Business Analyst - Cyber Security - PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge Our leading law firm client are currently looking to take onboard a new Business Analyst - Cyber Security (PIM, PAM, NAC, SASE … an extremely laid back and very anti-micromanaged law firm with a fantastic and relaxed collaborative environment, this new Business Analyst - Cyber Security (PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge) role will … months to support projects within the Cyber Security/Information Security global space. To be considered for this Business Analyst - Cyber Security (PIM, PAM, NAC, SASE, Exabeam, PrivilegedAccessManagement, Privileged Identity Management, Network Access Control, Secure access service edge) role, it's more »
An excellent opportunity has arisen for an Identity & AccessManagement Analyst to join us. This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our … strategic change projects as our IAM function matures and grows. The role reports directly to the Identity & AccessManagement Lead. The role holder will work closely with our colleagues in Cyber Security Operations team, Risk & Compliance, HR and Infrastructure Teams, as well as L&Q business teams. You … would suit someone technical and an analytical problem solver who enjoys working as part of a team in an evolving environment. As an Identity & AccessManagement Analyst, you will be part of the team thats driving Identity as the new security perimeter. The Identity & AccessManagementmore »
healthcare, staff social club amongst much more. Due to an exciting period of change within the business they now have an opportunity for a PAM Senior Analyst to join their team based in West Bromwich. This is a fantastic opportunity to join a company that puts their employees, customer and … members at the heart of all they do. The Role The PAM Senior Analyst will support the IT Systems Access Lead in helping manage a team of IT System Access Control Analysts ensuring continual delivery of a high-quality operational service. Your focus will be for the team … in a successful accessmanagement function and will be instrumental in driving improvements to control and reduce risk. Key Responsibilities Support the PAM/IAM Service including incident management, processes and documentation. Manage the end-to-end PAM Process including Privileged user on and off boarding more »
healthcare, staff social club amongst much more. Due to an exciting period of change within the business they now have an opportunity for a PAM Senior Analyst to join their team based in West Bromwich. This is a fantastic opportunity to join a company that puts their employees, customer and … members at the heart of all they do.The RoleThe PAM Senior Analyst will support the IT Systems Access Lead in helping manage a team of IT System Access Control Analysts ensuring continual delivery of a high-quality operational service. Your focus will be for the team to deliver … working in a successful accessmanagement function and will be instrumental in driving improvements to control and reduce risk. Key Responsibilities the PAM/IAM Service including incident management, processes and documentation.the end-to-end PAM Process including Privileged user on and off boarding, providing privilegedmore »
IAM Systems Security Engineer (digital) ABJ6891 South East c £49 to £61K + Bonus As an Identity and AccessManagement (IAM) engineer working a with a global digital technology you will support the planning, design, development, and deployment of centralized IAM solutions for the organization. As an IAM … and ensure its implementation is a success across the business Generate solutions and policies in support of the PrivilegedAccessManagement (PAM) and Identity Governance for the company and consumers. Provide support for policies, baselines, and operational procedures around PAM. Design and implement IAM solutions that ensure … application roles with PAM. Qualifications/Experience Demonstratable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC Experience of design and delivery related to an more »
leadership role. Must demonstrate knowledge of modern identity management protocols across multiple domain expertise areas (AD, PKI and certificates, encryption, SSO/MFA, PAM, etc), as well as the ability to learn new ways of thinking and technologies (e.g., Zero Trust, Mitre ATT&CK). Expert understanding of IAM … and centralization onto unified IAM platforms. Desirable Relevant certifications, such as CISSP, CISM, or GIAC are preferred. Experience with Okta, Azure AD, PKI, and PAM solutions preferred. Experience working in a manufacturing environment, preferred. Experience with global security and privacy standards and regulations such as GDPR and CCPA is a … and drive large complex programs across the enterprise. Technical expertise in multiple IAM domain spaces such as AD, SSO/MFA, PKI and certificates, PAM, and Identity and Entitlements. Leading high-performance global teams. Demonstrated mastery in IAM security platforms and processes. Demonstrated awareness of the lifecycle of cybersecurity threats more »
Hiring: PrivilegedAccessManagement Consultant (PAM) Location: Hybrid working - various clients in London area 6 month initial contract - likely extension Competitive day rate - inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor's degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
Job Title: PAM Manager (PrivilegedAccessManagement) Location: London | Midlands | Buckinghamshire Role Type: Full-time, Hybrid (Note: We are unable to provide sponsorship for this role) About the Company: Our client is a renowned organisation that plays a pivotal role in logistics and distribution throughout the UK. … of privilegedaccess within the organisation's IT infrastructure. Responsibilities: Lead the development and implementation of privilegedaccessmanagement (PAM) strategies, policies, and procedures. Work closely with key stakeholders to understand business requirements and translate them into PAM solutions. Manage relationships with implementation partners, including … to ensure successful deployment and integration of PAM tools. Oversee the configuration, customisation, and optimisation of PAM tools - working closely with the wider IAM & IGA team. Conduct regular assessments of privilegedaccess risks and vulnerabilities, and develop mitigation strategies. Provide guidance and support to IT teams on PAMmore »
Title : IAM Analyst (Identity and AccessManagement) Location : Remote Salary : £55,000 - £62,000 + Bonus About the client My client is a global giant in the retail world in home furnishings, Due to continued growth and an ever-changing world they are looking to boost their Cyber … Security with a few roles. One of which is that of an Identity and AccessManagement Analyst (IAM). About the role The successful IAM Analyst (Identity and AccessManagement) will be responsible for administration, monitoring, and operational activities related to Identity and AccessManagement … and standards. Collaborate in the design, implementation, and support of IAM technologies including Identity Governance and Administration (IGA), PrivilegedAccessManagement (PAM), and Multi-factor Authentication (MFA). Troubleshoot security and workflow issues independently or in collaboration with other Information Systems teams and/or stakeholders, while more »
and accessmanagement, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery of the enterprise-level PrivilegedAccessManagement program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity accessmanagement, experience/involvement with Security services such as SIEM and Vulnerability Management. Provide expert knowledge and act as a subject matter expert on key principles of (IAM) with an … of implementing requirements of the NIST standard. Qualifications/Experience Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC Experience of design and delivery related to an more »
a CyberArk SME to join on an initial 6 month contract. The CyberArk technical resource is responsible for management and support of the PAM estate. The role manages the execution of project/product cybersecurity elements across cross-portfolio programs and services. Tasks require working with a broad spectrum … of the Technology team including IT Security and engineering technical resources to identify, plan and deliver cybersecurity initiatives. Role responsibilities: * Onboarding accounts onto PAM solution and ensure accounts remain under control. * identifying and onboarding (DNA scan/Account discovery module)of privileged accounts into CyberArk across all the platforms. … projects. * To help close outstanding audit points raised against CyberArk operations. Essential skills: * Minimum 3+ years of CyberArk experience and good knowledge on other PAM tools. * CyberArk certification or Security related certification. * Experience of Information Security, and a solid IT background. * Experience using SQL/PSQ and Oracle (Essential) * Experience more »
into the UK Market as an integrator of third-party Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions for businesses across various sectors. Their expertise lies in seamlessly integrating third-party IAM and … PAM solutions into complex IT environments, ensuring enhanced security, compliance, and operational efficiency for their clients. Job Description: As a IAM/PAM Security Consultant you will play a crucial role in delivering bespoke IAM and PAM integration solutions to clients across various sectors. You will be responsible for the … design, configuration, testing, deployment, and post-implementation support. This role requires a deep understanding of both the technical and strategic aspects of IAM and PAM technologies, as well as the ability to design and implement solutions that integrate smoothly with clients' existing IT infrastructure. The successful candidate will act as more »
ask 'what if?' We're a diverse bunch who love what we do and ensure we have fun along the way. The Identity and AccessManagement (IAM) Governance team is currently a small but mighty team and part of the wider Security Operations area of TOCS. The team … reduce manual effort. Raising, managing and ownership of risks. Creating and maintaining a roadmap for the supported technologies, building the solution designs Conducting Privilege Access reviews using specialised Identity Governance and Administration tools such as RSA G&L Assisting in driving an IAM improvements programme to improve efficiencies and … AccessManagement systems (IAM). Identity Governance and Administration (IGA) system administration such as RSA G&L. Privilege AccessManagement (PAM) systems and methodologies including the following, CyberArk, Microsoft Entra. Experience of positively influencing at a senior level to get the right outcome. A track record more »
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM Programme … Manager Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme.Experienced professional with full programme lifecycle management of large transformational change … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … challenges, and best practicesImplemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring.Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password managementmore »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
Job Title: Identity and AccessManagement Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found iconic brands by remixing … that are music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective Identity and AccessManagement (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities and access to … Oracle Cloud, Microsoft 365, and other cloud-based applications. Oversee access governance for on-premise servers and vendor partnerships. Track, report, and maintain audit readiness for IDAM-related processes and procedures. Create and manage a process for managers to periodically reconfirm permissions. Your Key Tasks: Manage user accessmore »
a business differentiator across all digital channels. Responsibilities: Maintain working knowledge of accessmanagement, directory services, privilegedaccessmanagement (PAM), multi-factor authentication (MFA), Azure Active directory (Azure AD), and federated identities across applications and services Understands the roles of certificates and keys in securing … identities Provide solutions and operations for identity and accessmanagement services for on premises and cloud environments Responsible for swiftly resolving disruptions to technology services, minimizing user impact Supporting the development of strategy, roadmaps and implementation plans for IAM Required Skills: Knowledge of Cyber Security frameworks, including PCIDSS … understanding of cloud native authentication mechanisms Provides expert knowledge of SAML 2.0, SSO, 2FA/MFA, Kerberos and LDAP Expert knowledge of Identity Lifecyle Management In-depth knowledge of windows operating systems Experience with deployment/implementation/of M365 tools Strong experience of access governance, identity administration more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Iceberg Cyber Security Ltd
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity.Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS. Where customers essentially serve as investors more »
Job DescriptionJob Title: Head of Identity and AccessManagement (IAM)Location: LondonSalary: £100,000 - £135,000 + Bonus + Car etcCompany Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists clients … in navigating complex challenges and achieving their business objectives.Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to safeguard clients … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes.Key Responsibilities:Develops and executes IAM strategies aligned with business objectives and regulatory requirements.Leads the design, implementation, and maintenance of IAM systems more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
I am currently looking for a PAM and EPM Specialist to join my client for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you are currently … looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the development and … maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related risks and more »