Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
ideally you will live a 50-mile radius of the office. Responsibilities: Security Monitoring and Incident Response: Cloud Infrastructure Security: IdentityandAccessManagement: Security Compliance and Auditing: Security Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. … Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user accessand permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay updated on IT security trends and regulations. Maintain accurate security documentation. Skills and Qualifications … solutions Any knowledge of Azure Security principles Ideally experience with Microsoft Defender stack Knowledge of essential cybersecurity principles and practices Excellent communication, stakeholder management, and collaboration skills Information Management Standards for ISO27001, Cyber Essentials+, and AAF 1/20 certification and accreditations Salary up to more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
PowerShell. Understanding of the tactics, techniques and procedures (TTP) used by attackers. Understanding and experience of implementing and managing security controls on network access control … systems such as Firewall, IDS, WAF and network segmentation technology. Understanding and experience of technologies and concepts including Windows, Networking, IdentityandAccessManagement, Event Logging and Monitoring, Anti-virus and Zero-Touch Architecture. Life at Littlefish: Our company values shape who we are more »
on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting … up to and including board level audience. Monitoring the vendor and product landscape to know what products are available. Perform threat identification and vulnerability management duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree … Firewalls, intrusion detection, assessment tools, encryption, certificate authority, etc. Knowledge in information security areas such as (ISO27001, PCI, NIST & GDPR), identityandaccessmanagement, security policies, processes, and procedures Understanding of emerging security technologies and their impact on networks and systems. Experience of risk more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
Manchester, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
My1Login is the UK’s leading, multi-award-winning IdentityandAccessManagement service that enables seamless workforce access to web, mobile and legacy desktop applications delivering operational savings and protecting businesses against the financial and reputational damage of a data breach. … This is a management position and it is envisaged the role would appeal to an experienced individual seeking to work in the dynamic environment of a rapidly growing technology business. You will be responsible for achieving successful business and user outcomes for My1Login’s customers that maximise user more »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
seeking an experienced Implementation Project Manager for an initial 6 month contract. The Data Consent Project will focus on implementing a data consent management platform. The right person will have extensive experience in similar implementation projects, proven data privacy compliance knowledge and a background managing enterprise level projects. … business and IT to create processes for selecting a platform and partner to implement a global consent and identify platform. Collaborate with senior management, stakeholders, and technical teams to define the project scope, goals, and deliverables. Lead a cross-functional project team consisting of IT professionals and business … IT projects on time and within budget. Strong experience managing enterprise projects involving data privacy compliance and implementation of customer identityandaccessmanagement (CIAM) solutions like Adobe Experience Platform, SAP CDC, Oracle Identity Cloud Service (OICS), or Auth0. Strong understanding of more »
Project and Professional Services, and Managed Services. We specialise in Microsoft's Modern Workplace, Azure Cloud Adoption and Cloud Migration, Data Platform, Security andIdentityand Cloud Application Development. The role: Delivering creative and innovate Microsoft 365 solutions to support our client's needs. Providing Microsoft 365 cloud … Exchange Online, Microsoft Entra ID Proven track record in Microsoft 365 service architecture and engineering including cloud and hybrid implementations, identityandaccessmanagement, security, and compliance. Previous experience working in a senior engineering or consulting role, with a keen desire to build a more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Devon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of CI/CD tools and SAST/DAST tooling. Understanding of networking principles and cloud security frameworks. Experience with identityandaccessmanagement tools. Familiarity with relational and NoSQL databases. #INDTech more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
must and the candidate should be proactive and self-driven communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identityandaccessmanagement, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
IVC Evidensia
outstanding care in around 2,500 locations globally. IVC Evidensia is undergoing an exciting digital transformation. Key to this is to improve the management of our core data sets. This means accelerating the standardisation of operational systems in practices, the creation of stronger tools for managing master data … breaking the challenges into deliverables. Along with this, they will also work closely with the Data Architect to define our over-arching data management strategy. In return, you will benefit from: * Hybrid working environment in a dog-friendly office * 5 weeks holiday, plus bank holidays * Your birthday as … with information security best practice. Capabilities in interfacing the IT Infrastructure team to ensure non-functional requirements, such as performance, scalability, resilience andidentity/accessmanagement, are effectively delivered in the end-to-end solution. Following receipt of your application, you will be more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
deliverable. You will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »