Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
yolk recruitment
management, and auditing. Experience with cloud technologies like Okta and Azure, as well as traditional Active Directory managementand conditional access policies. Proficiency in scripting languages (Python/Powershell). Experience managing tickets in a ticketing system, ensuring timely resolution and proper documentation. Bachelor … related field. CISSP (Certified Information Systems Security Professional) certification or equivalent. Desirable skills include: Microsoft certifications (Security Operations Analyst Associate, IdentityandAccess Administrator Associate, Information Protection Administrator Associate or equivalent), experience in system administration and troubleshooting with a focus on security enhancements, proficiency in Linux … administration, familiarity with MySQL and ClickHouse, understanding identityandaccessmanagement principles, and expertise in managing credential leakage and continuous monitoring platforms to mitigate security threats And this is what you'll get in return: Salary up to £60,000 DOE A clear development more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
site 4-5 days a week Job Description: "Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP,cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
products where required, they strive to deliver industry leading solutions to their customers backed by their Microsoft Security advanced specializations across: Cloud Security, Identity & AccessManagement, Threat Protection and Information Protection and Governance. If you are a motivated and skilled Microsoft Security Consultant/… You: Strong experience in consulting or technical design/delivery including pre-sales (*Utilising Microsoft Security technologies) Deep understanding of the Microsoft Security andIdentity stack, its capabilities and how it integrates with 3rd party solutions Ability to communicate effectively with key stakeholders Experience taking customers through RFP more »
practices for cloud-based applications. Monitor cloud infrastructure and services, proactively identifying and resolving issues to ensure optimal performance. Manage identityandaccessmanagement in Azure, including Azure Active Directory and role-based access control (RBAC). Implement security policies, firewalls, andmore »
DV Cleared NetiQ Engineer - Farnborough - ASAP Start - 6 months Rolling Contract iO Associates are currently looking for a DV Cleared IdAM/NetiQ Senior Engineer for a 6 month rolling contract based in Farnborough offering £775 a day (inside IR35). You must hold active DV Clearance and be a … join this programme of work - unfortunately, you can't be a dual national. We're looking for candidates with the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged AccessManagement (PAM) Identitymore »
and strategy (private, public and hybrid) Experience with infrastructure configuration and automation processes and tools: puppet, ansible, chef, Terraform Good understanding of Cloud Identity Security, AccessManagement Implementations, Cloud monitoring solutions and networking Drive effectiveness, efficiency and continuous improvement using automation. Collaborate with Architecture … and mitigate from happening again had too better improve service(s) we deliver. Understand and work towards a strategy set out by senior management ensuring we adhere to direction and execute tasks based on priority to meet strategy deadlines. Have the drive to constantly improve and try out … compute all the way to scalable automated deployments. A good understanding of Linux OS (Ubuntu/RHEL). A good understanding of configuration managementand automation with Ansible, Puppet, Jenkins. Experience in migrating services from on-prem to GCP Cloud and from other Cloud providers to GCP. A more »
to include: Toolchain Development Build and Deployment Systems Observability and Reliability Runtime Orchestration Control and Data Planes Global Multi-Cloud Architectures SaaS API Managementand Security Core Java Platform We do not expect you to have any experience in the above - we're looking for curious individuals who … candidate will have experience with: Experience with Google Cloud Platform (GCP) services including GKE, Compute Engine, Shared VPC, CloudSQL andIdentityandAccessManagement (IAM) Experience setting up Google Workspace/Google Cloud Identity Experience with service oriented architecture with containers, distributed … friend scheme Perkbox membership giving access to retail discounts, a wellness platform for physical and mental health, and weekly free and boosted perks Access to initiatives like Cycle to Work, Salary Sacrificed Gym partnerships and Electric Vehicle (EV) leasing About us You may be put off more »
on security events. -You will be Security incident Manager (SIM). -You will vulnerability configure and scan reviews & improvements -You will ensure asset management across tools is accurate. -You will review security … codes and security approvals. -You will be supporting the Security & GRC teams in activities for certification requirements. -You will conduct identityandaccessmanagement improvements -You will mentor junior team members to help them grow in the role. What we are looking for -A more »
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
ISC2 CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, andIDAM systems Understanding of technology risks, threat actors, and mitigation strategies, with a commitment to continuous learning Experience leading the design and architecture of cloud capabilities more »
internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
cryptographic concepts, HSMs, key management. Hands-on experience in implementing and operating Thales SafeNet HSMs. Hands-on experience in designing and implementing key management solutions for enterprises. Hands-on experience in HSM, Cryptography related fields. Knowledge of Networking and Network Security concepts. Experience working on PKI/key … management solutions for connected vehicle systems. Programming knowledge in C/C++ (preferred),Java,.NET. Experience integrating cryptographic libraries and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmore »