and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with IdentityandAccessManagement with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagementand Governance use cases etc. Solutioning and Architecture experiences more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Exciting Opportunity for a Linux Engineer! 🌐. Amazing opportunity to work on a highly visable IdentityandAccessManagement programme of work. Ideally the client seeks a Linux Engineer with IAM - IDAM - PAM or SIEM Tooling experience. In the rapidly evolving world of electronic … a pivotal member of the team the Linux Engineer can expect to: 🔧 Craft and maintain robust Linux server environments. 🔒 Be heavily involved in IdentityAccessManagement project. ⚡ Support lightning-fast high-frequency trading systems. 💡 Deploy the latest upgrades to Linux Servers ensuring peak performance. … Unix – Linux support and engineering. 🛠 Mastery in enterprise Linux, with a preference for Red Hat, CentOS, or Oracle Linux. 🔒 Recent hands-on exposure with IDAM, PAM, or SIEM tooling. 👁️🗨️ A track record with monitoring tools like Prometheus or Nagios. 🖥️ Scripting skillset in Python, Shell, Bash, or Ruby. 🌐 In-depth understanding more »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
london (city of london), south east england, United Kingdom
Eames Consulting
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK … CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in IdentityAccessManagementand Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law Enforcement, Retail, Insurance, Telecoms … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
watford, hertfordshire, east anglia, United Kingdom
The Engage Partnership Recruitment
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
with business areas to troubleshoot and resolve issues. Support would be provided in relation to incidents and requests, systems and applications administration, configuration andaccessmanagement carried out in accordance to the agreed levels of services and providing a good customer experience in accordance with the … as Electronic Patient Record, Shared Care Record, National Systems and Services, Mobile Working solutions, Electronic Document Management, andIdentityandAccessManagement solutions. The post holder is expected to work flexibly across main Trust sites at Aylesbury, High Wycombe and Amersham. About … learning and development opportunities to support your career progression. Alongside NHS benefits of generous annual leave entitlement and pension scheme, you'll have access to NHS discount schemes. We provide a range of health and wellbeing services to promote a healthy, happy workforce. What do we stand for more »
delivering a complex Digital Identity Governance programme. Required Experience: Active SC Clearance and recent Central Government projects. Enterprise Identityandaccessmanagement with a focus on Identity Governance Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. Software deployment and change management process. Hands-on agile software development and deployment delivery model. For more information, please apply below or contact me directly. Contact: 02077806706 ------------------------ IAM more »
london (city of london), south east england, United Kingdom
Anson McCade
delivering a complex Digital Identity Governance programme. Required Experience: Active SC Clearance and recent Central Government projects. Enterprise Identityandaccessmanagement with a focus on Identity Governance Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. Software deployment and change management process. Hands-on agile software development and deployment delivery model. For more information, please apply below or contact me directly. Contact: 02077806706 ------------------------ IAM more »
Transition Partners are excited to be working with a growing global cyber security consultancy to recruit a Business Analyst IAM (IdentityandAccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … Do you dare to disrupt the status quo? This is the role for you! Skills and Experience: Strong experience with Identityandaccessmanagement (IAM) experience Excellent communication skills as will be working collaboratively with clients Familiar with technologies such as Sailpoint, CyberArk andmore »
solutions and solving complex IT technical problems, with the strong knowledge and proven experience over a long period in: * Enterprise Identityandaccessmanagement with a focus on Identity governance * Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. * Software deployment and change management process. * Hands on agile software development and deployment delivery model Due to the nature and urgency of this post, candidates holding or who more »
well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat managementand will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … an outstanding benefits package, which includes pension schemes, discounted gym memberships, a cycle-to-work scheme, access to home furnishings and electronics, access to Employee Assistance Program (EAP), discounts at various high street retailers, eligibility for the Blue Light Card, the opportunity to apply for low … anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identityandaccessmanagement) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »