key owner of ensuring our global, distributed team is equipped, secure, and operating smoothly. You'll manage user access, role-based permissions, Mobile Device Management (MDM), and maintain our hardware assets (laptops, monitors, peripherals). What you'll do On-boarding and Off-boarding Manage comprehensive on-boarding and … off-boarding processes, including user access provisioning (GSuite, core tools) and removal. Provide technical support to new hires during on-boarding. Asset Management Maintain accurate records of laptops and other IT assets across all locations. Handle hardware procurement, support, warranty claims, and lifecycle management. Configure and maintain Mobile Device … Management (MDM) solutions (e.g., Jamf). Ensure appropriate software deployment and updates on company devices. Access Management Troubleshoot and resolve access management issues, including passwordmanagement solutions (e.g., 1Password). Oversee seat/license management and general setup for company tools. Manage cost tracking More ❯
role in helping to shape our client's transformation journeys. What you'll be doing: You will use your background in Identity and Access Management, and Privileged Access Management to support our clients by: Working within agreed timelines on the design & implementation phases to identify and unpack IDAM … build. CIAM (B2C, G2C) design & build. IDAM Applications Onboarding. IDAM/PAM processes enhancements, inc JML. IDAM custom rules/interface creation. Identity Lifecycle Management & Provisioning. Identity & Access Governance, Certification/Recertification. Role, Entitlement Management, SOD. Privileged Account Management, Privilege Password Management. Access Management, Single … Sign-On & Federation. Access review process customisations, inc. exclusion, pre-delegation and active period rules. Risk-based & Multi-Factor Authentication. Vault/Key/Password Management. What experience you'll bring: What you'll bring: Experience with at least one of the following development environments/languages: J2EE, Python More ❯
systems are working correctly by ensuring the reliability, security, and efficiency of our IT infrastructure. The team is responsible for the day-to-day management, maintenance, and optimisation of our systems, which makes a critical contribution to the seamless operation of our digital banking platform. Primary responsibilities include: Contribute … to the rollout, management and administration of core service infrastructure, taking the lead on specific systems or projects as appropriate Work on the design, deployment, and documentation of new solutions and of enhancements to existing solutions in line with agreed technical standards and policies, as well as manage and … the job so we're always interested in considering other solutions. macOS and ChromeOS Google Workspace, including security elements such as DLP and device management Jamf Pro (including Protect, Connect, and Security Cloud) Make for automation tooling Slack 1Password Atlassian (Jira & Confluence) About You This is an exciting role More ❯
/flex. We give you a world of potential The Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring and management of information and cyber security across the Computershare businesses, globally. Along with delivering a comprehensive portfolio of technical security control and monitoring services across … security protocols, encryption, and authentication methods/excellent troubleshooting skills. SIEM IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged PasswordManagement Identity Access Management Rewards designed for you Flexible work to help you find the best balance between work and lifestyle. Health More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
TieTalent
culture at We give you a world of potential. The Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring, and management of information and cyber security across the Computershare businesses, globally. Along with delivering a comprehensive portfolio of technical security control and monitoring services across … excellent troubleshooting skills. Essential Experience: SIEM Data Loss Prevention Cloud Security IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged PasswordManagement Identity Access Management Rewards designed for you Flexible work to help you find the best balance between work and lifestyle. Health More ❯
flex . We give you a world of potential The Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring and management of information and cyber security across the Computershare businesses, globally. Along with delivering a comprehensive portfolio of technical security control and monitoring services across … excellent troubleshooting skills. Essential Experience: SIEM Data Loss Prevention Cloud Security IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged PasswordManagement Identity Access Management Rewards designed for you Flexible work to help you find the best balance between work and lifestyle. Health More ❯
and related applications to ensure consistent high performance and reliable operations Maintain the integrity of all computer workstations and associated software, imaging, and configuration management Configure and support mobile devices with Intune MDM Assist with onboarding new users by provisioning their systems, hardware, and participating in training intended to … Information Technology, or computer-related discipline Working knowledge of: Networks and monitoring tools Intune Company Portal Group Policy administration, PowerShell scripting Image and configuration management Mac OSx and iOS Information Security initiatives PasswordManagement tools Nice to have Experience with: Productivity tools: OneNote MS Planner Advanced Microsoft More ❯
procedures, and best practices to standardize operations and facilitate knowledge sharing Leading, developing and delivering the IT Onboarding and Offboarding processes Lead on Warehouse Management System processes and equipment Deliver IT Inductions and basic training to new colleagues Deliver training to colleagues on IT Systems where required Support with … Software Installation and Configuration: Understanding how to install, configure, and troubleshoot software applications and updates Security Fundamentals: Basic knowledge of security practices such as passwordmanagement, antivirus software, firewalls, and multi-factor authentication (MFA) Active Directory/Entra: Familiarity with account management, group policies, user permissions, and … security groups. Cloud Services: Knowledge of cloud platforms like AWS and Microsoft Azure, particularly for user management and basic troubleshooting in cloud environments Our Referral Incentive: Due to the high amount of interest that we receive for each of our roles unfortunately we cannot respond to each application individually More ❯
risk management. Practical knowledge with the development and implementation of electronic, network, or data security related controls (encryption, digital signatures, secure boot, access control, passwordmanagement). Understanding how to implement security activities such as vulnerability and patch management, threat intelligence etc. Hands-on practical knowledge with More ❯
from users of IT applications Set up, install and implement new software when required Assist with the set up of accounts on software, including passwordmanagement Install updates to a range of software Provide general advice and guidance to users Qualifications & Experience Demonstrable experience of working in Software More ❯
IT security incidents and threats. This role demands a proactive individual with a strong technical background and problem-solving mindset. Key Responsibilities: Network Infrastructure Management: Must have experience in Cisco Meraki. Manage and maintain the wireless infrastructure, including wireless controllers and Access Points (APs). Oversee internet connectivity through … load balancing. Monitor and troubleshoot network performance, ensuring minimal downtime. Maintain and document network configurations, including IP addressing and VLAN setups. Firewall and Security Management: Must have experience in Sophos Firewall. Configure, manage, and update firewall policies to ensure network security. Handle VPN setups and user access management. Regularly … update and monitor firewall firmware to safeguard against vulnerabilities. Endpoint Security and Antivirus Management: Must have experience in Bitdefender or similar. Manage antivirus server installations and ensure deployment of agents across all endpoints. Enforce endpoint security policies, including USB port restrictions and system-level password management. Implement and More ❯
Royal Devon University Healthcare NHS Foundation Trust
Devon University Healthcare NHS Foundation - host employer for the NHS People Digital Programme - is seeking a knowledgeable, creative, and ambitious individual for this critical management role. Devon has been selected by NHS England to be an exemplar with their People Digital programme and the successful applicant will be sharing … for delivering a seamless delivery and usage of a single digital front door (Service Now) to People Services across Devon The day-to-day management of EVA (ServiceNow HRSM), workflow optimisation and development plus management and development of enhancements within the Product. Designing and building front end technology … of the corporate Service Now foundations such as HRSM (Incident, Problem, Change, Knowledge, Catalogue), Flow Designer, Virtual Agent (VA), Integration Hub (IH) and Configuration Management Database (CMDB) Improvement of automated complex and non complex processes and manual checks on data received, liaison with data providers to address issues. . More ❯