Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures—and business purpose. We work in a uniquely collaborative model across the firm and … allow our clients to thrive. What You'll Do This role focuses on designing, implementing, and tracking cloud security enhancements with a specialization in SecretsManagement across multi-cloud and SaaS environments. You will influence engineering decisions to drive secure and successful business outcomes while collaborating with internal … AT Interacting with stakeholders and possessing the ability to influence direction, articulate risks and advocate for solutions and roadmaps. Managing backlog and roadmap of secretsmanagement items to be completed. Managing end to end delivery of projects with hands on involvement in the development and configuration of products More ❯
product development, and will help establish security standards and guidelines across the enterprise. This role will focus on designing robust public key infrastructure and secretsmanagement solutions to support Cloudflare’s secure authentication processes and encryption solutions for both our internal and client-facing systems, users, and applications. … This role will also include collaborating with cross-functional teams including software engineering, cybersecurity, product management, etc. to integrate key management solutions into the Cloudflare environments. We are looking for a candidate that is passionate about cryptography and security. We are seeking Security Architects or Engineers proficient in … strategy, design, and implementation of public key infrastructure and secretsmanagement solutions to help make a better internet. What You’ll Do Define security requirements for and design efficient public key infrastructure and secretsmanagement solutions in complex environments. Take the lead security role in developing More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, Data Encryption at rest, in transit, and planning for in use, Key Management, Certificate Management, SecretsManagement, Hardware Security Modules … Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of everything we do, helping Britain prosper and protecting the Group and customers from More ❯
technologies of at least one of the major public Cloud Service Providers (GCP, AWS or Azure) and the security features they provide (Key & Secret management, IAM, Service Accounts, Workload/VM Identities, TLS/PKI, Load Balancing, storage encryption, data localization, etc.). Experience on developing & comprehending source code … in Web- and Cloud-relevant languages, such as Java, Ruby, Rust, Go, Python, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, access management, and secretsmanagement technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied … Experience in identifying and mitigating security vulnerabilities on software running on cloud platforms (OWASP Web Top10 vulnerabilities, data encryption, transport layer protections, insecure configurations, secretsmanagement, etc.). Experience with cloud confidential computing, virtualization, enclaves, containers, and workload attestation technologies. Problem solving skills, analytical thinking, and willingness to More ❯
technologies of at least one of the major public Cloud Service Providers (GCP, AWS or Azure) and the security features they provide (Key & Secret management, IAM, Service Accounts, Workload/VM Identities, TLS/PKI, Load Balancing, storage encryption, data localization, etc.). Experience on developing & comprehending source code … in Web- and Cloud-relevant languages, such as Java, Ruby, Rust, Go, Python, C#, Lua, and JavaScript. Experience with application authentication, authorization, identity, access management, and secretsmanagement technologies, such as OAuth, MFA, SSO, JWT, PKI, Cloud IAM, Password-less authentication, HashiCorp Vault, etc. Experience with applied … Experience in identifying and mitigating security vulnerabilities on software running on cloud platforms (OWASP Web Top10 vulnerabilities, data encryption, transport layer protections, insecure configurations, secretsmanagement, etc.). Experience with cloud confidential computing, virtualization, enclaves, containers, and workload attestation technologies. Problem solving skills, analytical thinking, and willingness to More ❯
Trellix, Ivanti, ClearSwift, Yubikey. Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT, and Cookie-based authentication. Incident detection and response in MOD environments. Security compliance and regulatory frameworks (e.g., NIST, CIS … advocate for security best practices in a DevOps culture. Desirable Skills Containerization Security Expertise in Kubernetes security (e.g., RBAC, network policies, pod security standards, secretsmanagement). Knowledge of container runtime security (e.g., container escapes, rootless containers, sandboxing). Image security best practices, including scanning, signing, and provenance …/CD pipeline design with security testing using tools like Git and SonarQube. Implementation of Infrastructure as Code (IaC) security (e.g., Terraform, Ansible). Secretsmanagement in CI/CD pipelines using Vault or Kubernetes Secrets. Security automation and policy enforcement using tools like GitHub Actions, GitLab CI More ❯
features that interact directly with NoSQL databases, with a preference for Amazon DocumentDB. Amazon AWS Services: Utilise supporting AWS services, including IAM, SQS, S3, SecretsManagement, and KMS. Collaboration: Work closely with cross-functional teams, including developers, DevOps engineers, and QA engineers, ensuring smooth coordination and delivery. Continuous … Experience in implementing features in NoSQL database environments, preferably Amazon DocumentDB. High-level understanding and practical experience with AWS services like IAM, SQS, S3, SecretsManagement, and KMS. Optional exposure to Gov.CASA frontend implementation. Why Join Us? Be part of a dynamic and innovative team, with opportunities for More ❯
coding, site reliability, systems architecture, and security testing. Requirements Design, implement, and manage security architectures for cloud-based environments, focusing on identity and access management, privileged access management, and secretsmanagement Develop, secure, and maintain CI/CD pipelines using GitOps principles and tools such as … best practices Essential Skills AWS Professional certification or equivalent practical experience AWS Certified Security Specialist certification or equivalent experience Extensive experience in managing AWS Secrets Manager and implementing robust access controls Proven expertise in securing CI/CD pipelines and integrating security practices in DevOps processes Strong background in … catalogues and delivering IT services effectively Proven ability to develop and maintain Internal Business SLOs and SLAs Experienced in conducting penetration testing and vulnerability management Excellent record of maintaining documentation, writing technical blogs, and performing knowledge sharing and show-and-tell sessions Desirable Skills Excellent problem-solving skills and More ❯
