troubleshoot, and enhance pipeline performance. Apply best practices to improve throughput and latency. 5. Security and Compliance: Implement secure access using Azure RBAC and managed identities. Ensure compliance with data privacy standards. 6. Collaboration and Documentation: Partner with architects and business stakeholders to align technical solutions with business more »
container orchestration to ensure efficient management and orchestration of containerised applications, including automated deployment, scaling, and management Experience with security best practices including RBAC, image scanning, pod security policies, container security & network policies Enabling continuous delivery while ensuring reliability, quality, observability, and performance Understanding of observability and more »
Manchester, North West, United Kingdom Hybrid / WFH Options
83zero Limited
container orchestration to ensure efficient management and orchestration of containerised applications, including automated deployment, scaling, and management Experience with security best practices including RBAC, image scanning, pod security policies, container security & network policies Enabling continuous delivery while ensuring reliability, quality, observability, and performance Understanding of observability and more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
83zero Limited
container orchestration to ensure efficient management and orchestration of containerised applications, including automated deployment, scaling, and management Experience with security best practices including RBAC, image scanning, pod security policies, container security & network policies Enabling continuous delivery while ensuring reliability, quality, observability, and performance Understanding of observability and more »
West Bromwich, Staffordshire, United Kingdom Hybrid / WFH Options
ensure efficient management and orchestration of containerised applications, including automated deployment, scaling, and management/li li Experience with security best practices including RBAC, image scanning, pod security policies, container security & network policies/li li Enabling continuous delivery while ensuring reliability, quality, observability, and performance/ more »
system performance and implementing efficiency enhancements through code changes. Ensure compliance with security standards and data protection regulations, implementing role-basedsecurity and data encryption. Continuously improve the system, ensuring all development is tested and stable through version upgrades, and making changes more »
future development. Implement and maintain access to data warehouse and databases using RoleBasedAccess Controls (RBAC) principles. Required Team leadership and development MSSQL/MS SQL Azure Database developer Database architecture and design including pros and cons of relevant schemas/ more »
future development. Implement and maintain access to data warehouse and databases using RoleBasedAccess Controls (RBAC) principles. Required Team leadership and development MSSQL/MS SQL Azure Database developer Database architecture and design including pros and cons of relevant schemas/ more »
future development. Implement and maintain access to data warehouse and databases using RoleBasedAccess Controls (RBAC) principles. Experience Required: Team leadership and development MSSQL/MS SQL Azure Database architecture and design including pros and cons of relevant schemas/structure more »
Experience of the CSM module. Experience with ServiceNow ITSM, Service Portal, Service Catalogue, CMDB, Performance Analytics and Reporting. Demonstrable knowledge of Domain Separation and RBAC controls. Demonstrable knowledge of Platform Integrations and data normalisation. Demonstrable knowledge of scripting in one or more of the following: JavaScript, Web Services, HTML, Angular more »
understanding of resilient network solutions to support vSphere solutions. * Good experience of enterprise SAN solutions and specifically iSCSI focussed. * AD, DNS, DHCP, Routing, Vlans, RBAC, port groups with knowledge and impacts on a vSphere platform. * Linux knowledge is good to have. * Experienced in analysis and trouble-shooting technical issues, and more »
managing the establishment of a connection between in scope data sources & EDP New Data roles/structures - propose changes and undertaken updates to data RBAC, including appropriate ACLs at gold layer Data interfaces - project manage the establishment of an incremental data load from source to Bronze layer (raw) as per more »
Workday security across HCM, Fins, and related modules, ensuring robust, secure, and compliant systems. Key Responsibilities: Configure and maintain role-basedsecurity access. Conduct smoke testing for access requests and toxic combinations. Perform regular security audits and assess regulatory and more »
Integration: Integrate Power Platform solutions with Azure services (e.g., Logic Apps, Functions) for extended functionality. • Security and Compliance: Implement role-basedsecurity, data governance, and compliance standards within the Power Platform ecosystem. • Reporting and Dashboards: Create interactive and insightful dashboards and reports more »
Croydon, London, United Kingdom Hybrid / WFH Options
Adecco
system administration functions Familiarity with national data and information frameworks as set out by government departments Understanding of GDPR and role-basedsecurity needs for managing line of business systems Excellent relationship management and interpersonal skills Strong problem-solving and analytical abilities Effective more »
practices, security standards, and regulatory requirements. Provide technical expertise in IAM principles, including authentication, authorization, identity lifecycle management, role-basedaccesscontrol (RBAC), and privileged access security. Work closely with cross-functional teams, including IT, security, and business stakeholders more »
on (SSO), multifactor authentication (MFA), and privileged access management (PAM). Framework Development: Establish policies and frameworks for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC), and least-privilege principles. Scalability and Future-Readiness more »
financial services sector. • Strong knowledge of identity management concepts, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-BasedAccessControl (RBAC). • Extensive knowledge and familiarity of Office 365, PowerBI, ADD (Entra), Intune, Azure Fundamentals, the wider Microsoft Server more »
how mature your organization is in controlling data flows. Monitor sensitive data : Implement role-basedaccess controls (RBAC) to limit exposure of sensitive data only to those who need it for their job functions Key Requirements In-depth knowledge of DLP tooling and more »
Greater Cheshire West and Chester Area, United Kingdom
Lawrence Harvey
how mature your organization is in controlling data flows. Monitor sensitive data : Implement role-basedaccess controls (RBAC) to limit exposure of sensitive data only to those who need it for their job functions Key Requirements In-depth knowledge of DLP tooling and more »
how mature your organization is in controlling data flows. Monitor sensitive data : Implement role-basedaccess controls (RBAC) to limit exposure of sensitive data only to those who need it for their job functions Key Requirements In-depth knowledge of DLP tooling and more »
Employment Type: Permanent
Salary: £75000 - £90000/annum +Great Bonus and Benefits Package
implementing security remediations. Identity and Access Management: hands-on experience with federated authentication solutions using open standards (OAuth 2.0, OIDC, SAML). RBAC/ABAC: experience in implementing RBAC/ABAC access solutions in a national-scale service based on user profiles and data more »
Windows/Linux servers, SQL/Oracle databases, and applications. * Implement improvements to role-basedaccess controls (RBAC), least privilege principles, and zero trust security models across the IT ecosystem. * Provide oversight and governance of user access and permissions, ensuring compliance … Skills: * Advanced knowledge of identity and authentication processes, such as single sign-on (SSO), multi-factor authentication (MFA), and federated identity systems. * Expertise in RBAC, least privilege, entitlement management, and zero trust frameworks. * Understanding of Azure Cloud services and associated security features. Soft Skills: * Self-motivated, driven, and autonomous more »
Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone's chance of being part of the workplace. We respect and appreciate people of all ethnicities, generations, religious beliefs, sexual orientations, gender identities, and more. We more »