Greater London, England, United Kingdom Hybrid / WFH Options
Tardis Tech
a team of engineers, fostering a culture of innovation, excellence, and continuous improvement. You will leverage your leadership skills in mentoring, coaching, and conflict management to enhance team performance while driving the development of platform services with vision and purpose. In addition to hands-on software development, including … context of distributed systems. Desirable Qualifications Experience with Platform as a Service (PaaS) and the transformation of those into a product Familiarity with IdentityAccessManagement (IAM) Ability to own projects, define requirements, and lead development and support initiatives. Excellent problem-solving skills, with more »
Collaborate closely with business stakeholders to understand the organisation's identityandaccessmanagement requirements. * Ensure the project complies with regulatory standards such as GDPR, HIPAA, or SOX. * Identify and address potential risks related to user access, roles, and entitlements within the … Define project milestones, timelines, and deliverables to ensure timely project execution. * Allocate necessary resources, including skilled personnel, software, and infrastructure, appropriately. * Establish and enforce access control policies to grant appropriate access to users, adhering to principles like least privilege and separation of duties. * Automate processes for … user onboarding, role assignment, and de-provisioning to enhance efficiency and minimise human error. * Automate and manage periodic access certification campaigns to ensure user access compliance with organisational policies. * Oversee the configuration and maintenance of SailPoint to ensure it aligns with business objectives. * Coordinate with third more »
relevant best development practices, documentation and transparency can be put in place with external partners in collaboration with internal service delivery, the project management team and the Group IT team to support digital change, growth and scale as well as provide practices and technical foundations for innovation. Our … mitigation efforts. Implement robust security controls, encryption mechanisms, and incident response procedures to mitigate security risks proactively. Good to have: IdentityandAccessManagement (IAM): Design and implement robust IAM frameworks to safeguard sensitive data and ensure secure access control. Develop policies … and procedures for user authentication, authorization, andidentity governance. Stay abreast of emerging IAM trends and best practices to continuously enhance our security posture. Data Strategy & Governance: Define and implement data strategies to effectively manage, analyse, and leverage vast amounts of educational content and user data. Establish data more »
and security management. Key Responsibilities: Design and implement Azure Landing Zones (LZ) based on Microsoft Enterprise Scale Architecture principles, including IdentityandAccessManagement (IAM), Governance, Cost Management, Monitoring, and Policy-as-code. Build and deploy cloud-native microservices leveraging Microsoft Azure … technologies, focusing on AKS, serverless solutions (ASP, Function Apps), and API Management. Hands-on involvement in the setup andmanagement of Azure Networking and Security, including Hub and Spoke architecture, Frontdoor, Firewall configurations, and security tooling like Defender and Sentinel. Implement Infrastructure-as-Code (IaC) solutions using Azure … Service (AKS) for container orchestration and management. Collaborate effectively with cross-functional teams, offering guidance and technical support to ensure the successful deployment andmanagement of cloud infrastructure. Required Skills & Experience: Extensive experience in Azure Landing Zone design and Microsoft Enterprise Scale Architecture principles. Proven hands-on experience more »
Responsibilities : Enhance cloud platform functionality, security, and compliance Drive service improvements and operational excellence Conduct risk assessments and manage escalations Recommend IT service management best practices Integrate security into cloud solutions Automate infrastructure provisioning with IaC tools Monitor and troubleshoot system performance Maintain … secure and compliant environments Collaborate with application and data teams Develop disaster recovery strategies Implement governance processes and policies Optimize monitoring, alerting, and incident management Technical Skills : Expertise in cloud engineering and automation Strong CI/CD processes and tools skills Proficiency in managing EntraID Conditional Access … Proficiency with IaC, cloud networking, and security Strong skills in Azure App registrations, Enterprise Apps and associated permissions Administration of identityandaccessmanagement Knowledge of Azure services and cloud platform technologies Experience with role-based access control and managed identities Familiarity more »
end-user experience. This role will report directly to the Head of Architecture & Engineering. The ideal candidate will leverage cloud-native technologies and automate infrastructure management to align technology solutions with our strategic goals. The ideal candidate will have a proven track record in a scale-up environment … infrastructure to the cloud environment. Optimize cloud resources for cost-effectiveness and performance. Implement and enforce cloud security measures, including identityandaccessmanagement, data protection, and compliance with regulations such as GDPR and SOC 2. Provide technical leadership and mentorship to junior team … in Azure IaaS (virtual machines, storage, networking, security). Experience with Azure Backup & Recovery Services. Knowledge of Azure Governance (Blueprints, policies, tagging, cost management). Proficiency with Azure SQL Databases (Managed Instances, PaaS, IaaS). Experience with Azure Security (Zero Trust, Defender for Cloud, Sentinel, Azure AD, AIP more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
EMBL-EBI
Biology Laboratory, is a worldwide leader in the storage, analysis and dissemination of large biological datasets. We provide the global research community with access to publicly available databases and tools which are crucial for the advancement of healthcare, food security, and biodiversity. Job description: As the Cyber Security … and prevention systems (IDPS) - Security information and event management (SIEM) system - Vulnerability scanning and penetration testing - Cloud security - Identityandaccessmanagement (IAM) - Data loss prevention (DLP) - Endpoint protection - Security operations and incident response Experience in developing and implementing security policies, procedures more »
one of LinkedIn's Top Companies for 2024 We have an exciting opportunity for an experienced Analyst, skilled in Windows Enterprise, Modern Device ManagementandIdentityandAccess Management. As an analyst, you'll have experience in comprehensive support in technology solutions within M365. … be involved in the ongoing development, optimization, and enhancement of security, performance, and usability within M365 services, requiring technical knowledge in Modern Device Management techniques, Windows Enterprise, endpoint security, application deployment, andIdentityandAccess Management. Your experience should include Microsoft Entra ID for … secure user managementand effective use of Entitlement Management. You should be aware of Intune's modern device provisioning techniques such as Autopilot and application deployment methods like MSIX. Experience in PowerShell and other scripting languages are essential, with additional experience in managing Apple devices using platforms like more »
one of LinkedIn's Top Companies for 2024 We have an exciting opportunity for an experienced Analyst, skilled in Windows Enterprise, Modern Device ManagementandIdentityandAccess Management. As an analyst, you'll have experience in comprehensive support in technology solutions within M365. … be involved in the ongoing development, optimization, and enhancement of security, performance, and usability within M365 services, requiring technical knowledge in Modern Device Management techniques, Windows Enterprise, endpoint security, application deployment, andIdentityandAccess Management. Your experience should include Microsoft Entra ID for … secure user managementand effective use of Entitlement Management. You should be aware of Intune's modern device provisioning techniques such as Autopilot and application deployment methods like MSIX. Experience in PowerShell and other scripting languages are essential, with additional experience in managing Apple devices using platforms like more »
one of LinkedIn's Top Companies for 2024 We have an exciting opportunity for an experienced Analyst, skilled in Windows Enterprise, Modern Device ManagementandIdentityandAccess Management. As an analyst, you'll have experience in comprehensive support in technology solutions within M365. … be involved in the ongoing development, optimization, and enhancement of security, performance, and usability within M365 services, requiring technical knowledge in Modern Device Management techniques, Windows Enterprise, endpoint security, application deployment, andIdentityandAccess Management. Your experience should include Microsoft Entra ID for … secure user managementand effective use of Entitlement Management. You should be aware of Intune's modern device provisioning techniques such as Autopilot and application deployment methods like MSIX. Experience in PowerShell and other scripting languages are essential, with additional experience in managing Apple devices using platforms like more »
Exeter, Devon, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
ISO, SOC, etc. Qualifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Azure Security Engineer Associate (AZ-500) (Good to have) IdentityandAccessmanagement (SC-300) (Good to have) Device Management (MD-102) (Good to have) ITIL v4 (Good to have) Windows more »
