and strategy (private, public and hybrid) Experience with infrastructure configuration and automation processes and tools: puppet, ansible, chef, Terraform Good understanding of Cloud Identity Security, AccessManagement Implementations, Cloud monitoring solutions and networking Drive effectiveness, efficiency and continuous improvement using automation. Collaborate with Architecture … and mitigate from happening again had too better improve service(s) we deliver. Understand and work towards a strategy set out by senior management ensuring we adhere to direction and execute tasks based on priority to meet strategy deadlines. Have the drive to constantly improve and try out … compute all the way to scalable automated deployments. A good understanding of Linux OS (Ubuntu/RHEL). A good understanding of configuration managementand automation with Ansible, Puppet, Jenkins. Experience in migrating services from on-prem to GCP Cloud and from other Cloud providers to GCP. A more »
accessmanagement principles, along with experience in defining, implementing, and operating processes to provision, maintain and deprovision user accounts andaccess entitlements within a dynamic and fast-paced organisation.What Paysafe stands for: Being open and honest.Keeping focused.Operating with Courage.Pioneering the future.Our values and culture … agree appropriate application entitlements and roles and identify “toxic combinations” to inform segregation of duties controls.Identify vulnerabilities and gaps in identityandaccessmanagement operational processes.Define, document, and execute centralised operational processes and procedures for the provisioning and deprovisioning of user accounts andaccess … advantageous.Strong written and verbal communication skills, interpersonal and collaborative skills, and ability to communicate IAM concepts such as Joiners-Movers-Leavers, RBAC and user access certifications, to technical and nontechnical audiences.High level of personal integrity, as well as the ability to professionally handle confidential matters whilst showing an more »
Access Rights Manager – Data ControlsLondon, UKAXA XL recognizes data and information as critical business assets, both in terms of managing risk and enabling new business opportunities. This data should be high quality and actionable, enabling the AXA XL executive leadership team to maximize benefits and facilitate sustained enterprise … on driving innovation by optimizing how we leverage data to drive strategy and create a new business model - disrupting the insurance market.As Axiom Access Rights Manager you will be in a key position, reporting into the Division Lead - Data Controls, and will operate in a matrix organization across … the IDA, Global Technology, InfoSec, DPO and other control functions with responsibility for ARM/Attribute-based Access Controls (ABAC) into Axiom (AXA XL’s strategic analytics platform). You will lead a small team of direct reports and by example demonstrate your own experience, knowledge, and determination more »
Location: London, UK The role will be responsible for planning, coordination, governance, oversight and delivery of the IDAM Path to Effective Plan. This encompasses all aspects of IDAM controls: Joiner, Mover, Leaver Access Recertification Access Rules & Role Management Authentication Privileged Access. And will drive … deliver the required objectives, outcomes, and capabilities. You will need to communicate effectively with a wide range of programme stakeholders and partners, ranging from IDAM SMEs to senior executives. You will also drive and support the adoption of bank standards and work in alignment with change frameworks at all times. more »
Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our London based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: • Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes • Work as a key point of more »
on security events. -You will be Security incident Manager (SIM). -You will vulnerability configure and scan reviews & improvements -You will ensure asset management across tools is accurate. -You will review security … codes and security approvals. -You will be supporting the Security & GRC teams in activities for certification requirements. -You will conduct identityandaccessmanagement improvements -You will mentor junior team members to help them grow in the role. What we are looking for -A more »
Unix – Linux support and engineering experience Experience of an enterprise Linux, preferably Red Hat Enterprise Linux, CentOS or Oracle Linux. Recent involvement in implementing IDAM, PAM or SIEM tooling. Experience with monitoring and reporting software – Prometheus, Nagios or similar. Solid scripting experience with one of the following: Python, Shell, Bash more »
Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our Manchester based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: • Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes • Work as a key point of more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
happening in tech. The main responsibility of the Senior/Lead DevOps Engineers will be to manage the creation, enhancement, deployment, continuous upkeep, andmanagement of our clients AWS framework and related systems. In addition, they will provide technical guidance to junior team members, serve as the team … DevSecOps and collaboration with Information Security (InfoSec) teams to deploy secure solutions, utilizing Role-Based Access Control (RBAC), IdentityandAccessManagement (IAM), Cloud Security protocols, and third-party security tools like AquaSec. Ability to self-manage development projects, tasks, and time more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Our client is a Distinguished European Consultancy looking to break into the UK Market as an integrator of third-party IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions … to ensure seamless integration of IAM and PAM solutions with existing client systems. Deliver training and documentation to clients for the effective use andmanagement of the implemented solutions. Stay abreast of the latest trends and developments in IAM and PAM technologies to provide innovative solutions to clients. … Strong understanding of related technological approaches (e.g. Zero Trust, Least Privilege, ) Familiarity with regulatory compliance and industry standards related to identityandaccess management. Exceptional analytical and problem-solving skills, with the ability to translate complex requirements into actionable solutions. Strong project managementandmore »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Location: London, UK The role will be responsible for planning, coordination, governance, oversight and delivery of the IDAM Path to Effective Plan. This encompasses all aspects of IDAM controls: Joiner, Mover, Leaver Access Recertification Access Rules & Role Management Authentication Privileged Access. And will drive … deliver the required objectives, outcomes, and capabilities. You will need to communicate effectively with a wide range of programme stakeholders and partners, ranging from IDAM SMEs to senior executives. You will also drive and support the adoption of bank standards and work in alignment with change frameworks at all times. … with experience of delivering SailPoint within large and complex organisations Knowledge of Risk Management Framework, with understanding of IdentityandAccessmanagement controls would be preferred. Excellent understanding of the project & programme life cycle. Excellent understanding of Risk Based Project Managementmore »
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
future of IAM capabilities, our next IAM Director will establish the foundation for which the company will operate from for IdentityandAccessManagement in the future! * Flexible location * Position Purpose Responsible for the planning, building, delivery, and support of the IdentityandAccessManagement (IAM) program for both Brambles enterprise users and customer facing services. This encompasses a wide range of current systems and solutions managed by disparate teams, against various standards and approaches in which this leader will work to consolidate, update, and ensure … CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, andaccess provisioning life cycle. Solid understanding of the foundation and trends in Information Technology, Information Security, Risk Management, Governance, and Compliance. Demonstrated more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged accessmanagement tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create … documentation that enables the business to use the cloud securely Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & AccessManagement, Privileged AccessManagement (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into the Lead Cyber Security Engineer, you will have plenty of opportunity to learn and test and advance your skills across a range of projects. To be considered you must have a cyber more »
an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the … multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous … will be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … controls from conception to realization (e.g. MoP, MSP, PRINCE2, MoR etc.) and in-house/local tailoring (Required) Experience of IdentityandAccessManagement governance environments, challenges, and best practices Implemented large scale Identity Governance and Administration (IGA), IdentityAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to all audiences up to C-Level leaders. At Cognizant, taking more »
business processes supported in ServiceNow from an Identity & AccessManagement perspective Reporting into the IdentityandAccessManagement function, you’ll be delivering automated access provisioning and integrating with other core IAM products such as IdentityNow … Sailpoint experience would be great, but training will be given Understanding of ITIL and the assorted business processes supported in ServiceNow from an Identity & Accessmanagement perspective Additional Information When you commit to Legal & General, we’ll commit to you too. That means we … ll recognise and reward your hard work, your performance and your contribution. If you join us, you’ll get access to some great benefits, including private medical insurance, at least 25 days holiday (excluding bank holidays), a generous pension scheme, life assurance, and Income Protection. You can participate more »
London We have an excellent opportunity for a highly motivated and skilled Infrastructure Engineer with expertise in Domain Services andIdentityandAccessManagement to join our dynamic team onsite in London . The ideal candidate will also have experience in Domain Controllers, Multi … to hear from you. What you’ll do Work with the Domain Services Lead to manage the Domain Services andIdentityandAccessManagement environment (DMS) Responsible for the build, support, andmanagement of all aspects of domain services, including lifecycle support … technical planning and implementation activities for domain services, such as: Active Directory/Azure Active Directory Domain controllers Multi-factor authentication/Conditional Access/PAM/PIM/IGA Group Policies PKI DNS DHCP IAM Acts as technical guidance on DMS elements of IT projects, and supports more »
IAM Engineer/IAM Analyst - London, UK Hybrid. The position is as part of Identity & AccessManagement (IAM) project team within the Cyber Security Programme. IAM Onboarding is a stream within the IAM project and the objective is to onboard into the IAM tool … by: Ensuring that procured or developed IAM systems are implemented properly and function as intended. Extensive hands-on knowledge of identityandaccessmanagement best practices, procedures, and software solutions such as SailPoint To onboard Applications into SailPoint, extensive knowledge and experience with identityandaccessmanagement technology, such as single sign-on (SSO), two-factor authentication, etc Work with the IAM Project analyst to complete the technical onboarding in the Dev environment and then Production deployment, ensuring adequate testing. Regular status reporting to track onboarding progress. Work more »