Identity Access Management Jobs in Reading

11 Identity Access Management Jobs in Reading

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
Posted:

HEAD OF INFORMATION SECURITY OPERATIONS- CONTRACT

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Responsibilities Creation and maintenance of Information Security processes and … procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be more »
Employment Type: Contract
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the SEIM and SOC partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … products o LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP o Identity and access management systems Active Directory, GPO Configuration o Citrix/VMWare 🌳 Ideally the candidate will be CISSP certified and be certified in … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement 🌳Understanding of Identity and Access Management function and technology in order to drive improvement of the function This role is inside IR35 and will be initially more »
Posted:

🌳🌳🌳Head of Information Security Operations – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Areti Group
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAM Management: Take responsibility for Identity and Access Management (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
Posted:

Security Architect - Telecom

Reading, England, United Kingdom
Vallum Associates
knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. Application security: including but not limited to authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure … file transfers, security event monitoring, malware security, and cyber security. Operational security: including but not limited to incident management, change and patch management, data centre and physical security, backups, DR and BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys and certificate management … Skills Required: In-depth knowledge of: Firewall: Juniper/Cisco/Palo Alto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell more »
Posted:

Lead Cyber Security Consultant- Contract - Hybrid -Reading

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice … SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture … month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Please apply via this ad in the first instance or send a CV with covering note or contact me on more »
Employment Type: Contract
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artefacts. Experience in documenting and implementing processes, procedures, and architecture … is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture more »
Posted:

🌳🌳🌳 Cyber Security Consultant 🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Project People
As the Head of Information Security Operations, you will oversee the management of the CERT function and partner with SEIM and SOC teams to uphold security standards. Responsibilities: Craft and uphold Information Security processes and procedures to align with business policies and operations. Provide strong leadership to Information … s information assets, meeting compliance and regulatory standards. Serve as the primary escalation point for Information Security Incidents, changes, and problems. Take charge of IDAM management and control. Collaborate with Information Security Risk functions and colleagues to produce Risk Landscape documentation. About You: Experience with technologies/systems more »
Posted:

AWS DevOps Engineer | £500-£600 Outside IR35 | Remote

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Opus Recruitment Solutions
/CD and Docker: Familiarity with pipelines, Docker. Version Control: Experience with Git. Troubleshooting: Ability to optimize cloud environments. Desirable Experience: AWS Landing Zone, IDAM, CDK, CloudFormation. Familiarity with other cloud services. This role can be completed fully remote. It is Outside of IR35 paying £500-£600 per day. If more »
Employment Type: Contract
Rate: £500 - £600/day
Posted:
Identity Access Management
Reading
Median
£120,000