passionate about helping our clients succeed in an ever-changing industry. We are/have: Experts in Banking & Payments, Capital Markets, Insurance and Wealth & Asset Management Deep knowledge in financial services offering, including eg Finance, Risk and Compliance, Financial Crime, Core Banking etc. Committed to growing our business … expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identityandaccessmanagement, or offensive security engineering An understanding of the end to end technology delivery life cycle, with exposure to working in more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
System Integrations (API and Microservices), Testing, Endpoint security, Cloud Services, Data Management, Networking, End-User/Client devices, IdentityandAccessManagement, Application Development, SDLCA wide range of technical knowledge in a variety of areas and appreciation of IT principles including regulatory more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
seeking an experienced Implementation Project Manager for an initial 6 month contract. The Data Consent Project will focus on implementing a data consent management platform. The right person will have extensive experience in similar implementation projects, proven data privacy compliance knowledge and a background managing enterprise level projects. … business and IT to create processes for selecting a platform and partner to implement a global consent and identify platform. Collaborate with senior management, stakeholders, and technical teams to define the project scope, goals, and deliverables. Lead a cross-functional project team consisting of IT professionals and business … IT projects on time and within budget. Strong experience managing enterprise projects involving data privacy compliance and implementation of customer identityandaccessmanagement (CIAM) solutions like Adobe Experience Platform, SAP CDC, Oracle Identity Cloud Service (OICS), or Auth0. Strong understanding of more »
Project and Professional Services, and Managed Services. We specialise in Microsoft's Modern Workplace, Azure Cloud Adoption and Cloud Migration, Data Platform, Security andIdentityand Cloud Application Development. The role: Delivering creative and innovate Microsoft 365 solutions to support our client's needs. Providing Microsoft 365 cloud … Exchange Online, Microsoft Entra ID Proven track record in Microsoft 365 service architecture and engineering including cloud and hybrid implementations, identityandaccessmanagement, security, and compliance. Previous experience working in a senior engineering or consulting role, with a keen desire to build a more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
of ERP SystemsOracle ERP/Fusion Experience is EssentialExposure to Configuring Oracle Accessand Segregation of DutiesExperience with IdentityandAccessManagement, Roles and Permissions including custom roles, along with Privileged AccessThe minimum criteria you’ll need is a professional qualification (ITIL … day. This means that our working environment is one where everyone’s experience is important. Where people are treated fairly, everyone has equal access to opportunities and where everyone feels safe to be themselves. We want to create a culture where it’s okay to ask questions andmore »
Working with various business stakeholders to understand requirements, converting these needs into appropriate technical designs Knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access IT strategy and planning which focuses on maximising the value from current more »
and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a range of … DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or … an equal opportunities employer whose people come from all walks of life and will never discriminate based on race, colour, religion, sex, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. The clients we work with share our values. more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
Devon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of CI/CD tools and SAST/DAST tooling. Understanding of networking principles and cloud security frameworks. Experience with identityandaccessmanagement tools. Familiarity with relational and NoSQL databases. #INDTech more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
optimal performance. Monitor Azure resources, analyze performance metrics, and fine-tune configurations for maximum efficiency. Uphold security best practices, including identityandaccessmanagement, encryption, and network security. Swiftly address cloud-related incidents and implement load balancing, caching, and content delivery solutions. Requirements: Proven more »
distributed systems. Experience with DevOps practices, automation tools, and implementing continuous integration and deployment pipelines. Knowledge of security best practices, identityandaccessmanagement, and compliance standards on GCP. Proficient in Cloud computing, data managementand Cloud security knowledge Must possess exceptional more »
Active Directory, including administration, architecture, or management of environments with at least 10,000 users. Awareness of the identityandaccessmanagementand infosec product landscapes, including technical features of competing products. Experience doing customer demos of software products. Experience developing technical more »
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions andidentity/accessmanagement across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
must and the candidate should be proactive and self-driven communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as IdentityandAccessManagement, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Managementand Vendor/Cloud products assessment Experience carrying more »
or experience in Tanium, Microsoft Defender for Endpoint (MDE), and Zscaler, would be added benefit. Knowledge of Azure/M365, IdentityandAccessManagement (IAM), Logging and Monitoring, and system integration Ability to effectively collaborate with business customers, engineering teams, security consultants, and other more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
IVC Evidensia
outstanding care in around 2,500 locations globally. IVC Evidensia is undergoing an exciting digital transformation. Key to this is to improve the management of our core data sets. This means accelerating the standardisation of operational systems in practices, the creation of stronger tools for managing master data … breaking the challenges into deliverables. Along with this, they will also work closely with the Data Architect to define our over-arching data management strategy. In return, you will benefit from: * Hybrid working environment in a dog-friendly office * 5 weeks holiday, plus bank holidays * Your birthday as … with information security best practice. Capabilities in interfacing the IT Infrastructure team to ensure non-functional requirements, such as performance, scalability, resilience andidentity/accessmanagement, are effectively delivered in the end-to-end solution. Following receipt of your application, you will be more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
management or leadership role. Strong knowledge of cyber security principles, practices, and technologies, including network security, endpoint security, identityandaccessmanagement, and encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). more »