Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
network appliances, VPNs, Dedicated Hosts, private endpoints, Log Analytics workspace, virtual machines (VMs) and images, storage accounts, and DNS. Deployment: Experience with deployment andmanagement of cloud resources and infrastructure components is accordance with IL6 SRG requirements. Security: Experience with best practices for the cloud environments, Cloud Computing … SRG, PIM, IdentityandAccessManagement (IAM), Conditional Access Policies, Policy, and Regulatory Compliance such as IL6 and NIST 800-53 Rev 5. Experience with Governance capabilities with Management Groups, Subscriptions and Resource Groups Performance Optimization: Monitor and optimize cloud … infrastructure for cost-effectiveness, performance, and scalability. Including deploying automation streamline provisioning, configuration management, and supporting deployment processes. Backup and Disaster Recovery: Implement backup and disaster recovery strategies to protect data and applications hosted in the cloud. Collaboration: Work closely with cross-functional teams, including Managers, Application teams More ❯
Bevendean, Sussex, United Kingdom Hybrid / WFH Options
University of Brighton
per annum Closing Date: Sunday 04 May 2025 This is an exciting opportunity to join our friendly and growing IdentityandAccess team, and to help construct and manage our next generation IdentityandAccessManagement platform. You will liaise … The University is committed to creating and maintaining an inclusive environment for all staff regardless of age, disability, family or caring responsibilities, gender identity, marital status, pregnancy or maternity, race, religion or belief (including non-belief), sex and sexual orientation. We embrace equality and diversity in our working More ❯
BN2, Bevendean, Brighton and Hove, East Sussex, United Kingdom Hybrid / WFH Options
University of Brighton
per annum Closing Date: Sunday 04 May 2025 This is an exciting opportunity to join our friendly and growing IdentityandAccess team, and to help construct and manage our next generation IdentityandAccessManagement platform. You will liaise … The University is committed to creating and maintaining an inclusive environment for all staff regardless of age, disability, family or caring responsibilities, gender identity, marital status, pregnancy or maternity, race, religion or belief (including non-belief), sex and sexual orientation. We embrace equality and diversity in our working More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Tallon Recruiting & Staffing
DBA (OIAM/EBS) - REMOTE TX, San Antonio 78238 Security Clearance: U.S. Citizen, Current Security Clearance, Secret Skills: Oracle Apps DBA, OIAM, Oracle Identity Suite, OEM, EBS, OCI Oracle Apps DBA (OIAM/EBS) - REMOTE San Antonio, TX 78230 Security Clearance: Current Secret (at a minimum) Location: Remote … U.S. based Job Type: Full Time W2 (no C2C or 1099 permitted) Tallon is recruiting for a Senior Oracle Administrator with Oracle IdentityAccessManagement (OIAM) and Applications DBA experience to work in support of a common services environment for a federal government customer. … Demonstrated proficiency working with OIAM product and its integration with EBS is required for consideration. Role and requirements include: Provide support for Oracle Identity Suite and integration with Oracle EBS applications and database Support installation, maintenance, securing, and performance tuning for Oracle Identity Suite Participate in More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Venn Group
governance measures, security protocols, and compliance frameworks. Collaborate closely with IT teams, stakeholders, and end-users to enhance user experience and adoption. Oversee identityandaccessmanagement, data management strategies, and governance processes for compliance and executive reporting. What We're Looking … Generous holiday entitlement Flexible working arrangements (including hybrid working) Local government pension scheme Free onsite parking Sports and Social Club with free gym access Employee Assistance Program Car salary sacrifice scheme This is a fantastic opportunity to make a real impact in a forward-thinking organisation. If you More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identityandaccessmanagement systems). Understanding of the following functions: TCP/IP stack, OSI Model, DHCP, DNS, Subnets, VLANs, Routers, Firewalls (essential More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Alpha Omega Integration LLC
based within a commutable distance to Arlington, VA) Alpha Omega is seeking a qualified Windows Systems Administrator to maintain and troubleshoot Windows and digital management systems for the organization. The Administrator will also be responsible for the managementand logistics of systems tracking equipment deployment for … performance, troubleshoot issues, and apply updates and patches to hardware and software systems. Ensure system stability, security compliance, and optimal performance. Manage user accessand permissions in accordance with ICE security policies. Coordinate with federal IT teams and product vendor to support hardware and software deployment across multiple … related field (Preferred) Experience/Skills: 5+ years of demonstrated experience in systems administration Experience with Windows server administration, including identityandaccessmanagement Experience with Azure Active Directory In-depth understanding of networking principles and protocols including routing, switching, and security Understanding of More ❯
able to commute on a weekly basis) Rate: Open Required skills and qualifications: 5+ years of experience as Senior Business Analyst Understanding of IdentityManagement including PAM, access request, privileges elevation, session recording, ServiceNow integrations, knowledge of access control models and policies. … you'll be doing: Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of IdentityandAccess Management. Collect requirements and transform them into a structured and comprehensive work product. Define clear acceptance criteria which can serve … of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key More ❯
london, south east england, united kingdom Hybrid / WFH Options
GIOS Technology
and optimize Azure application environments, resource groups, and networking components (VNets, Subnets, NSGs, peering). – Implement best practices for security, governance, tagging, and cost management in Azure environment • Azure Virtual Desktop (AVD) Deployment & Management: – Design, deploy, and manage AVD environments to enable secure, scalable, and high … Troubleshoot and optimize session host performance, connection stability, and user experience. • Security & Compliance: – Implement and enforce security best practices, including identityandaccessmanagement (IAM), role-based access control (RBAC), and encryption. – Ensure compliance with relevant data protection regulations and internal security More ❯
being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging security … Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability … to rank and prioritize vulnerabilities and security recommendations appropriately within the context of the infrastructure and business processes. Experience maintaining identityandaccessmanagement systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud More ❯
Kubernetes). Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform) to streamline provisioning andmanagement of cloud resources. Monitor, optimise, and troubleshoot cloud infrastructure performance, security, and costs, utilising monitoring tools and logging frameworks Implement and enforce cloud … security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC, SOC2). What we look for Bachelor's degree or equivalent experience in Computer Science or related field Proven experience (3 years) as More ❯
Windsor, Berkshire, South East, United Kingdom Hybrid / WFH Options
Centrica
Responsibilities : Enhance cloud platform functionality, security, and compliance Drive service improvements and operational excellence Conduct risk assessments and manage escalations Recommend IT service management best practices Integrate security into cloud solutions Automate infrastructure provisioning with IaC tools Monitor and troubleshoot system performance Maintain … secure and compliant environments Collaborate with application and data teams Develop disaster recovery strategies Implement governance processes and policies Optimize monitoring, alerting, and incident management Technical Skills : Expertise in cloud engineering and automation Strong CI/CD processes and tools skills Proficiency in managing EntraID Conditional Access … Proficiency with IaC, cloud networking, and security Strong skills in Azure App registrations, Enterprise Apps and associated permissions Administration of identityandaccessmanagement Knowledge of Azure services and cloud platform technologies Experience with role-based access control and managed identities Familiarity More ❯
Reigate, England, United Kingdom Hybrid / WFH Options
Client Server
IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal … experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure subscriptions You have a good … knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting More ❯
based security testing to identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-Based Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. Vulnerability … Management & Defect Tracking Identify, document, and track security defects, working closely with development teams to resolve vulnerabilities . Provide detailed security test reports , including risk assessments and mitigation strategies. Collaborate with stakeholders to prioritize and remediate security findings . 4. Collaboration & Security Awareness Work closely with security architects … conduct penetration testing on applications and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identityandaccessmanagement (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . More ❯
