across the company. Strong PKI/certificate management and identity security are vital to the security and operational resilience of Pfizer and critical to zerotrust enablement. The Senior Manager of ZeroTrust Enablement owns the strategy, roadmap, technology, and operations of Pfizer’s global ZeroTrust Enablement processes & systems. The leader will be responsible for reducing risk, increasing operational effectiveness, and driving innovation which improves both security and user experience.The role reports to the Senior Director of Cybersecurity Engineering and will be a leader of a globally distributed team. This role requires subject … matter expertise across the broad domain of zerotrust enablement with hands-on expertise in delivering PKI, certificate management and identity security solutions, at massive scale, across cloud, on-premise and SaaS environments.Strong business communication skills are required to influence senior business leaders at the global business unit more »
them to functional/non-functional requirements, identify appropriate technologies, and evaluate market tools to meet business needs. Utilize knowledge of Secure Design Principles, ZeroTrust Principles, Secure SDLC, and Telecom Security (4G, 5G, IoT). Produce technical documents and artifacts in line with customer expectations as per … to align security requirements with business requirements. Familiarity with Control Frameworks like ISO 27001 and CoBIT for determining technical controls. Understanding of NIST-based ZeroTrust Standards. Proven experience in establishing ZeroTrust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA more »
Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
Maidstone, Kent, United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
United Kingdom Government
Platform's hyperscale platforms, such as AWS and AzureLeads the transition from MPLS to SD-WAN technologies and champions the adoption of VPN-less zerotrust network architecturesManages the UKHSA’s Telecoms equipment and services and aligns the UKHSA network infrastructure with GPA IT and Telecoms services.Designs, plans more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
Understanding of the technical security measures required for enterprise IT environments as described above with an appreciation for the fundamental ‘defence in depth’ and ‘zerotrust’ approaches to IT security Working with multiple cloud-based solution providers and strong understanding of the security risks associated with cloud-based more »
and ensure system integrity. About You Skills and Competencies Essential: A bachelor’s degree in computer science or any related field Working familiarity with zero-trust designs Capable of designing and implementing Authentication & Authorization (AuthN) solutions across a variety of protocols including OpenID Connect, OAuth 2.0, SAML 2.0. more »
risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists.Proven experience of Least Privileged/ZeroTrust adoption, Data Leakage Protection strategies in enterprise businesses.Strong experience having developed and managed business continuity and disaster recovery plans for large-scale more »
encryption products. You will support our research efforts around IoT Security, the Identity of Things (IDoT), Machine-to Machine (M2M) communication security and authentication, zero-trust networks and zero-knowledge systems. This role offers the opportunity for significant learning and professional development, whilst contributing significantly to our … into robust production software fully integrated within our hardware security module Keep up with new research in the space, in particular: post-quantum cryptography, zero-knowledge, privacy preserving technologies and confidential computing What we are looking for: Qualified to at least an MSc degree in cyber security, cryptography, mathematics more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
propose data tools and technologies to improve the efficiency and delivery of an integrated set of systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
Research and propose data tools and technologies to improve efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, ZeroTrust Architecture, Information Security, Identity and Access Management, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Purview Consultancy Services Ltd
related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists. Proven experience of Least Privileged/ZeroTrust adoption, Data Leakage Protection strategies in enterprise businesses. Strong experience having developed and managed business continuity and disaster recovery plans for large more »
be able to communicate effectively and be comfortable with managing expectations. Role Requirements CCIE Certification Cisco routers and switches, firewalls, load balancers, and VPNs, ZeroTrust & SD-WAN End-to-End Network Design & Implementation Experience Demonstrated Experience within Finance is excellent What's in it for you? Full more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
tools and technologies to improve the efficiency and delivery of an integrated set of Mobile applications systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures more »
security incidents by putting preventative measures in place. Technologies: Microsoft Azure Cloud MS Defender for Endpoint, Cloud, etc MS Sentinel Entra ID MS InTune ZeroTrust technology experience The above is a wish list and not a list of imperatives; if you are missing one or more of more »
HSM, Cross Domain Gateways, IDAM/RBAC/ABAC/MFA, Windows Technologies, High Grade Crypto. Design Principles: Knowledge of Secure by Design and ZeroTrust Principles is beneficial. Defence Sector: Experience working in a Defence setting is advantageous. Communication: Excellent written and verbal communication skills, with the more »
and respond to cyber threats. Understanding of networking technology Cyber security service trends compliance requirements in enterprise organisations Core cyber security products including SIEM, ZeroTrust and NDR/XDR products. Core network routing and switching protocols. Knowledge of network performance and optimisation and services Please apply ASAP more »