London, England, United Kingdom Hybrid / WFH Options
CDP
certification. Manage our 3rd Party due-diligence process, assessing vendors and responding to customer security questionnaires. Maintain robust role-basedaccesscontrol, ensuring all personnel have IT access limited to their need and role within the organisation. more »
Proficiency in Infrastructure-as-Code (e.g., ARM, Terraform, Bicep). Strong understanding of networking (VNETs, VPNs, ExpressRoute), security, and identity management (Azure AD, RBAC). Experience with cloud migration and modernization projects. Knowledge of DevOps practices, CI/CD pipelines, and tools like Azure DevOps or GitHub Actions. Strong more »
Hook, England, United Kingdom Hybrid / WFH Options
BCA UK
Identity and Governance, or Azure Identity Lifecycle. Proficiency in configuring SSO for applications in Entra using SAML/OAUTH/OIDC Knowledge of the RBAC model for Entra role assignments Expertise in Identity Access Management for Azure Subscriptions, Azure AD, Azure AD Connect, and Azure AD more »
and test the CI/CD pipelines for the RPA UIPath code, including linting and code scanning checks Reviewing, designing and implementing a new RBAC model for the INFR and DEV teams Azure privileged access across 4 x platforms Migrate DNS Entries for Private Endpoints to central DNS zones more »
Ansible, and PowerShell. Hands-on experience with Azure Kubernetes Service (AKS), Docker, and cloud governance tools. Proficient in networking and security practices, including RBAC and Azure policies. Familiarity with monitoring solutions and cloud-based high-availability systems. Knowledge of Active Directory, VMware, and Meraki networks for more »
and test the CI/CD pipelines for the RPA UIPath code, including linting and code scanning checks Reviewing, designing and implementing a new RBAC model for the INFR and DEV teams Azure privileged access across 4 x platforms Setting up and maintenance of DevOps repositories, branching strategies, with more »
and test the CI/CD pipelines for the RPA UIPath code, including linting and code scanning checks Reviewing, designing and implementing a new RBAC model for the INFR and DEV teams Azure privileged access across 4 x platforms Setting up and maintenance of DevOps repositories, branching strategies, with more »
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Experis
management of user identities across the entire lifecycle, including provisioning, de-provisioning, and role-basedaccess controls (RBAC). 3-5 years of experience in IAM, data analytics, or information security, preferably within a financial institution or regulated industry. Technical Skills: Proficiency more »
and test the CI/CD pipelines for the RPA UIPath code, including linting and code scanning checks · Reviewing, designing and implementing a new RBAC model for the INFR and DEV teams Azure privileged access across 4 x platforms · Setting up and maintenance of DevOps repositories, branching strategies, with more »
. Ensuring compatibility with authentication protocols like RADIUS, TACACS+, and 802.1X. Configuring and testing network access policies (e.g., role-basedaccesscontrol). Testing and Troubleshooting Conducting system and integration tests to verify functionality. Diagnosing and resolving issues related to authentication more »
compatibility with authentication protocols like RADIUS, TACACS, and 802.1X. br br Configuring and testing network access policies (e.g., role-basedaccesscontrol). br br Testing and Troubleshooting Conducting system and integration tests to verify functionality. br br Diagnosing and resolving more »
seamless integration and security across multiple cloud environments. Skills Required: Strong experience with Azure AD , AWS IAM , and PowerShell scripting . Expertise in RBAC , MFA , PIM , and security best practices. Proficiency in AWS integration and multi-cloud environments . UKSC/NATO Secret Security Clearance required. Key more »
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging more »
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting more »
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging more »
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting more »
ll also look for your experience and knowledge in: • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • CyberARK • IT asset management and tracking • Vulnerability Management and Patching • Containerisation and virtual machine security • Delivering secure solutions more »
with testing frameworks and methodologies, including unit testing, integration testing and automated testing. Security Best Practices: knowledge of security best practices (e.g., RBAC, ABAC) in software application development. Containerisation: familiarity with Kubernetes for deploying and managing data pipelines in a containerised environment. Cloud Hosting: experience with cloud hosting more »
are met. Candidate Requirements: Expertise in Power BI and SQL, with hands-on experience in advanced features like Incremental Refreshing, Role-basedSecurity (ROS), and version control. Proficiency in SQL techniques, including joins and windowing functions, with a focus on performance optimisation. A more »
relationships within Dataverse. Azure Integration: Integrate Power Platform with Azure services (e.g., Logic Apps, Functions). Security & Compliance: Implement role-basedsecurity and data governance. Reporting & Dashboards: Create interactive dashboards/reports using Power BI. DevOps: Manage CI/CD pipelines for more »
use with Power Platform solutions. Integrate Power Platform solutions with Azure services (e.g., Logic Apps, Functions) for extended functionality. Implement role-basedsecurity, data governance, and compliance standards within the Power Platform ecosystem. Experience with CI/CD pipelines for deploying Power Platform more »
understanding of resilient network solutions to support vSphere solutions. Good experience of enterprise SAN solutions and specifically iSCSI focussed. AD, DNS, DHCP, Routing, Vlans, RBAC, port groups with knowledge and impacts on a vSphere platform. Linux knowledge is good to have. Experienced in analysis and trouble-shooting technical issues, and more »
managing the establishment of a connection between in scope data sources & EDP • New Data roles/structures - propose changes and undertaken updates to data RBAC, including appropriate ACLs at gold layer • Data interfaces - project manage the establishment of an incremental data load from source to Bronze layer (raw) as per more »
Directory (Azure AD) Managing hybrid identities (Azure AD Connect, AD DS). Configuring conditional access and identity protection. Role-basedaccesscontrol (RBAC) and permissions. Deploying and managing Virtual Machines (VM’s). Azure Resource Management : Deploying and managing resources using more »