Business Analyst - Information Security - PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge Our leading law firm client are currently looking to take onboard a new Business Analyst - Information Security (PIM, PAM, NAC, SASE … an extremely laid back and very anti-micromanaged law firm with a fantastic and relaxed collaborative environment, this new Business Analyst - Information Security (PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge) role will … months to support projects within the Cyber Security/Information Security global space. To be considered for this Business Analyst - Information Security(PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge) role, it's more »
into the UK Market as an integrator of third-party Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions for businesses across various sectors. Their expertise lies in seamlessly integrating third-party IAM and … PAM solutions into complex IT environments, ensuring enhanced security, compliance, and operational efficiency for their clients. Job Description: As a IAM/PAM Security Consultant you will play a crucial role in delivering bespoke IAM and PAM integration solutions to clients across various sectors. You will be responsible for the … design, configuration, testing, deployment, and post-implementation support. This role requires a deep understanding of both the technical and strategic aspects of IAM and PAM technologies, as well as the ability to design and implement solutions that integrate smoothly with clients' existing IT infrastructure. The successful candidate will act as more »
an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the business. The client are … a multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous experience in this will … be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure but others more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM Programme … Manager Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
Practice - is part of a global cyber team of 5,000+ professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identity and accessmanagement, security architecture, data protection and privacy, and resilience services. We are part of a wider advisory organisation that … yourself, and a better working world for all.The opportunity EY is seeking experienced team members who can review, design and deliver Cyber Identity and AccessManagement (IAM) services. You will take a key position in delivering EY’s cyber security and IAM capabilities. You will also take a … learning and applying emerging IAM trends and technologies to quickly establish themselves as an SMETo qualify for the role you must have:Identity Governance, AccessManagement, PrivilegedAccessManagement, Consumer Identity, OT IAMWorked with one or more of the following IAM technologies: Saviynt, Clear Skye more »
days per week in office) Permanent £68,000 – 92,000 per annum + benefits + bonus Information Security – Specialist – Network Security – Cloud Security - PrivilegedAccessManagement - Windows Server - Active Directory - SQL Server A great opportunity has arisen for an Information Security Operations Specialist to join a well … timely manner. Assisting the Information Security Architecture team in matters of technical security at. Liaising with 3rd party security partners and working with project management teams on key projects. Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical … domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of PrivilegedAccessManagement (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft technologies such as Windows Server, Active Directory and SQL Server. Familiarity with scripting languages such as more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
and excellence, we continuously strive to stay ahead of emerging threats and deliver robust security frameworks. Role Overview: We are seeking an experienced Identity & Access Specialist to join our Cyber Security team. In this role, you will be responsible for driving the development and enhancement of identity governance and … privilegedaccess processes. As a subject matter expert in identity and access technologies, you will ensure alignment with business priorities and policies. Responsibilities: Serve as a subject matter expert for identity and access technologies, driving continuous improvement in identity governance and privilegedaccess processes. … with peers, Product Owners, and Product Architects to advance the Digital Identity function within Cyber Security. Establish a community among inter-departmental identity and access teams. Support the design and implementation of new enterprise security products, services, policies, and procedures. Coach and guide Digital Technology & Innovation (DTI) Product Groups more »
Security Architect (PAM) | Contract | Long-term | Hybrid I am currently hiring for a Security Architect within the financial services, it is a long-term project based in either London or Swindon, on a hybrid basis. Security Architect - PAM London or Swindon - Hybrid Initial 6 months Rate: Up to 500 a … knowledge of the Access Control and PrivilegedAccessManagement domains, including the Tools, Techniques and Procedures used. Knowledge in CyberArk PAM capabilities including Hybrid Environments (On-Prem, AWS, Azure) Experience in creating detailed work breakdown structure for PAM implementation. Ability to work with multiple stake holders … from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the PAM solution. Clear understanding of Operating systems, Database concepts and others potential targets or endpoints for a typical PAM Solution. Experience in defining PAM processes and role definition with knowledge of native access control mechanisms. more »
Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
in the Identity Security and Security Operations space, specializing in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM). Committed to providing top-notch consulting and managed services to enterprise-level clients, we are seeking an experienced Sales Manager/Account Executive to … as the primary point of contact for key accounts. Drive sales efforts for both services and products, with a specific focus on IAM/PAM solutions. Collaboration with Lead Generation and Marketing: Work closely with the Lead Generation and Marketing teams to refine messaging and enhance the go-to-market … sales and business development, particularly in the Identity Security and Security Operations space. Experience working with enterprise-level clients, preferably in the IAM/PAM domain. Strong understanding of consulting and managed services sales processes. Excellent communication and interpersonal skills. Attributes: Results-oriented and target-driven. Strategic thinker with the more »
month contract Inside IR35 We're seeking a skilled individual to join our clients CyberArk delivery team, deploying the cutting-edge CyberArk core PrivilegedAccess Security (PAS) solution to their esteemed clients. Responsibilities: Lead the deployment, configuration, and testing of CyberArk PAS, ensuring seamless integration across platforms like … support and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of PrivilegedAccessManagement processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, Identity Management policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
Security Architecture team in matters of technical security at company Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerability management, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the company. Liaising with other … technical teams to transfer and share knowledge. Liaising with 3rd party security partners and working with project management teams on key projects. Providing out of hours support for critical/high severity cyber detections, or availability issues with key security systems (uncommon). Awareness of and compliance with the … domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of PrivilegedAccessManagement (PAM) best practice, technologies, and procedures. Working knowledge of Microsoft technologies such as Windows Server, Active Directory and SQL Server. Working knowledge of Linux distributions such more »
and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on key projects. … Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of PrivilegedAccessManagement (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). Familiarity more »
Cloud landing zone, as well as branch offices, head office and data centre. Maintain the organisation's LAN/WAN networking, including wireless controllers, Access points, Checkpoint firewalls, Proxy, Citrix NetScaler load balancers, MS Teams Voice, and Cisco switches and routers. Manage the configuration and installation of all network … the IT infrastructure. Skills/qualifications required: Strong knowledge and understanding of information security principles. Practical experience with PrivilegedAccessManagement (PAM). Proven track record in troubleshooting complex networks, hardware, and software. Extensive experience with network systems, global configuration standards, and relevant protocols across all major more »
Rate Payable to Contractors: £350 - £400 per day Duration of Assignment: 6 months Role Description: The Information Security Analyst role at RBC BlueBay Asset Management involves providing expert advice and support on Information Security. The role includes system access reviews, security monitoring, compliance checks, and contributing to the … and ensure a safe and sound environment through pragmatic risk-based analysis. Key Responsibilities: Information Security Systems Review and Monitoring: Coordinate and manage user access and access rights review cycles for BlueBay systems. Maintain and improve security monitoring, including: Compliance with security standards. Monitoring vulnerabilities. Compliance with the … IT KRIs/KPIs. Conduct periodic internal penetration testing and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and followed. Document standard and security procedures for BAU tasks on the internal SharePoint site. Support and challenge third more »
Incident Specialist Join our Cyber Security product group as a Security Incident Specialist, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privilegedaccessmanagement processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat management and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … the lead in the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetration testing and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present … standard accreditations and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privilegedaccessmanagement, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Some duties include: This role will be required to research, implement, and more »
emails with encryption. Become the gatekeeper of our inboxes. • Platform Maestro: Deploy, configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threat detection and reducing false alarms. • Network Security Sage: Possess a deep understanding … Incident response methodologies (MITRE ATT&CK, D3FEND) • Microsoft 365 Security • DMARC, SPF, DKIM • Strong Scripting (e.g., PowerShell or Python) • Security automation frameworks • Security platform management • Vulnerability management tools • Privilege AccessManagement • Industry-standard frameworks (NIST, SANS) and best practices controls (CIS) About Us ComfortDelGro is one more »
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »