Oracle Fusion Applications Security Consultant

Version 1 Group
Manchester
10 months ago
Applications closed

Related Jobs

View all jobs

IT Infrastructure Security Engineer

Software Engineer

Enterprise Security Architect

Logistics Software Engineer

Oracle Fusion Applications Security Consultant

  • Full-time
  • Department: Enterprise Applications

Version 1 has celebrated over 26 years in Technology Services and continues to be trusted by global brands to deliver solutions that drive customer success. Version 1 has several strategic technology partners including Microsoft, AWS, Oracle, Red Hat, OutSystems and Snowflake. We’re also an award-winning employer reflecting how employees are at the heart of Version 1.

We’ve been awarded: Innovation Partner of the Year Winner 2023 Oracle EMEA Partner Awards, Global Microsoft Modernising Applications Partner of the Year Award 2023, AWS Collaboration Partner of the Year - EMEA 2023 and Best Workplaces for Women by Great Place To Work in UK and Ireland 2023.

As a consultancy and service provider, Version 1 is a digital-first environment and we do things differently. We’re focused on our core values; using these we’ve seen significant growth across our practices and our Digital, Data and Cloud team is preparing for the next phase of expansion. This creates new opportunities for driven and skilled individuals to join one of the fastest-growing consultancies globally.

YOU MUST SC CLEARED OR BE ELIGIBLE FOR SC CLEARANCE.

TO BE ELIGIBLE FOR SC CLEARANCE, YOU MUST HAVE LIVED WITHIN THE UK FOR THE LAST 5 YEARS.

Are you passionate about securing cutting-edge cloud applications?

Join us as anOracle Fusion Applications Security Consultant.

You'll design and implement robust security solutions for HCM, ERP, and EPM Fusion applications, guiding customers through their transition to a secure SaaS environment.

With a focus on the latest security trends and best practices, you'll play a pivotal role in protecting critical business data.

Responsibilities:

  • Design and implement security controls for Oracle Fusion applications (ERP, HCM, and EPM).
  • Collaborate with customers to understand their security needs and provide tailored solutions.
  • Document and communicate security controls and procedures to customers.
  • Stay updated with the latest security trends, vulnerabilities, and best practices to ensure a secure SaaS environment.

Skills and Expertise:

  • Oracle Fusion Applications: An in-depth understanding of ERP, HCM, and EPM Fusion applications and their security requirements.
  • Implementation Experience: Proven experience in implementing security controls within Oracle Cloud, specifically for SaaS applications.
  • Shared Responsibility Model: A clear understanding of the division of security responsibilities between Oracle and the customer.
  • Location-Based Access Control (LBAC): Expertise in configuring and managing LBAC to restrict user access based on geographical locations and IP addresses.
  • Role-Based Access Control (RBAC): A strong understanding of RBAC to define and manage user roles and permissions within the cloud environment.
  • Identity and Access Management (IAM): Proficiency in defining, overseeing, and managing access rights to cloud resources, including user creation, password management, single sign-on (SSO), and multifactor authentication (MFA). Ability to restrict network access using sign-in policies.
  • Email Security: Knowledge of SPF, DKIM, and DMARC for securing SaaS email communications.

Why Version 1?

  • Strong Career Progression & mentorship coaching through our Strength in Balance and leadership schemes with a dedicated quarterly Pathways Career Development review.
  • A large training budget for accreditations and educational assistance for courses relevant to your role.
  • Version 1 Annual Excellence Awards & our ‘Call-Out’ platform where performance is called out and recognised.
  • Moments that matter & our enhanced maternity & paternity leave policies for life’s journey.
  • Our active ESG & CSR initiative allows you to get involved in local fundraising and development opportunities as part of fostering our diversity, inclusion, and belonging schemes.
  • Quarterly performance-related profit share.
  • Certified Great Place to Work for 10 years in a row.
  • Flexible mix of Remote/Hybrid working options.
  • Pension, Private Healthcare Cover, Life Assurance plus.

This is an opportunity to join one of the fastest-growing Oracle ERP Consultancies in Ireland & the UK.

This is hybrid based with occasional travel to your nearest base office.

Ashley Billington,Talent Acquisition - Oracle ERP (Oracle Cloud - ERP, HCM, EPM)

#LI-AB1

#LI-Hybrid

We are an equal opportunities employer. Please refer to our Diversity & Inclusion statement located at: Diversity, Inclusion & Belonging | Version 1 Careers

Please note: We have an internal recruitment team and do not accept agency candidates. If you want to join the team here at Version 1, get in touch with us directly!

#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.