven traceability Solid grasp of UK guidance and standards More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
bring strong experience in cyber or IT infrastructure security, ideally within hybrid Microsoft-based environments. You should have hands-on expertise in areas such as identityandaccessmanagement, encryption, monitoring tools, and vulnerability management. A sound knowledge of regulatory frameworks and industry security standards is important, along with the ability to balance technical More ❯
to the Head of Information Security to provide tactical technical security support. The Lead InfoSec Engineer will be responsible for technical governance to security standards, IdentityandAccessManagement expertise across multiple platforms. The role will provide ongoing technical assurance to digital systems and data to ensure that these are safe and secure. Special … Proven knowledge and experience of IT and information security policies, practices and standards. Knowledge of current technologies in the field and the ability to learn new ones. Incident management experience including investigations and response. Cloud security experience would be highly beneficial PCI and Cyber Essentials expertise would be advantageous Why us? Markerstudy Insurance Services Limited (MISL) is one More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
our team on a 6-month contract. This hybrid role offers the opportunity to work at the heart of technology change, enabling secure and effective identityandaccessmanagement (IAM) solutions across a portfolio of initiatives. What You'll Do Act as a single point of contact (SPoC) or relationship-based fly-in resource … solutions that align with technology strategy, standards, and risk appetites. Collaborate with internal teams and third parties to ensure smooth "Path to Live" transitions. Provide day-one user access, knowledge creation, warranty support, and seamless handover into operations. Deliver proactive updates, manage risks and issues, and ensure timely delivery of milestones. Champion IAM capabilities to drive innovation and … tools and practices. What You'll Bring Strong technical expertise in IAM processes and tools. Proven experience in designing and implementing IAM solutions in complex environments. Excellent stakeholder managementand communication skills. Ability to work flexibly, including occasional non-standard hours to support operational priorities. A collaborative mindset and willingness to support wider departmental goals. Carbon60, Lorien & SRG More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
week) Contract Type: Inside IR35 Rate : Negotiable to market About the Role An opportunity for an experienced IAM Technical Analyst to join a large-scale identityandaccessmanagement transformation programme. The role involves supporting technical SMEs through analysis, configuration, and the onboarding of target applications to new IAM services. Key Responsibilities Support technical … enhancement. Demonstrated experience integrating target applications within centralised IAM environments. About the Company A leading organisation delivering a major digital transformation programme focused on improving security, scalability, and user access management. ➡️ Interested? Apply now or reach out for a confidential conversation. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
week) Contract Type: Inside IR35 Rate : Negotiable to market About the Role An opportunity for an experienced IAM Technical Analyst to join a large-scale identityandaccessmanagement transformation programme. The role involves supporting technical SMEs through analysis, configuration, and the onboarding of target applications to new IAM services. Key Responsibilities Support technical … enhancement. Demonstrated experience integrating target applications within centralised IAM environments. About the Company A leading organisation delivering a major digital transformation programme focused on improving security, scalability, and user access management. ➡️ Interested? Apply now or reach out for a confidential conversation. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
week) Contract Type: Inside IR35 Rate : Negotiable to market About the Role An opportunity for an experienced IAM Technical Analyst to join a large-scale identityandaccessmanagement transformation programme. The role involves supporting technical SMEs through analysis, configuration, and the onboarding of target applications to new IAM services. Key Responsibilities Support technical … enhancement. Demonstrated experience integrating target applications within centralised IAM environments. About the Company A leading organisation delivering a major digital transformation programme focused on improving security, scalability, and user access management. ➡️ Interested? Apply now or reach out for a confidential conversation. More ❯
certificate lifecycle management. Implement and maintain Certificate Authorities, Registration Authorities, and associated infrastructure. Ensure secure deployment and configuration of PKI across enterprise systems, endpoints, applications, and devices. Collaborate with IDAM, DevOps, and cloud security teams to integrate PKI with broader identityand security architectures. Provide technical leadership in incident response and troubleshooting related to certificates and encryption. Stay … OpenSSL. Familiarity with certificate usage in TLS, S/MIME, code signing, document signing, VPN, smart cards, and secure email. Understanding of encryption algorithms, hash functions, and key management practices. Experience in designing secure architectures in hybrid or cloud environments. Knowledge of compliance and regulatory standards … such as PCI DSS, HIPAA, SOX, GDPR, NIST 800-53. Preferred Qualifications: Certifications: CISSP, CISM, CEH, GIAC, Microsoft Certified: IdentityandAccess, or other IDAM equivalent Technologies. Experience with Zero Trust Architecture andIdentity Federation. Exposure to quantum-safe cryptography principles and roadmaps This role will require you to be willing and eligible More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Databricks and Unity Catalog for data governance. Develop CI/CD pipelines using GitHub Actions. Ensure security best practices, including Defense in Depth, BCDR, and high availability. Manage identityandaccess, including OAuth and federated credentials. Optimise cloud costs and monitor usage effectively. Essential Skills Proven experience with Terraform for Azure infrastructure as code. Strong knowledge … Unity Catalog for advanced data governance. Hands-on experience with Azure Private Link and Private Link Service. Strong understanding of Azure security best practices and compliance. Experience in identityandaccess management. Familiarity with Azure cost management strategies. Additional Details Must be available to start in November. Outside IR35 contract. Home-based. 3-month More ❯
first mindset will make a real impact. About You What We're Looking For A hands-on technologist with strong knowledge of Azure infrastructure, networking, data platforms andidentity management. Comfortable working with Azure Data Factory, Azure SQL, APIs, and cloud networking. Security-focused, with a good understanding of Azure Policy, Defender for Cloud, andidentity/access management. Capable of building and supporting integrations between systems (HR, Finance, M365, third-party APIs, etc). A proactive problem-solver who enjoys working on projects, improvements, and scaling cloud services, not just BAU. Strong communicator who can explain technical designs to both technical and non-technical colleagues. Core Responsibilities Design and deploy scalable More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
/cyber security and risk guidance. enterprise IT systems, services, infrastructure, networking, applications in cloud, on-prem, and hybrid environments. Security tooling such as Mimecast and Microsoft Defender, Sentinel, IDAM services; Experience leading and managing an IT/Cyber Security function and working groups. ITIL and ITSM. 25 days annual leave + bank holidays - additional day for each year of More ❯
Things. As a trusted technology adviser and managed services provider, we help clients navigate continuous change and embrace innovation. We deliver world-class hybrid cloud, Infrastructure, mainframe transformation, data, IDAM, and cloud-native solutions, simplifying complex business challenges and creating new pathways to success. Headquartered in the USA and backed by private equity, Ensono has a strong track record in More ❯
with technical delivery and ideally Cyber Transformation programmes. The role is inside IR35 and you would be paid PAYE through us here at Opus.Skills required: - Cyber security projects- PAM, IDAM, SIEM, Data protection projects- Ideally some experience of RFP/Tendering More ❯