Access Rights Manager – Data ControlsLondon, UKAXA XL recognizes data and information as critical business assets, both in terms of managing risk and enabling new business opportunities. This data should be high quality and actionable, enabling the AXA XL executive leadership team to maximize benefits and facilitate sustained enterprise … on driving innovation by optimizing how we leverage data to drive strategy and create a new business model - disrupting the insurance market.As Axiom Access Rights Manager you will be in a key position, reporting into the Division Lead - Data Controls, and will operate in a matrix organization across … the IDA, Global Technology, InfoSec, DPO and other control functions with responsibility for ARM/Attribute-based Access Controls (ABAC) into Axiom (AXA XL’s strategic analytics platform). You will lead a small team of direct reports and by example demonstrate your own experience, knowledge, and determination more »
accessmanagement principles, along with experience in defining, implementing, and operating processes to provision, maintain and deprovision user accounts andaccess entitlements within a dynamic and fast-paced organisation.What Paysafe stands for: Being open and honest.Keeping focused.Operating with Courage.Pioneering the future.Our values and culture … agree appropriate application entitlements and roles and identify “toxic combinations” to inform segregation of duties controls.Identify vulnerabilities and gaps in identityandaccessmanagement operational processes.Define, document, and execute centralised operational processes and procedures for the provisioning and deprovisioning of user accounts andaccess … advantageous.Strong written and verbal communication skills, interpersonal and collaborative skills, and ability to communicate IAM concepts such as Joiners-Movers-Leavers, RBAC and user access certifications, to technical and nontechnical audiences.High level of personal integrity, as well as the ability to professionally handle confidential matters whilst showing an more »
Security Operation, SIEM, SOAR Job descriptionTitle: Cyber Security Operations ManagerLocation: Either Crawley or London (Hybrid)Salary: Up to 80,000 base plus bonusLine Management: up to 14 peopleWe are currently working with a one of the countries most well regartded Utilities providers, having won a number of awards … automation to enhance our ability to withstand and recover at scale from evolving cyber threats.The Cyber Security Operations Manager provides overall daily and strategic management of people, process, and technology capabilities within the Cyber Security Operations Team.A few of your accountabilities:Manage the cyber security operations team and … Orchestration, Automation and Response (SOAR), running red-team exercises and tabletop crisis war games.Working knowledge of SIEM and SOAR solutions, IdentityandAccessManagementand Data Loss Prevention technologies preferably including FortiSIEM, Q-Radar, Sentinel, Darktrace, Microsoft Defender.Experience managing suppliers for an outsourced Managed more »
ISC2 CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, andIDAM systems Understanding of technology risks, threat actors, and mitigation strategies, with a commitment to continuous learning Experience leading the design and architecture of cloud capabilities more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
with transactional volume of 11 billion/year and total annual transactional value in excess of GBP6 Trillion. The IAM (IdentityandAccessManagement) Manager is part of a team playing a crucial role in designing, implementing, and overseeing the company's identityandaccessmanagement solutions. The ideal candidate will help define, enhance, and implement Vocalink's information security processes, while ensuring consistent administration of information security assets and controls to effectively improve security posture. Role In this role, you will: • Lead and manage Privileged AccessManagement (PAM) BAU operations, ensuring they are delivered on time and meet the set specifications. • Work closely with the IAM VP and Director to drive changes throughout the PAM team to improve Vocalink’s identity security posture. • Regularly review and refine PAM policies to more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our London based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: • Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes • Work as a key point of more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
Job Summary As a Lead Software Engineer, you will be responsible for leading an engineering squad within the Identity Engineering organisation. You will be empowered to make technical and architectural decisions, and to influence the roadmap for your squad and the wider team, working in partnership with your … peers across Product, Project Managementand Engineering. You will contribute to and be part of an engaging, dynamic and inclusive engineering organisation, grounded in scrum and agile practices, CI/CD … great collaboration, functional programming and motivated by a commitment to continuous learning and improvement. Identity Engineering delivers Consumer IdentityandAccessManagement (CIAM) capabilities across The Walt Disney Company (TWDC) including but not limited to: D isney +, Hulu, ESPN+, and Parks. more »