the collection of data from tools such as GitHub, Snyk, SonarCloud, JIRA, Confluence, etc, and ensure compliance with the IAG identityandaccessmanagement solution. Develop tooling, API integrations to SaaS tools, and automation solutions to provide engineering and productivity metrics to collect insights … to learn GitHub Copilot experience preferred Forming strong stakeholder relationships, with a proven ability of influencing and persuading internally and externally Effective stakeholder management, balancing and finding compromises between opposing views and opinions Business partnering, working as a valued partner with stakeholders across a diverse operation, delivering avalue … belong to. To help make this a reality, our people strategy focuses on six key domains: Engagement, Talent Management, Reward and Recognition, Performance Management, Learning and Development and Culture. We understand the importance of Diversity and Inclusion in the workplace to deliver this strategy everyone should more »
the collection of data from tools such as GitHub, Snyk, SonarCloud, JIRA, Confluence, etc, and ensure compliance with the IAG identityandaccessmanagement solution. Develop tooling, API integrations to SaaS tools, and automation solutions to provide engineering and productivity metrics to collect insights … to learn GitHub Copilot experience preferred Forming strong stakeholder relationships, with a proven ability of influencing and persuading internally and externally Effective stakeholder management, balancing and finding compromises between opposing views and opinions Business partnering, working as a valued partner with stakeholders across a diverse operation, delivering a … belong to. To help make this a reality, our people strategy focuses on six key domains: Engagement, Talent Management, Reward and Recognition, Performance Management, Learning and Development and Culture. We understand the importance of Diversity and Inclusion in the workplace to deliver this strategy - everyone should more »
Michelin to Roche to Blue Yonder and beyond, offering unmatched control over APIs and event streams. Our rapid growth and leadership in API management are fueled by our team's commitment to excellence and our core values: Passion : We bring excitement to everything we do, constantly innovating to … of our team and customers. Join us on this journey. Be part of a team that's redefining what's possible in API management, and shaping the future of digital transformation. The possibilities are endless-be a part of the revolution! THE ROLE & WHY IT EXISTS Gravitee.io is … plus. Experience of Large Scale Scrum (LeSS) a plus. Experience working on API Management software and/or IdentityandAccessManagement software and concepts. Familiarity with CI/CD pipelines and DevOps practices. Experience leading distributed or remote teams. Ability to more »
Cloud and AI team, establish technical standards, lead architectural decision-making, and proactively share knowledge with colleagues. This role does not involve line management, but at VivaCity we view principal engineers as leaders, working alongside engineering managers. You will provide mentorship, technical guidance and training to engineers across … you know when and how to ask for help. Requirements for the role Deep expertise in Apache Kafka (ideally Kafka Strimzi), including broker management, scaling, upgrades, and integration with high-throughput data pipelines. Strong experience designing, implementing and managing cloud infrastructure with a focus on reliability, simplicity, and … infrastructure management tools (e.g. Ansible, Chef, Puppet) Experience with internal developer platforms. Knowledge of information security principles, including identityandaccessmanagementand authentication/authorisation processes. Experience in a start-up or scale-up environment. Passion for sustainability, transport or smart more »
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
standards, and guidelines. Collaborate with the Compliance Manager/CISO to ensure adherence to regulatory requirements (e.g., GDPR, ISO 27001). Incident Response andManagement: Establish and maintain incident response plans and procedures. Lead technical response efforts during security incidents or breaches. Conduct post-incident analyses to prevent … preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identityandaccessmanagement, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or more »
best practices and regulatory compliance (e.g., GDPR, HIPAA) and their applications in data platform implementations. This also encompasses experience with identityandaccessmanagement (IAM), encryption, and data masking techniques. These are the types of questions that you'll be asked by our clients … buy/sell option Electric vehicle scheme Training opportunities and incentives - we support professional certifications across engineering and non-engineering roles, including unlimited access to O'Reilly Giving back - the ability to get involved nationally and regionally with partnerships to get people from diverse backgrounds into tech You more »
GCP) using IaC tools. Work with cloud platforms (e.g., AWS, Azure, Google Cloud) to ensure secure configurations, network architecture, andidentityandaccessmanagement (IAM) policies. Leverage cloud-native security tools such as AWS GuardDuty, CloudTrail, Security Hub, and Azure Security Center to monitor more »
