Identity Access Management Jobs in Berkshire

1 to 4 of 4 Identity Access Management Jobs in Berkshire

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, Berkshire, United Kingdom
Confidential
required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … remote access products LAN & WAN networking using routers, switches, and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defense against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Send me alerts about jobs like this. Please enter more »
Posted:

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Design/Architect Assurance Lead

Slough, England, United Kingdom
Drax Group
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identity and access management, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
Posted:

ZTA Architect

Reading, Berkshire, United Kingdom
Confidential
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, Identity and Access Management, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Posted:
Identity Access Management
Berkshire
Median
£120,000