Central London, London, United Kingdom Hybrid/Remote Options
Halian Technology Limited
application security across engineering teamsproviding hands-on guidance, resolving concerns, and fostering a security-first mindset. DevSecOps Enablement : Promote and implement secure development practices across CI/CD pipelines, secrets and key management, dependency management, and secure design. Vulnerability Management : Lead vulnerability remediation effortstriaging findings, prioritizing risks, and partnering with teams to deliver effective, pragmatic fixes. … Tooling & Automation : Integrate security tools (e.g., SAST, DAST, SCA, secrets scanning) into developer workflows, ensuring automation is both scalable and developer-friendly. Cloud Security Collaboration : Work alongside infrastructure teams to ensure secure configuration of AWS and Azure environments, with a focus on IAM, network security, encryption, and observability. Architecture & Design Reviews : Provide input and recommendations to ensure new services … focus. Hands-on experience with secure CI/CD practices, DevSecOps methodologies, GitHub workflows, and Terraform. Deep understanding of cloud security principles in AWS and Azure, particularly around IAM, secretsmanagement, and networking. Proficient in secure coding practices, threat modeling, and vulnerability remediation. Familiar with a range of security tooling including static and dynamic analysis, software composition analysis More ❯
filer solutions. Exposure to data services: Cloud SQL, managed databases, MongoDB. Messaging systems: Kafka, RabbitMQ and EMS; API gateways like Apigee. Observability tools: Prometheus, Grafana, Cloud Monitoring. IAM and secretsmanagement: dynamic secrets, Vault. Test-driven development and automated testing frameworks. Several years of real-world cloud engineering experience. Personal Attributes Curious and growth-oriented, always seeking More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Lorien
filer solutions. Exposure to data services: Cloud SQL, managed databases, MongoDB. Messaging systems: Kafka, RabbitMQ and EMS; API gateways like Apigee. Observability tools: Prometheus, Grafana, Cloud Monitoring. IAM and secretsmanagement: dynamic secrets, Vault. Test-driven development and automated testing frameworks. Several years of real-world cloud engineering experience. Personal Attributes Curious and growth-oriented, always seeking More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Lorien
filer solutions. Exposure to data services: Cloud SQL, managed databases, MongoDB. Messaging systems: Kafka, RabbitMQ and EMS; API gateways like Apigee. Observability tools: Prometheus, Grafana, Cloud Monitoring. IAM and secretsmanagement: dynamic secrets, Vault. Test-driven development and automated testing frameworks. Several years of real-world cloud engineering experience. Personal Attributes Curious and growth-oriented, always seeking More ❯
AKS), Terraform, Azure DevOps. Develop, deploy, and manage containerized applications using AKS. Ensure high availability and scalability of microservices. Implement best practices for container orchestration and monitoring. Implement automated secretsmanagement workflows. Design and maintain CI/CD pipelines using Azure DevOps. Automate testing, building, and deployment processes. Integrate with other tools and services for seamless workflows. Develop More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Computappoint
infrastructure using Terraform/Bicep for AKS, container registries, application services, and networking Implement monitoring, alerting, and observability frameworks with SLOs and diagnostic tools Enforce security through access controls, secretsmanagement, vulnerability scanning, and policy-as-code Manage environment consistency and optimise cloud costs through performance monitoring and capacity planning Create reusable automation tools, templates, and documentation for … as Code with Terraform or Bicep Extensive CI/CD pipeline experience with GitHub Actions or Azure Pipelines Background in observability and telemetry solutions Understanding of cloud security, identity management, and compliance frameworks Networking fundamentals and familiarity with Azure databases and messaging services Scripting skills (Bash/PowerShell/Python) and Linux system administration Strong Azure experience: AKS, Container … Registry, App Services, Virtual Networks, API Management, monitoring tools Azure certifications (AZ-104, AZ-400, CKA) advantageous To be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this vacancy. More ❯
Deploy and manage containerized applications in AKS, ensuring theyre scalable and resilient Build and maintain CI/CD pipelines using Azure DevOps, automating testing, builds, and deployments Implement secure secretsmanagement workflows and cloud security best practices Develop reusable Terraform modules to support consistent infrastructure as code Write scripts and automation tools using PowerShell, Bash, and Azure CLI More ❯
