you'll also need are: Power Apps Power Automate Power BI Power Virtual Agent You must have an understanding of: Azure Integration Services Microsoft IdentityManagement Solutions If you're looking for work please do send me your updated CV and I will shortlist you for the role. more »
Solutions Architect. The key purpose for the position is to manage the applications and technology in the company. This includes Integrating products Managing Data IdentityManagement systems and software Enhancing existing applications Must have an excellent understanding of networks and infrastructure Must have excellent knowledge of the Azure more »
Job Title: Identity and Access Management Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found iconic brands by remixing … deliver outcomes that are music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective Identity and Access Management (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities and access … and access updates. Skills and Requirements: Academic or professional qualifications in Computer Science, Information Technology, or related field. Minimum 2 years of experience in identity and access management, preferably in a cloud environment. Experience with IDAM tools such as Azure AD and Azure PIM. Preferred experience with Oracle more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
experienced IT Consultant/Engineer/IT Manager to become one of the team. They are a thriving and growing business specialising in IT Management, Device and IdentityManagement, Cyber Security, Networks, Cloud platforms, and Connectivity. Relationships and technical excellence are the name of the game with … ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design fault-tolerant systems, ensure data more »