have experience in: Delivering and maintaining of enterprise security solutions/architecture for (but not limited to) the following areas: IdentityandAccessManagement, Cloud Security - Azure, AWS or GCP, Network Security, DevSecOps, Security Monitoring & Remediation, Defense in Depth Security Architecture, particularly Zero Trust … Secure Software Development Life Cycle best practices and architecture frameworks such as TOGAF or SABSA Strong understanding and knowledge of Information Security risk management tools and techniques Demonstrable knowledge of cyber security frameworks, including but not limited to: ISO27001, PCI-DSS, CIS Benchmarks, Cloud Platform Well Architected Frameworks. More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
models, tailored to a particular domain (e.g., ground enterprise, space) and customer requirements Development of software engineering processes and procedures to support provisioning andmanagement of cloud infrastructures and platforms Cloud cost estimation and migration strategies Mentoring junior technical staff and growing departmental knowledge through work and training … Application Development Application design, implementation, and containerization DevSecOps CI/CD pipelines Microservices architecture Twelve-factor application methodology Cloud Security IdentityandAccessManagement Logging and monitoring Cloud network security Ability to establish and maintain effective interpersonal and working relationships with various levels of … corporate staff, peers, management, program offices, customers, and contractors Outstanding communication skills: interpersonal (demonstrated in working diplomatically across organizations and tactfully advising decision makers), presentation (demonstrated in briefings), and written communications skills (demonstrated in design documents, technical reports or publications) A commitment to delivering on organizational goals This More ❯
Kansas City, Missouri, United States Hybrid / WFH Options
Epsilon Inc
Incident and Service Request queue and perform work per customer/client requirements in the timeframe requested Adhere to ITIL-based Incident and Change Management processes for all activities performed on behalf of customer Design solutions based on customer requirements Create high-level task lists to implement customer … designs Communicate and report on tasks associated with customer implementation projects Participate in Agile project managementand a DevSecOps culture as required Lead OCI engineering, provisioning, migration, and operational support of database environments. Implement and manage Oracle databases and services in OCI, including Autonomous Database, Oracle Cloud Database … OCI environments per customer compliance standards; review vulnerability reports and apply remediations. Monitor and support OCI-native services such as IdentityandAccessManagement (IAM), Vault, and Resource Manager. Automate OCI infrastructure deployment using Terraform, Ansible, or OCI Resource Manager. Support legacy environments including More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Kent, Broomfield, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
West Midlands, Bilbrook, Staffordshire, United Kingdom Hybrid / WFH Options
Tilt Recruitment
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sanderson
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation andmanagement of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use … policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and playbooks. Collaborating with third-party led security tests, assessments and audits of our information security information security policies, procedures, and systems. Identifying … Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, andaccessmanagement, etc. Ability to work in a small high performing team, collaborating with other technical resources whilst aligning to the security More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation andmanagement of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use … policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and playbooks. Collaborating with third-party led security tests, assessments and audits of our information security information security policies, procedures, and systems. Identifying … Security Engineer or similar working with tools such as SIEM, vulnerability management, endpoint detection & response (EDR), applications security, identity, andaccessmanagement, etc. Ability to work in a small high performing team, collaborating with other technical resources whilst aligning to the security More ❯
based in Luxembourg Fluency in French and English is required As an IT Project Manager, you are responsible for the IdentityandAccessManagement (IAM) remediation plans for critical business applications. Your role You have the freedom to design and implement your own strategies … are completed efficiently and on time Benefit from seamless coordination and communication, ensuring all stakeholders are aligned and informed. Take charge of risk management, showcasing your problem-solving abilities and strategic thinking. Keep your team on track with regular updates, fostering a culture of transparency and accountability. Build … of experience in managing IT projects You are proficient in delivering projects with a rock-solid resiliency You have well-developed organisational and time management skills You demonstrate the ability to cooperate with a wide variety of colleagues You have an excellent verbal and written communication skills in More ❯