GCP) using IaC tools. Work with cloud platforms (e.g., AWS, Azure, Google Cloud) to ensure secure configurations, network architecture, andidentityandaccessmanagement (IAM) policies. Leverage cloud-native security tools such as AWS GuardDuty, CloudTrail, Security Hub, and Azure Security Center to monitor more »
to £90,000 Depending on experience Employment Type: Full-Time Function description: Support the delivery of the Third-Party Risk/Vendor Management process … including managing assessments and tooling. Play a key role in supporting the Cyber Intelligence, Threat Detection, Crisis Preparedness and Response, Penetration Testing and Vulnerability Management efforts at the OSB. Support operational workflows by performing risk-based security reviews of operational systems, applications and third-party integrations. Engage with … assessments of applications, systems, and networks, to identify potential weaknesses and ensure adequate defence against exploits of applicable vulnerabilities. Monitor identityandaccessmanagement, including monitoring for abuse of permissions by authorised system users. Generate customised reports for both technical and non-technical staff more »
Employment Type: Permanent
Salary: £75000 - £90000/annum Depending on experience
about helping our clients succeed in an ever-changing industry. We are/have: Experts in Banking & Payments, Capital Markets, Insurance, Wealth & Asset Managementand Energy Deep knowledge in financial services offering, including e.g. Finance, Risk and Compliance, Financial Crime, Core Banking etc. Committed to growing our business … expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identityandaccessmanagement, or offensive security engineering is desirable An understanding of the end to end technology delivery lifecycle, with exposure to working … and software delivery professionals. Industry/domain experience and expertise within at least one of Capital Markets, Retail Banking & Payments, Insurance, Wealth & Asset Management or Energy. Commercially minded with experience of business development & other capability development activities if joining at more senior grades (Principal Consultant/Managing Principal more »
Richmond upon Thames, Greater London, Twickenham, United Kingdom
JP Engineering
take ownership of all infrastructure projects and tasks. Some key responsibilities include • Support and monitor Cloud based Production Systems. • Administrate IdentityandAccessManagement across Cloud technologies. • Creation and maintenance of Terraform scripts to deploy updates to existing Cloud services, and to create new … implementing infrastructure including, but not limited to the following: • AWS Infrastructure Support Windows server 2022 in an Active directory environment • Windows 11 • Patch Management deployment • Excellent knowledge of supporting and maintaining server hardware • TCPIP/DHCP/DNS/WINS • SQL 2012 and above • Office 365 • Cisco Switches more »
to ensure the confidentiality, integrity, and availability of our systems and data. Sub-functions responsible for: Security Architecture Security Engineering IdentityandAccessManagement What you will do: Security Architecture Leadership - Develop and maintain the company's security architecture framework, ensuring alignment with business … and maintain strong relationships with senior stakeholders across the business to align security initiatives with the overall technology and business strategy. Team Development andManagement - Recruit, train, and manage a high-performing cybersecurity operations team. Foster a culture of continuous learning, skill development, and collaboration within the team. … Budget Management - Manage the security budget, including resource allocation, cost control, and procurement. Vendor Management - Oversee security-related vendor relationships and contracts. What we're looking for: Skills & Experience Bachelor's or master's degree in computer science, Information Security, or a related field. Proven experience more »
East London, London, United Kingdom Hybrid / WFH Options
Colt Technology Services UK
the confidentiality, integrity, and availability of our systems and data. Sub-functions responsible for: Security Architecture Security Engineering Threat Intelligence IdentityandAccessManagement What you will do: Security Architecture Leadership - Develop and maintain the company's security architecture framework, ensuring alignment with business … and maintain strong relationships with senior stakeholders across the business to align security initiatives with the overall technology and business strategy. Team Development andManagement - Recruit, train, and manage a high-performing cybersecurity operations team. Foster a culture of continuous learning, skill development, and collaboration within the team. … Budget Management - Manage the security budget, including resource allocation, cost control, and procurement. Vendor Management - Oversee security-related vendor relationships and contracts. What were looking for: Skills & Experience Bachelor's or masters degree in computer science, Information Security, or a related field. Proven experience in security more »