and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
months contract with the opportunity for multiple extensions. The position can be worked 100% remotely. Key Skills/Deliverables: Proven Project management experience Ability to manage projects in a large scale environment Demonstratable delivery experience of IdentityAccessmanagement projects PAM project … delivery experience Strong knowledge of NIST framework and compliance Excellent understanding and previous experience delivering Cyber Security projects Strong understanding of IdentityAccessmanagement Experience working with CyberArk Strong communication skills Delivery focused mindset Excellent stakeholder management IAM Project Manager - IAM, PAM more »
Fortune 500, published June 2023, data as of December 2022. Compensation provided for using, not obtaining, the rating. Team Overview: The Security AccessManagement team is responsible for ensuring application infrastructure stability and connectivity to our Financial Advisors and Home office associates. Our key systems include … web accessmanagement, HashiCorp Vault provisioning, etc. We are responsible for supporting and enhancing our existing systems and developing technology solutions that support and enhance the technology division in alignment with firm's vision. What You'll Do: Responsibilities for this position include designing, coding, testing … equivalent experience in information systems. Familiarity with networking concepts and common application protocols such as HTTPS, DNS, Kerberos, LDAP, etc Familiarity of performance management tools and monitoring solutions Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are more »
Fortune 500, published June 2023, data as of December 2022. Compensation provided for using, not obtaining, the rating. Team Overview: The Security AccessManagement team is responsible for ensuring application infrastructure stability and connectivity to our Financial Advisors and Home office associates. Our key systems include … web accessmanagement, HashiCorp Vault provisioning, etc. We are responsible for supporting and enhancing our existing systems and developing technology solutions that support and enhance the technology division in alignment with firm's vision. What You'll Do: Responsibilities for this position include designing, coding, testing … equivalent experience in information systems. Familiarity with networking concepts and common application protocols such as HTTPS, DNS, Kerberos, LDAP, etc Familiarity of performance management tools and monitoring solutions Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are more »
Fortune 500, published June 2023, data as of December 2022. Compensation provided for using, not obtaining, the rating. Team Overview: The Security AccessManagement team is responsible for ensuring application infrastructure stability and connectivity to our Financial Advisors and Home office associates. Our key systems include … web accessmanagement, HashiCorp Vault provisioning, etc. We are responsible for supporting and enhancing our existing systems and developing technology solutions that support and enhance the technology division in alignment with firm's vision. What You'll Do: Responsibilities for this position include designing, coding, testing … equivalent experience in information systems. Familiarity with networking concepts and common application protocols such as HTTPS, DNS, Kerberos, LDAP, etc Familiarity of performance management tools and monitoring solutions Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are more »
Fortune 500, published June 2023, data as of December 2022. Compensation provided for using, not obtaining, the rating. Team Overview: The Security AccessManagement team is responsible for ensuring application infrastructure stability and connectivity to our Financial Advisors and Home office associates. Our key systems include … web accessmanagement, HashiCorp Vault provisioning, etc. We are responsible for supporting and enhancing our existing systems and developing technology solutions that support and enhance the technology division in alignment with firm's vision. What You'll Do: Responsibilities for this position include designing, coding, testing … equivalent experience in information systems. Familiarity with networking concepts and common application protocols such as HTTPS, DNS, Kerberos, LDAP, etc Familiarity of performance management tools and monitoring solutions Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
either Go or Kotlin knowledge although the main focus will be Azure AD. Kubernetes is a nice to have. The identityandaccessmanagement experience is the primary skillset needed as you will be responsible for designing, implementing, and managing cloud security/identity solutions. You will work closely with the security and cloud teams to ensure the secure provisioning andmanagement of identities across different systems, including Active Directory, Entra ID, and GCP. Cloud Identity Engineer - IAM (Azure AD) - Responsibilities: * Design, develop, and maintain automation scripts and … using Go or Kotlin for IAM tasks * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Automate infrastructure provisioning and configuration using more »
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged AccessManagement governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Managementmore »
guidance in infrastructure on GCP. Collaborate with teams to enhance and optimize cloud infrastructure cost and performance. The Main Responsibilities Implementation experience with identitymanagementand networking segmentation in GCP across multiple VPC networks and multiple projects. Work closely with Architect, Security/application team and … Cloud Services Platform, Google Kubernetes Engine, Compute Engine, Google Cloud Load Balancing, Storage, Security, Monitoring, etc.). • Knowledge of Security, IdentityandAccessManagement (IAM), Key Management, Access Controls and Security Protocols, Network routing, Firewalls, ACL's, cloud IaaS components … on GCP. • Knowledge with containerization, orchestration tools like Kubernetes, and continuous integration and deployment (CI/CD) pipelines. • Automate provisioning of networks andaccess (Organization, Routes/Firewalls, IAM, Policy). Compensation The starting salary for this role differs based on the employee's primary work location. Employees more »
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identityandaccessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identityandaccessmanagement strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, andidentityandaccess management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with IdentityandAccessManagement with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagementand Governance use cases etc. Solutioning and Architecture experiences more »
Exciting Opportunity for a Linux Engineer! 🌐. Amazing opportunity to work on a highly visable IdentityandAccessManagement programme of work. Ideally the client seeks a Linux Engineer with IAM - IDAM - PAM or SIEM Tooling experience. In the rapidly evolving world of electronic … a pivotal member of the team the Linux Engineer can expect to: 🔧 Craft and maintain robust Linux server environments. 🔒 Be heavily involved in IdentityAccessManagement project. ⚡ Support lightning-fast high-frequency trading systems. 💡 Deploy the latest upgrades to Linux Servers ensuring peak performance. … Unix – Linux support and engineering. 🛠 Mastery in enterprise Linux, with a preference for Red Hat, CentOS, or Oracle Linux. 🔒 Recent hands-on exposure with IDAM, PAM, or SIEM tooling. 👁️🗨️ A track record with monitoring tools like Prometheus or Nagios. 🖥️ Scripting skillset in Python, Shell, Bash, or Ruby. 🌐 In-depth understanding more »
We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK … CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in IdentityAccessManagementand Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law Enforcement, Retail, Insurance, Telecoms … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
Transition Partners are excited to be working with a growing global cyber security consultancy to recruit a Business Analyst IAM (IdentityandAccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … Do you dare to disrupt the status quo? This is the role for you! Skills and Experience: Strong experience with Identityandaccessmanagement (IAM) experience Excellent communication skills as will be working collaboratively with clients Familiar with technologies such as Sailpoint, CyberArk andmore »