and manage containerized applications in AKS, ensuring they’re scalable and resilient Build and maintain CI/CD pipelines using Azure DevOps, automating testing, builds, and deployments Implement secure secretsmanagement workflows and cloud security best practices Develop reusable Terraform modules to support consistent infrastructure as code Write scripts and automation tools using PowerShell, Bash, and Azure CLI More ❯
infrastructure-as-code (Terraform, Helm) Understanding of security frameworks (ISO 27001, NIST, CIS Benchmarks) Bonus Points Certifications: AWS Security Specialty, CISSP, or CKS Experience with zero-trust architectures or secretsmanagement (Vault, AWS KMS) Contributions to open-source security tools or DevSecOps communities With Myn, you gain a trusted partner dedicated to helping people excel in their careersconnecting More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Intelix.AI
Engineer – Access & Automation (IAM/PAM/Cloud) Permanent | Hybrid (UK) £90K–£115K + Bonus + Benefits Overview Senior Identity Security Engineer to lead and modernise its Privileged Access Management (PAM) and Identity & Access Management (IAM) landscape. This position is integral to developing secure, automated, and scalable access solutions across multi-cloud and hybrid environments, ensuring compliance with … strengthen access governance and monitoring. Support compliance and audit readiness aligned with frameworks such as ISO 27001, NIST, and GDPR . Contribute to roadmap development for non-human identity management , secrets automation, and privileged session oversight. Required Experience Strong background in Identity & Access Management or Privileged Access Engineering within enterprise or regulated settings. Proven hands-on experience More ❯
Engineer – Access & Automation (IAM/PAM/Cloud) Permanent | Hybrid (UK) £90K–£115K + Bonus + Benefits Overview Senior Identity Security Engineer to lead and modernise its Privileged Access Management (PAM) and Identity & Access Management (IAM) landscape. This position is integral to developing secure, automated, and scalable access solutions across multi-cloud and hybrid environments, ensuring compliance with … strengthen access governance and monitoring. Support compliance and audit readiness aligned with frameworks such as ISO 27001, NIST, and GDPR . Contribute to roadmap development for non-human identity management , secrets automation, and privileged session oversight. Required Experience Strong background in Identity & Access Management or Privileged Access Engineering within enterprise or regulated settings. Proven hands-on experience More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures—and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identity and access management (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable … data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and AI/ML workloads. Leverage automation frameworks and IaC to More ❯
enforce compliance, standardise environments, and eliminate manual tasks. Collaborate with InfoSec and SRE teams to embed security into the software delivery lifecycle. Implement control gates and security infrastructure (e.g. secretsmanagement, encryption at rest/in transit). Add low-latency capabilities to infrastructure (e.g. core pinning, kernel bypass network drivers). Contribute to architectural evolution in line … IPS, networking, performance tuning). Experience debugging networking and storage subsystems. Programming/scripting skills in Go, Python, or similar. Desirable Skills Hands-on experience with HashiCorp Vault, certificate management, and related security tools. Low-latency architecture in Kubernetes (core pinning, kernel bypass). Security tooling integration into CI/CD pipelines. Contribution to/maintenance of Kubernetes operators. More ❯
enforce compliance, standardise environments, and eliminate manual tasks. Collaborate with InfoSec and SRE teams to embed security into the software delivery lifecycle. Implement control gates and security infrastructure (e.g. secretsmanagement, encryption at rest/in transit). Add low-latency capabilities to infrastructure (e.g. core pinning, kernel bypass network drivers). Contribute to architectural evolution in line … IPS, networking, performance tuning). Experience debugging networking and storage subsystems. Programming/scripting skills in Go, Python, or similar. Desirable Skills Hands-on experience with HashiCorp Vault, certificate management, and related security tools. Low-latency architecture in Kubernetes (core pinning, kernel bypass). Security tooling integration into CI/CD pipelines. Contribution to/maintenance of Kubernetes operators. More ❯
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including data loss prevention (DLP), secretsmanagement, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … Apply SRE principles to improve reliability, performance, and maintainability of security services. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards More ❯
understanding of API design and distributed system architecture Experience building modern UIs with Next.js or React Knowledge of networked devices , hardware APIs , and device provisioning Familiarity with Windows device management and Android/iOS tablets Experience with observability tools — metrics, structured logging, alerting, and dashboards Security-first mindset with knowledge of PCI-DSS principles and secretsmanagementMore ❯
understanding of API design and distributed system architecture Experience building modern UIs with Next.js or React Knowledge of networked devices , hardware APIs , and device provisioning Familiarity with Windows device management and Android/iOS tablets Experience with observability tools — metrics, structured logging, alerting, and dashboards Security-first mindset with knowledge of PCI-DSS principles and secretsmanagementMore ❯
Sr. Cloud Security Architect professionals to be part of leading-edge technology projects. Cognizant's Cloud, Infrastructure & Security Services Practice provides end-to-end solutions covering architecture, design, implementation, management, and on-going support across the entire enterprise technology infrastructure. Our services include a spectrum of management, consulting, and systems integration services to help our clients maximize value … their infrastructure resources, while optimizing infrastructure performance and cost. Key Responsibilities: Design, implement, and maintain scalable security solutions using AWS services such as AWS WAF, AWS Shield Advanced, AWS Secrets Manager, AWS Inspector, AWS Macie, AWS GuardDuty, AWS Detective, AWS CloudTrail, and AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure … troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and Optimization Configure and optimize security measures, including IAM policies, security groups, network access controls, and encryption protocols. Monitoring and Incident Response Monitor More ❯
of support requests are the Team's goals.Knowledge and experience of build tools - Maven and Gradle Knowledge and experience of relational DBMS - PostgresdbKnowledge of using AWS services via Terraform - Secrets Manager, Kinesis Firehose, S3, Open Search etcKnowledge and experience of configuring and using New Relic, Kibana for observing metrics and configuring alerts.Knowledge and experience of using Docker, containers, helm … processes, coding best practices, and code reviews. • Operate in various development environments (Agile, Waterfall, etc.) while collaborating with key stakeholders. • Train entry-level software engineers as directed by department management, ensuring they are knowledgeable in critical aspects of their roles. Responsibilities: We promote a healthy work/life balance across the organisation. We offer an appealing working prospect for More ❯
of support requests are the Team's goals.Knowledge and experience of build tools - Maven and Gradle Knowledge and experience of relational DBMS - PostgresdbKnowledge of using AWS services via Terraform - Secrets Manager, Kinesis Firehose, S3, Open Search etcKnowledge and experience of configuring and using New Relic, Kibana for observing metrics and configuring alerts.Knowledge and experience of using Docker, containers, helm … processes, coding best practices, and code reviews. • Operate in various development environments (Agile, Waterfall, etc.) while collaborating with key stakeholders. • Train entry-level software engineers as directed by department management, ensuring they are knowledgeable in critical aspects of their roles. Responsibilities: We promote a healthy work/life balance across the organisation. We offer an appealing working prospect for More ❯
and productivity applications in the legal sector for an AVI-SPL client, including Microsoft 365, Google Workspace, Zoom, and other SaaS tools. The role focuses on solution configuration, lifecycle management, and technical enablement. It involves close collaboration with internal teams and stakeholders to ensure applications are secure, scalable, and efficiently integrated. Successful execution drives application adoption, operational excellence, and … improved user experience in legal environments. WHAT WE’RE LOOKING FOR: Implementation of Single Sign-On (SSO) and Application Registrations. Housekeeping and management of certificates and secrets, including expirations, renewals, and removals. Tenancy-level global M365 configuration and administration, including Entra Connect and Intune. Phased implementation of Conditional Access policy changes, including management of user accounts experience … and contribution to communications and training. CoreView Configuration Manager administration. BYOD and Corporate Device Management via Intune, including MAM, App Protection, Apple Business Manager, and Android Enterprise. Management of EntraID services, including EntraID Connect, Entra Cloud Sync, Conditional Access, MFA, App Registrations, SSO, B2B, B2C, and Passwordless authentication. Purview within M365, including Information Protection, Retention, Sensitivity Labels, e More ❯