IAM Manager – Cyber Security Up to £65,000 + bonus Head Resourcing is looking for a Cyber Security Identity Manager to join one of Scotland’s biggest success stories. This role will be worked on a hybrid basis in Glasgow and will be responsible for ensuring all aspects … of Identity implementations are secure across our clients systems. In this role you will ensure the Identity aspects of our clients Cyber Security Strategy are implemented, integrating best practice within all working practices, and enabling cyber security to become a business differentiator across all digital channels. … identities across applications and services Understands the roles of certificates and keys in securing identities Provide solutions and operations for identityandaccessmanagement services for on premises and cloud environments Responsible for swiftly resolving disruptions to technology services, minimizing user impact Supporting the more »
Role: IdAM/NetIQ Senior Engineer Location: Onsite in Farnborough Rate: circa £750 per day inside ir35 We are looking for an experienced DV cleared IdAM/NetIQ Senior Engineer to join our client replacing a large complex Enterprise infrastructure. You will possess strong technical skills as well as being … design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identityandaccessmanagement (IAM) architectural standards, guidelines, and best practices. + Design and implement NetIQ Identity Manager (IDM) solutions to manage … Manager + Privileged AccessManagement (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (url removed) CBSbutler is acting as an employment business for this role. more »
reading, south east england, United Kingdom Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
london (city of london), south east england, United Kingdom
Eames Consulting
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK … CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in IdentityAccessManagementand Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law Enforcement, Retail, Insurance, Telecoms … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
watford, hertfordshire, east anglia, United Kingdom
The Engage Partnership Recruitment
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
with business areas to troubleshoot and resolve issues. Support would be provided in relation to incidents and requests, systems and applications administration, configuration andaccessmanagement carried out in accordance to the agreed levels of services and providing a good customer experience in accordance with the … as Electronic Patient Record, Shared Care Record, National Systems and Services, Mobile Working solutions, Electronic Document Management, andIdentityandAccessManagement solutions. The post holder is expected to work flexibly across main Trust sites at Aylesbury, High Wycombe and Amersham. About … learning and development opportunities to support your career progression. Alongside NHS benefits of generous annual leave entitlement and pension scheme, you'll have access to NHS discount schemes. We provide a range of health and wellbeing services to promote a healthy, happy workforce. What do we stand for more »
london (city of london), south east england, United Kingdom
Anson McCade
delivering a complex Digital Identity Governance programme. Required Experience: Active SC Clearance and recent Central Government projects. Enterprise Identityandaccessmanagement with a focus on Identity Governance Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. Software deployment and change management process. Hands-on agile software development and deployment delivery model. For more information, please apply below or contact me directly. Contact: 02077806706 ------------------------ IAM more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation andidentityandaccessmanagement (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive managementand/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/… mentoring teams in “secure by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security more »
Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: IdentityAccessManagement (IAM) User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
infrastructure, utilising appropriate tools for identifying and correcting complex issues. Planning and scheduling of appropriate cloud infrastructure releases in line with release and change management procedures. Develop and maintain the necessary pipelines and tooling to support the DevSecOps cloud practices. Maintaining knowledge of this area of the ICT … to stay informed of developments in other areas of technology which have a bearing on the provision of services for the client Development andmanagement of security tooling and services including, but not limited to, KMS, PKI, Encryption, secrets management, native cloud security tooling, Software composition … create improvement and development plans for existing infrastructure and providing roadmaps for future development work Essential Skills & Experience: Strong AWS Terraform Hashicorp Jenkins IdentityAccessManagement secrets management - Certificates Desirable Skills: Ansible Python KMS GPG PGP This role has been deemed Inside more »
days a week Contract Inside IR35 Job Description: Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP, cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »