Job Title: IdentityandAccessManagement Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found … music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective IdentityandAccessManagement (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities andaccess … Your Key Tasks: Manage user access across all cloud and on-premise systems, including provisioning, de-provisioning, and permission management. Monitor and report on IDAM program effectiveness, addressing gaps and opportunities for improvement. Develop and maintain documentation, policies, and procedures related to IDAM. Stay updated on emerging IDAMmore »
Essential Functions Take a lead role in the delivery of BAU IdentityandAccessmanagement operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory … of design, configuration, deployments, and operations in the area of IAM. Work on accessmanagement, identity governance, andidentitymanagement solutions. AWS Identityand Azure Identity : Leverage AWS IdentityandAccessManagement … in CyberSecurity, computer science, Information Technology or related field or equivalent work experience Relevant Microsoft certifications such as Microsoft Certified: IdentityandAccess Administrator Associate, Microsoft Certified: Azure Security Engineer Associate, or other industry certifications (e.g., CISSP, CISM, CompTIA Security+). Certifications including but not limited more »
Per Day (Rolling Contract) - London/Hybrid Tech Stack – Senior Security Architect, Financial Services, Financial Conduct Authority (FCA) Regulations, IT Risk Management, Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation Firewall (NGFW … business needs. This is a great opportunity for Senior Security Architect experienced in or wanting to learn Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation Firewall (NGFW), Cloud Security (exp. AWS/Azure/… be someone with the experience with or wanting to learn industries/technologies like Financial Services, Financial Conduct Authority (FCA) Regulations, IT Risk Management, Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation more »
Role: PAM & EPM Specialist Job type: Permanent Location: Gaydon/Leamington Spa, UK Ready to utilise your expertise in IdentityandAccessManagement ? Are you passionate about Endpoint Privilege Management ? We have an exciting role for you – PAM & EPM Specialist! Careers at … day. Grow your career, while being exposed to new technologies. Fast track your growth with diverse career opportunities internally. The Role The “Privileged AccessManagement (PAM) & Endpoint Privilege Management (EPM) Specialist” will be responsible for delivering PAM & EPM services and associated governance within the … on PAM & EPM Best Practices to different stakeholders/teams. Your Profile Key Skills/Knowledge/Experience: Expertise in IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows more »
Our client is a Distinguished European Consultancy looking to break into the UK Market as an integrator of third-party IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions … to ensure seamless integration of IAM and PAM solutions with existing client systems. Deliver training and documentation to clients for the effective use andmanagement of the implemented solutions. Stay abreast of the latest trends and developments in IAM and PAM technologies to provide innovative solutions to clients. … Strong understanding of related technological approaches (e.g. Zero Trust, Least Privilege, ) Familiarity with regulatory compliance and industry standards related to identityandaccess management. Exceptional analytical and problem-solving skills, with the ability to translate complex requirements into actionable solutions. Strong project managementandmore »
IDAM & Entra ID/Azure AD Engineer (Contract) PLEASE NOTE: This role will fall Inside IR35. DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry … who require an IAM & Azure AD Engineer to join the team in London. The role will support the firms Global IdentityandAccessManagement Service and new Entra ID system. Delivering security, efficiency and scalability of Identity environments. Responsibilities: * Working with the … as OAuth, SAML and OpenID Connect, SCIM * Strong understanding of security concepts, including authentication and authorization. PLEASE NOTE: This role will fall Inside IR35. IDAM & Entra ID/Azure AD Engineer (Contract more »
IdentityandAccessManagement Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office … Identity … migration expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identityandaccessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identityandaccessmanagement strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, andidentityandaccess management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
scalability, security, and performance requirements. Implement infrastructure as code (IaC) principles using tools like Terraform, or Azure Resource Manager to automate the provisioning andmanagement of cloud resources. Deploy and configure cloud services and platforms, such as Azure, or Google Cloud Platform (GCP), based on best practices and … architectural principles. Implement security controls, identity, andaccessmanagement (IAM), encryption, and compliance standards to ensure the security and integrity of cloud environments. Optimise cloud infrastructure and services for performance, reliability, and cost-effectiveness, utilising monitoring, logging, and analytics tools to identify and address … CircleCI. Ability to implement infrastructure testing, deployment automation, and monitoring solutions. Security and Compliance: Knowledge of cloud security best practices, identity, andaccessmanagement (IAM), encryption, and data protection. Experience implementing security controls, compliance standards, and security monitoring in cloud environments. Understanding of regulatory more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
to technology risks. Working knowledge of Data Sciences, AI & Machine Learning. Knowledge of information security principles, concepts, practices, systems software, database software, and immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management … protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class IdentityandAccessManagement solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber threat and vulnerability analysis and remediation. Forensic examination and data … information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk management domains Equal Employment Opportunity (EEO) It is the policy of Gilead Sciences, Inc. and its subsidiaries and affiliates (collectively "Gilead" or the "Company more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … with the team during design and development security roles including custom roles development, deployment and testing Strong experience of integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »
of: Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a … documentation with excellent skills in the use of the MS Office suite of tools and MS Project Formal training or certification in Project Management Certification (MSP/PRINCE2/PMI/APM/SIX SIGMA) Professional PM accreditation (Prince 2, PMI, APM etc…) Significant project managementmore »
Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … performance • Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
using Go or Kotlin for IAM tasks. Implement and manage SCIM provisioning for automated user lifecycle management Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. Configure and manage access controls to ensure secure and role-based access to resources. For more information or to apply please reach out to Luke Finn on +44 203 053 3723/luke@next-ventures.com more »
of our IAM. Seeking how far you can push the system before it breaks. Re-architecting our current process. Required Skills Strength in IdentityAccessManagement Cloud knowledge of security using Microsoft Azure M365 Identity migration expertise Knowledge of Cross Tenant Synch more »