review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on … Protection with policy harmonisation and compliance efforts. Technical Review and Oversight Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Networkarchitecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee More ❯
review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on … Protection with policy harmonisation and compliance efforts. Technical Review and Oversight Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Networkarchitecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee More ❯
dedicated node pool, multi-tenancy, multi-region). Map and document application dependencies, including integrations with external systems like GitHub, Artifact Registry, Harness, and Terraform Cloud. Design and automate network connectivity and namespace vending to support the new cloud environment. 3. Execution Lead the building and configuration of new GKE clusters in alignment with approved architectural patterns. Provide hands … extensive hands-on experience in Google Kubernetes Engine (GKE). Experience with containerization technologies, CI/CD pipelines, and Infrastructure as Code (IaC) tools like Terraform. Strong understanding of networkarchitecture, security best practices, and FinOps principles in a cloud context. Experience with Container Security, including: Implementing and managing GKE security features such as Workload Identity, Pod Security … Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerability management tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. Excellent communication, stakeholder More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Hirexa Solutions UK
dedicated node pool, multi-tenancy, multi-region). Map and document application dependencies, including integrations with external systems like GitHub, Artifact Registry, Harness, and Terraform Cloud. Design and automate network connectivity and namespace vending to support the new cloud environment. 3. Execution Lead the building and configuration of new GKE clusters in alignment with approved architectural patterns. Provide hands … extensive hands-on experience in Google Kubernetes Engine (GKE). Experience with containerization technologies, CI/CD pipelines, and Infrastructure as Code (IaC) tools like Terraform. Strong understanding of networkarchitecture, security best practices, and FinOps principles in a cloud context. Experience with Container Security, including: Implementing and managing GKE security features such as Workload Identity, Pod Security … Policies (or the newer Pod Security Admission controller), and GKE Sandbox. Configuring and enforcing network policies to control traffic between pods and namespaces. Using container scanning and vulnerability management tools to secure container images. Implementing Binary Authorization to ensure only trusted images are deployed to clusters. Establishing robust IAM policies for GKE and related GCP services. Excellent communication, stakeholder More ❯