Unix – Linux support and engineering experience Experience of an enterprise Linux, preferably Red Hat Enterprise Linux, CentOS or Oracle Linux. Recent involvement in implementing IDAM, PAM or SIEM tooling. Experience with monitoring and reporting software – Prometheus, Nagios or similar. Solid scripting experience with one of the following: Python, Shell, Bash more »
Our client is a Distinguished European Consultancy looking to break into the UK Market as an integrator of third-party IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions … to ensure seamless integration of IAM and PAM solutions with existing client systems. Deliver training and documentation to clients for the effective use andmanagement of the implemented solutions. Stay abreast of the latest trends and developments in IAM and PAM technologies to provide innovative solutions to clients. … Strong understanding of related technological approaches (e.g. Zero Trust, Least Privilege, ) Familiarity with regulatory compliance and industry standards related to identityandaccess management. Exceptional analytical and problem-solving skills, with the ability to translate complex requirements into actionable solutions. Strong project managementandmore »
Location: London, UK The role will be responsible for planning, coordination, governance, oversight and delivery of the IDAM Path to Effective Plan. This encompasses all aspects of IDAM controls: Joiner, Mover, Leaver Access Recertification Access Rules & Role Management Authentication Privileged Access. And will drive … deliver the required objectives, outcomes, and capabilities. You will need to communicate effectively with a wide range of programme stakeholders and partners, ranging from IDAM SMEs to senior executives. You will also drive and support the adoption of bank standards and work in alignment with change frameworks at all times. … with experience of delivering SailPoint within large and complex organisations Knowledge of Risk Management Framework, with understanding of IdentityandAccessmanagement controls would be preferred. Excellent understanding of the project & programme life cycle. Excellent understanding of Risk Based Project Managementmore »
an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the … multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous … will be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure more »
team of 5,000+ professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identityandaccessmanagement, security architecture, data protection and privacy, and resilience services. We are part of a wider advisory organisation that collectively comprises … a better working world for all.The opportunity EY is seeking experienced team members who can review, design and deliver Cyber IdentityandAccessManagement (IAM) services. You will take a key position in delivering EY’s cyber security and IAM capabilities. You will also … continuously learning and applying emerging IAM trends and technologies to quickly establish themselves as an SMETo qualify for the role you must have:Identity Governance, AccessManagement, Privileged AccessManagement, Consumer Identity, OT IAMWorked with one or more more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … controls from conception to realization (e.g. MoP, MSP, PRINCE2, MoR etc.) and in-house/local tailoring (Required) Experience of IdentityandAccessManagement governance environments, challenges, and best practices Implemented large scale Identity Governance and Administration (IGA), IdentityAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to all audiences up to C-Level leaders. At Cognizant, taking more »
London We have an excellent opportunity for a highly motivated and skilled Infrastructure Engineer with expertise in Domain Services andIdentityandAccessManagement to join our dynamic team onsite in London . The ideal candidate will also have experience in Domain Controllers, Multi … to hear from you. What you’ll do Work with the Domain Services Lead to manage the Domain Services andIdentityandAccessManagement environment (DMS) Responsible for the build, support, andmanagement of all aspects of domain services, including lifecycle support … technical planning and implementation activities for domain services, such as: Active Directory/Azure Active Directory Domain controllers Multi-factor authentication/Conditional Access/PAM/PIM/IGA Group Policies PKI DNS DHCP IAM Acts as technical guidance on DMS elements of IT projects, and supports more »
IAM Engineer/IAM Analyst - London, UK Hybrid. The position is as part of Identity & AccessManagement (IAM) project team within the Cyber Security Programme. IAM Onboarding is a stream within the IAM project and the objective is to onboard into the IAM tool … by: Ensuring that procured or developed IAM systems are implemented properly and function as intended. Extensive hands-on knowledge of identityandaccessmanagement best practices, procedures, and software solutions such as SailPoint To onboard Applications into SailPoint, extensive knowledge and experience with identityandaccessmanagement technology, such as single sign-on (SSO), two-factor authentication, etc Work with the IAM Project analyst to complete the technical onboarding in the Dev environment and then Production deployment, ensuring adequate testing. Regular status reporting to track onboarding progress. Work more »