driving and supporting improvements globally to our Information Protection Portfolio. You will be: Engaging collaboratively with application development, data protection, information security, and risk management teams to understand and implement data security solutions. Supporting vendor assessments, including proof of concepts & security technologies research Continuously improving data protection services based … connect with skilled technologists and non-technical stakeholders, including members of the C-suite Ability to work in an Agile environment leveraging strong work management, organizational and planning skills You have an ability to work well independently, as well as part of a geographically dispersed team bringing a sense … security techniques and methodologies Experience of using relevant DLP tools such as Symantec DLP, Zscaler CASB, MS Purview & similar Experience in managing DLP IM Management and have good understanding of end-to-end IM processes Experience of working with MS Defender and Intune. Experience of using relevant IRM/ More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
Coordinate with Development and other departments to ensure these systems and records remain accurate and available Plan & Develop automation workflows to streamline deployments, infrastructure management and security processes with dry run testing and complete roll back functionality Analyse, diagnose and rectify system or service errors/faults as tasked … as Terraform, Ansible, PowerShell Experience with monitoring/logging tools SolarWinds, Grafana, Elastic Familiarity with security concepts such as Zero Trust, Identity and Access Management Vulnerability management, OWASP Understanding of CI/CD pipelines Familiar with Entra ID, AD, DNS, Azure Ability to troubleshoot complex issues across various … is desirable) Backup Concepts Database knowledge (MS SQL, Postgres) CI/CD Tools (Azure DevOps pipelines) IAM - OAuth/SAML/OIDC Credentials, Certificates, Secretsmanagement SolarWinds Grafana Elastic Why Microlise? When your groceries arrive at your door or you sign for your online parcel, one or more More ❯
in public cloud (AWS or Azure) Hands-on knowledge of observability tools like Prometheus, Grafana, OpenTelemetry, or Datadog Experience with messaging systems (Kafka) and secretsmanagement (Vault, AWS Secrets Manager) A collaborative leader with strong communication skills and a passion for scalability, availability, and innovation At Matillion More ❯
Key Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secretsmanagement, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and … cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for vulnerability … scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate security into More ❯
Key Responsibilities Secure Development: Collaborate with engineering and IT teams to embed security into systems and applications. Technical Expertise: Provide guidance on secure architecture, secretsmanagement, and best practices. Threat Management: Lead all aspects of penetration testing, bug bounty programs, and vulnerability reporting to mitigate risks and … cyber security role, ideally within a complex, global organisation. Deep expertise in one or more of the following areas: security consultancy, security engineering, vulnerability management or governance. Deep knowledge of modern DevSecOps practices. Experience in leading vulnerability management programs, including expertise in utilising tools and processes for vulnerability … scanning, conducting penetration testing, and delivering actionable reporting to support an effective and comprehensive vulnerability management strategy. Excellent communication and stakeholder management skills, with the ability to convey complex technical issues to non-technical audiences. Hands-on experience collaborating with engineering and development teams to integrate security into More ❯
development, security, and operations. This is an individual contributor role, where you will spearhead initiatives and guide the team on best practices without direct management responsibilities. Key Responsibilities: Design, implement, and maintain secure cloud infrastructure in GCP. Develop and manage infrastructure as code (Terraform, Kubernetes) to ensure repeatable, scalable … operational tasks to improve efficiency and scalability. Ensure compliance with security standards and protocols (e.g., SOC2, ISO27001). Automate security processes, such as key management, vulnerability scanning, and incident response. Lead the response to security breaches or system failures, including incident analysis, mitigation, and recovery. Own the continuous integration … tools such as Jenkins, GitLab CI/CD, Docker, Kubernetes, and Helm. Hands-on experience with security practices like vulnerability scanning, encryption, authentication, and secretsmanagement (Vault, Key Management Service). Experience with SIEM platforms (Splunk, Datadog, or equivalent) for monitoring and threat detection. You thrive when More ❯
advantage and deliver value for our clients. Your role will involve designing and deploying solutions to the cloud which will allow automatic provisioning and management of environments, the capability to continuously integrate and containerisation functionality and the automation of testing. Required education None Preferred education Associate's Degree/… College Diploma Required technical and professional expertise Must be able to build new DevOps pipelines: AWS S3, RDS, Route 53, IAM, EKS, Secrets Manager, ECR Terraform Deployment of AWS Resources, Pipelines, OCI Observability: ELK, Dynatrace, Prometheus Others: Vault, RedHat As an equal opportunities employer, we welcome applications from individuals More ❯
advantage and deliver value for our clients. Your role will involve designing and deploying solutions to the cloud which will allow automatic provisioning and management of environments, the capability to continuously integrate and containerisation functionality and the automation of testing. Required education None Preferred education Associate's Degree/… College Diploma Required technical and professional expertise Must be able to build new DevOps pipelines AWS S3 RDS Route 53 IAM EKS Secrets Manager ECR Terraform Deployment of AWS Resources Pipelines OCI Observability ELK Dynatrace Prometheus Others Vault RedHat As an equal opportunities’ employer, we welcome applications from individuals More ❯
advantage and deliver value for our clients. Your role will involve designing and deploying solutions to the cloud which will allow automatic provisioning and management of environments, the capability to continuously integrate and containerisation functionality and the automation of testing. Required education None Preferred education Associate's Degree/… College Diploma Required technical and professional expertise Must be able to build new DevOps pipelines AWS S3 RDS Route 53 IAM EKS Secrets Manager ECR Terraform Deployment of AWS Resources Pipelines OCI Observability ELK Dynatrace Prometheus Others Vault RedHat As an equal opportunities employer, we welcome applications from individuals More ❯