streams necessary for the successful delivery of new cloud, web, and mobile projects or changes * Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access * Playing a key role in IT strategy and planning, focusing on maximizing more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
streams necessary for the successful delivery of new cloud, web, and mobile projects or changes * Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access * Playing a key role in IT strategy and planning, focusing on maximizing more »
Storage, and Azure Networking, to optimize application performance and availability. Define and enforce security and compliance measures in Azure, including identityandaccessmanagement, network security, and data encryption. Collaborate with operations teams to implement monitoring and logging solutions using Azure Monitor, Azure Log more »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Enterprise Architect Job Role : Enterprise Architec tLocation: Fully Remot eSalary: £90 k Working for the UK's largest fleet management SAAS provider who's data driven platform enables 80% of UK big brands to monitor their connected assets & ensure sustainability within their day to day operation s. Job … ems.Research and recommend data tools and technologies to enhance system efficiency and integration, considering Zero Trust Architecture, Information Security, andIdentityandAccessManagement princip les.Develop and maintain integration principles, standards, policies, and procedures to ensure secure, high-quality integrations and governance practi ces.Collaborate more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions andidentity/accessmanagement across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, Vulnerability Management, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, Vulnerability Management, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber security support activities (configuration more »
expertise in Microsoft cloud services, including Azure and Microsoft 365. Experience creating and implementing infrastructure policies and standards. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Experience in Azure Cloud Security, with a … strong understanding of Azure security services and configurations. Experience dealing with large global Microsoft 365 migrations/implementations after M&A. Solid stakeholder management up to c-suite If this sounds of interest, please apply for more information. more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
management or leadership role. Strong knowledge of cyber security principles, practices, and technologies, including network security, endpoint security, identityandaccessmanagement, and encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
deliverable. You will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
initiatives programme. Will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »