Bristol, Gloucestershire, United Kingdom Hybrid/Remote Options
Experis
GCP) Hands-on with IaC tools (Terraform, Bicep, CloudFormation) and CI/CD pipelines Proficient in Python or Bash scripting Knowledge of cloud security best practices (e.g. IAM, encryption, vulnerabilitymanagement) Familiar with Docker, Kubernetes, serverless, and event-driven architectures Comfortable working with both SQL and NoSQL databases A passion for engineering excellence and staying on top of … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Stroud, England, United Kingdom Hybrid/Remote Options
Ecotricity
Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & VulnerabilityManagement Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate for this role will behave a demonstrable … years. Have obtained or be working towards a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (ie. NIST or Cyber Security Essentials). Knowledge of vulnerability databases (ie. NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tooling. Experience using Code Security scanning tooling. Educational Requirements This role isn More ❯
Bristol, Gloucestershire, United Kingdom Hybrid/Remote Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