Identity Access Management Jobs in the Thames Valley

16 Identity Access Management Jobs in the Thames Valley

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, England, United Kingdom
Areti Group
required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … remote access products LAN & WAN networking using routers, switches, and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defense against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function more »
Posted:

HEAD OF INFORMATION SECURITY OPERATIONS- CONTRACT

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Responsibilities Creation and maintenance of Information Security processes and … procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be more »
Employment Type: Contract
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the SEIM and SOC partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … products o LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP o Identity and access management systems Active Directory, GPO Configuration o Citrix/VMWare 🌳 Ideally the candidate will be CISSP certified and be certified in … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement 🌳Understanding of Identity and Access Management function and technology in order to drive improvement of the function This role is inside IR35 and will be initially more »
Posted:

Azure Platform Architect

Wokingham, England, United Kingdom
Tata Consultancy Services
workloads as part of a divesture. Key Responsibilities: Provide basic enterprise integration on Azure. Use Azure services such as Azure Logic Apps and Azure API Management to orchestrate calls to enterprise back-end systems including Azure services, software as a service (SaaS) system, Logic App, Function app, Event … message broker and events to decouple services for greater scalability and reliability. Ensure the security of cloud-based data and applications against unauthorized access, theft, and other threats. Conduct regular security assessments and audits to identify vulnerabilities and develop plans to address them. Develop the workload migration strategy … platform monitoring, security architecture, high availability architecture design. Experience with secure software development, data protection, cryptography, key management, identity, and access management (IAM), network security (VPNs) within cloud environments. Experience in one or more programming languages: .Net/C#, Java, Python, Ruby more »
Posted:

🌳🌳🌳Head of Information Security Operations – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Areti Group
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAM Management: Take responsibility for Identity and Access Management (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
Posted:

Security Architect - Telecom

Reading, England, United Kingdom
Vallum Associates
knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. Application security: including but not limited to authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure … file transfers, security event monitoring, malware security, and cyber security. Operational security: including but not limited to incident management, change and patch management, data centre and physical security, backups, DR and BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys and certificate management … Skills Required: In-depth knowledge of: Firewall: Juniper/Cisco/Palo Alto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell more »
Posted:

Lead Cyber Security Consultant- Contract - Hybrid -Reading

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice … SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture … month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Please apply via this ad in the first instance or send a CV with covering note or contact me on more »
Employment Type: Contract
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artefacts. Experience in documenting and implementing processes, procedures, and architecture … is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture more »
Posted:

🌳🌳🌳 Cyber Security Consultant 🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
Posted:

Technology Risk Analyst

Windsor, Windsor & Maidenhead
Centrica
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identity and access management, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
Employment Type: Permanent
Posted:

Technology Risk Analyst

Windsor, Berkshire, South East, United Kingdom
British Gas
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identity and access management, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
Employment Type: Permanent
Posted:

Head of Information Security

Reading, England, United Kingdom
Project People
As the Head of Information Security Operations, you will oversee the management of the CERT function and partner with SEIM and SOC teams to uphold security standards. Responsibilities: Craft and uphold Information Security processes and procedures to align with business policies and operations. Provide strong leadership to Information … s information assets, meeting compliance and regulatory standards. Serve as the primary escalation point for Information Security Incidents, changes, and problems. Take charge of IDAM management and control. Collaborate with Information Security Risk functions and colleagues to produce Risk Landscape documentation. About You: Experience with technologies/systems more »
Posted:

AWS DevOps Engineer | £500-£600 Outside IR35 | Remote

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Opus Recruitment Solutions
/CD and Docker: Familiarity with pipelines, Docker. Version Control: Experience with Git. Troubleshooting: Ability to optimize cloud environments. Desirable Experience: AWS Landing Zone, IDAM, CDK, CloudFormation. Familiarity with other cloud services. This role can be completed fully remote. It is Outside of IR35 paying £500-£600 per day. If more »
Employment Type: Contract
Rate: £500 - £600/day
Posted:

Modern Workplace Engineer

Milton Keynes, Buckinghamshire, South East, United Kingdom
Hybrid / WFH Options
Domino's Pizza
role will focus on leading on a roadmap for Modern Workplace enhancements and providing technical expertise and support for the implementation, configuration, and management of various modern workplace technologies and tools. Success in this role looks like: Design, implement, and manage modern workplace solutions. Collaborate with IT and … users. Stay updated with the latest trends and best practices in workplace technology. Design and ownership of authentication and identity platforms including IDAM, F5 VPN, Active Directory (on-premise and Azure) and Office 365 Maintain and support the infrastructure powering the Digital Workplace solutions (Video Conferencing, Wi-Fi … Printing, Mobile Device Management/Enterprise Mobility Management etc.) 5+ years strong demonstratable experience in a similar role supporting enterprise server Infrastructure and End User Computing environments. Ideally you will be a skilled engineer looking for their next step into an architect/management more »
Employment Type: Permanent, Work From Home
Posted:
Identity Access Management
the Thames Valley
25th Percentile
£56,625
Median
£58,250
75th Percentile
£74,906
90th Percentile
£101,963