Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Responsibilities Creation and maintenance of Information Security processes and … procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
the SEIM and SOC partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … products o LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP o Identityandaccessmanagement systems Active Directory, GPO Configuration o Citrix/VMWare 🌳 Ideally the candidate will be CISSP certified and be certified in … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement 🌳Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function This role is inside IR35 and will be initially more »
IdentityandAccessManagement Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office … Identity … migration expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities andaccess, supporting secure collaboration, and staying current with the latest technologies. You'll … testing and quality assurance efforts to ensure that solutions meet the specified requirements. Manage user identities throughout their lifecycle, including provisioning, deprovisioning, andaccess modifications. Implement role-based access control (RBAC) and ensure appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identityandaccess management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA processes, policies, and configurations. Provide more »
Role | IAM Developer 💫 Company | Healthcare 📏 Size | 10k+ 🪜 Level | Mid Level ✨Skills | Forgerock AccessManagement, IAM Solutions, SSO, OAuth 📍 Based | Staines or Manchester 💻 Hybrid | Once a week in either Staines or Manchester 💰 Offer | up to £60K A global international healthcare service provider is currently expanding their IdentityAccessManagement team by bringing on an additional 2 Forgerock Developers to assist with the development of their technology roadmap in the Identity arena. What you'll be doing: Developing IAM solutions that deliver measurable benefit to their 32 million members worldwide. … a environment with mixed teams including contractors and outsourced vendors What you'll need: Experience with ForgeRock or IAM products such as Ping Identity, Sailpoint, Microsoft B2C or Azure AD Experience in ForgeRock AccessManagement Experience with Single Sign On, LDAP, SAML2, OAuth, OpenID more »
contract IAM Architect role summary: Our client is an enterprise business in the Utilities industry. They are looking for an IdentityandAccessManagement (IAM) Architect to design and guide the implementation of IAM solutions across their UK business. This role involves creating architectural … and leavers, access reviews, and security requirements Support procurement exercises for IDAM solutions (e.g. PAM and IGA) Collaborate with Enterprise Architecture and the IDAM SMEs to elaborate our IDAM Strategies and Frameworks and use that to inform future direction Support tactical initiatives, such as Active Directory and Group … andaccessmanagement principles and technologies. Strong architectural and design skills, with the ability to develop scalable and secure IDAM solutions. Excellent problem-solving abilities and a strategic mindset, capable of anticipating future needs and trends in IDAM Experience of supporting IDAM-related procurement more »
months contract with the opportunity for multiple extensions. The position can be worked 100% remotely. Key Skills/Deliverables: Proven Project management experience Ability to manage projects in a large scale environment Demonstratable delivery experience of IdentityAccessmanagement projects PAM project … delivery experience Strong knowledge of NIST framework and compliance Excellent understanding and previous experience delivering Cyber Security projects Strong understanding of IdentityAccessmanagement Experience working with CyberArk Strong communication skills Delivery focused mindset Excellent stakeholder managementmore »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAMManagement: Take responsibility for IdentityandAccessManagement (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
East London, London, United Kingdom Hybrid / WFH Options
RiverSafe Ltd
Lead security remediation efforts following audits against an identified list and extend this list as suitable to provide a rounded security posture. Privilege Management: Strategically manage and reduce standing privileges to minimise risks and ensure compliance with industry best practices and regulatory requirements. Attack Surface Reduction: Identify vulnerabilities … and Compliance: Formulate and document/diagram process and enforce policies for access control, identitymanagementand device management based on Microsoft security protocols and tools. Skills Minimum of 5 years of experience in a security engineering role with a focus on … Microsoft technologies, including Active Directory, Entra, Intune and Autopilot. Expertise in Microsoft Active Directory, Microsoft Entra & Conditional Access Policies, Azure Key Vault and Microsoft Certificate Authority. Experience with Bloodhound/Pingcastle/Azurehound or similar testing tools. CIS SecureSuite and application of CIS Benchmarks across the enterprise. Microsoft more »
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identityandaccessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identityandaccessmanagement strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, andidentityandaccess management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identityaccessmanagementand elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged accessmanagement, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with IdentityandAccessManagement with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagementand Governance use cases etc. Solutioning and Architecture experiences more »
from Office) Project Type: Contract Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. • Implement and manage SCIM provisioning for automated user lifecycle management • Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. • Configure and manage accessmore »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Brett Marshbanks - Senior Tooling Specialist Sponsorship: Unfortunately we are unable to offer sponsorship for this role. This role in 3 words: Secure Frictionless Access Top 3 qualities for this role: Passionate, Collaborative, Thorough Where you'll work: At OVO, we understand that a one size fits all approach … including SCIM Software Asset Management Administration and Analysis (Flexera) SaaS platform managementand security posture monitoring IdentityandAccessManagementand Privileged AccessManagement platforms (including Google Workspace and Entra ID) Allowlisting (application control) Endpoint Detection … and Response and SIEM Issue and Project Tracking (Jira) Cyber Asset and Attack Surface Management Scripting languages such as Bash and PowerShell You'll be a successful Digital Experience Engineer at OVO if you Are a challenger: guiding our enablement strategy will benefit from an analytical mindset, strong more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization andaccess control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identityandaccessmanagement, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability managementand secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • IdentityandAccess Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
Information Security, NIST Cyber Security Framework (CSF), Identityandaccessmanagement, SIEM, remote working and cloud technologies, CISSP, CISM, CRISC, financial tech) Perm role Hybrid Salary Neg (tbc) + share and great package! Multi award winning money saving & Investment App Company: An award-winning … well-prepared to respond to and recover from security incidents Oversee the implementation of vulnerability management processes, including regular scanning and patch management to address potential vulnerabilities Evaluate and manage the security risks associated with third-party vendors and partners Develop and maintain security metrics to … , ideally with the NIST CSF Have a good practical knowledge of security technologies and wider business solutions including Identityandaccessmanagement, SIEM, remote working and cloud technologies It’s desirable to have one of the following qualifications: CISSP, CISM, CRISC Have more »
scalability, security, and performance requirements. Implement infrastructure as code (IaC) principles using tools like Terraform, or Azure Resource Manager to automate the provisioning andmanagement of cloud resources. Deploy and configure cloud services and platforms, such as Azure, or Google Cloud Platform (GCP), based on best practices and … architectural principles. Implement security controls, identity, andaccessmanagement (IAM), encryption, and compliance standards to ensure the security and integrity of cloud environments. Optimise cloud infrastructure and services for performance, reliability, and cost-effectiveness, utilising monitoring, logging, and analytics tools to identify and address … CircleCI. Ability to implement infrastructure testing, deployment automation, and monitoring solutions. Security and Compliance: Knowledge of cloud security best practices, identity, andaccessmanagement (IAM), encryption, and data protection. Experience implementing security controls, compliance standards, and security monitoring in cloud environments. Understanding of regulatory more »
Security Management System frameworks and standards and their application. Partnered with knowledge of governance processes and practices, including ISMS monitoring and control management frameworks such as, ISO, ISF and COBIT, their relationships to other frameworks and the application within a financial services environment. Good working … knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identityandaccessmanagement, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls … WAFs, DLP, cryptography, vulnerability scanning, identityandaccessmanagement, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to audience and stakeholders. What more »
Transition Partners are excited to be working with a growing global cyber security consultancy to recruit a Business Analyst IAM (IdentityandAccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … Do you dare to disrupt the status quo? This is the role for you! Skills and Experience: Strong experience with Identityandaccessmanagement (IAM) experience Excellent communication skills as will be working collaboratively with clients Familiar with technologies such as Sailpoint, CyberArk andmore »