techniques, procedures (TTPs) and industry standard frameworks (e.g. Mitre ATT&CK). Hands on knowledge of SIEM and SOAR solutions, IdentityandAccessManagementand Data Loss Prevention technologies, including FortiSIEM, Q-Radar, McAfee Web Gateway, McAfee ePolicy Orchestrator, Darktrace and Microsoft Defender andmore »
and a creative problem solver with a “get things done” attitude. Responsibilities General administration of on-premises and cloud technologies, including user account managementandidentity/access management. Setting up and issuing hardware (e.g., laptops, mobile devices and peripherals), managing equipment lifecycles such … delivery of IT services in the Dublin and London offices by working closely with non-technical representatives. Be a champion of IT, risk management, and data management best practices across the global business, raising awareness, helping colleagues understand their responsibilities, and engage with feedback. Conducting training … maximize the benefits of Office 365 for end-users. Creating, initiating, and implementing various security and governance programs. Reviewing IT security and data management clauses in client or supplier contracts and completing client risk assessments performed on the business are key responsibilities. Supporting the company in reaching globally more »
streams necessary for the successful delivery of new cloud, web, and mobile projects or changes. • Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access. • Playing a key role in IT strategy and planning, focusing on maximizing the value more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. br br You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Reading, England, United Kingdom Hybrid / WFH Options
The Developer Link
The developer link is supporting a global leader in IdentityandAccessManagement (IAM) for the Internet of Things (IoT), they're looking for a Java Engineer to help build upon their proprietary platform that provides trust for their customers IoT devices and ecosystems. … Generation (DDKG) and PKI Signature+, you’ll contribute in delivering unrivalled simplicity and trust to IoT devices through automated device provisioning, authentication, credential managementand policy based end-to-end data security/encryption, partnering with leading IoT providers such as AWS, Dell, Intel, Microsoft, nCipher Security and … Thales. Your expertise in IoT life cycle managementand security applications within the IoT industry, alongside core tech including Java, Spring Boot/Spring Framework (ideally including Spring Security) will help drive their continued success. You’ll collaborate cross-functionally across a small team of 5 to develop more »
Hemel Hempstead, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
GIT lab or any equivalent tool It would be great if you had ? Oracle WebLogic Server 12c, Cognos Analytics, Oracle IdentityandAccessManagement, Jasper Reports, Oracle Analytics, BI Publisher. If you are interested in this role but not sure if your skills and … perspectives and ideas, leading to exceptional results. We are committed to providing reasonable accommodations/adjustments to individuals with disabilities to ensure equal accessand opportunities throughout the recruitment process. If you require any accommodations/adjustments, please let us know and we will be happy to assist more »
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Matchtech
patterns, vulnerabilities, and anomalies, and eradicate hidden threats. Policy Development: Develop and create SOC policies and technical standards using industry best practices. Log Management: Manage log sources within the SIEM solution and create alert use cases to identify patterns of anomalous activity. Incident Response: Lead the response to … Knowledge of adversarial tactics, techniques, and industry-standard frameworks like Mitre ATT&CK. Deep understanding of SIEM and SOAR solutions, IdentityandAccessManagement, and Data Loss Prevention technologies. Experience in developing incident response playbooks, SOAR, and conducting red-team exercises. If you are more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
deliverable. You will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
initiatives programme. Will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
working in collaboration with partners and internal technical teams. Techstack: Vmware vCloud, VxRail, Vmware ESXI, vSphere, Vcenter, SIEM, AntiVirus, PKI, HSM, Antivirus, Health Monitoring, IDAM,RBAC, ABAC,MFA, Sharepoint, Exchange, Skype, Switching, Routing, Firewalls. Certification in TOGAF version 9.2 or above would be highly beneficial but not essential. Due to more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Identify Solutions
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Met Office
ll do our best to agree a working pattern that works for everyone. World changing work From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries … teams focus on their business problems without having to worry about common problems like cloud environments, logging, monitoring and alerting, data transfer or identityandaccess management. As IT Service owner you will be responsible for the successful operation and continuous improvement of our central Logging … Monitoring and Alerting solution as well as our customer facing IdentityandAccess Management. You may also be required to help develop and deliver new services that fit our mission. Your key duties include All aspects of IT Service management Managing finances including budgeting more »