engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identitymanagement, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
leverage security capabilities in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure … by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing more »
Identity and Access Management Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office 365 Identity migration … expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The ideal candidate … Tenant Synch, and being aware of any potential limitations or caveats associated with them. The contractor is expected to have a specialization in Microsoft Identity services, indicating a comprehensive understanding of Microsoft's suite of identitymanagement solutions. Experience setting up Active Directory (AD) environments is implied more »
have experience in running global teams, across a number of timezones in a heavily regulated environment. Role: Provide technical leadership and guidance to the identity and access control team. Define and implement the enterprise identity strategy and operating models. Ensure compliance with relevant regulations and audit requirements. Oversee … implementation and management of identitymanagement systems. Drive identity and access control projects to timely completion. Develop and enforce identity and access control policies. Collaborate across departments to align identity services with business needs. Champion continuous improvement in identitymanagement practices. Requirements … Strong understanding of identity and access management (IAM) principles. Technical expertise in IAM solutions, network security, and cloud security. Proven leadership skills with the ability to motivate teams and build relationships. Excellent communication and project management abilities. Business acumen aligned with organizational goals and compliance frameworks. more »
Ready to utilise your developer skills in Integration and Identitymanagement? Are you passionate about delivering high quality solutions using the Microsoft Azure platform? Join us as an Azure .Net Identity and Integration Developer ! Careers at TCS: It means more TCS is a purpose-led transformation company … products to life. with customers and identify opportunities to support their strategy and improve their processes across functions. The Role As an Azure .Net Identity and Integration Developer , you will be responsible for the design and development of solutions, leveraging your .NET, C# developer knowledge on Azure platform; your … skills in Integration and Identitymanagement; and your experience in Azure DevOps and API building. Key Responsibilities: Design and develop solutions using Authentication and authorization protocols e.g., OpenID, and OAuth. Ensure development in C# and Microsoft .NET. Build and consume APIS (REST, SOAP). Design and develop cloud more »
IDAM subject matter expertise Assisting with the production and maintenance of IAM governance and process documentation Managing best practices Building the end to end Identitymanagement platform for over 10000 users. You will have: Strong SailPoint technical skills and onboarding application technologies to SailPoint IDN Experience implementing SailPoint more »
in security architecture, cloud security, application security, and DevSecOps practices. Strong knowledge of security principles, protocols, and technologies, including encryption, authentication, access control, and identity management. Experience with Kubernetes orchestration platform, including deployment, configuration, and management of containerised applications in production environments. Hands-on experience with cloud platforms … including static analysis, dynamic analysis, and software composition analysis. Solid understanding of DevOps principles and practices, and experience with CI/CD pipelines, configuration management, and infrastructure as code. Alongside a super exciting opportunity to join an established but growing security team that will support your personal and career more »
of 2 completed deployments. Essential Responsibilities and Requirements: * Proven 'Hands on' experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) * Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and applications/middleware technologies/platforms * Familiarity with Active Directory structures and IdentityManagement policies and processes * Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. * Experience facilitating business process design as … tasks. * Capability to organise and prioritise tasks * Strong interpersonal skills to establish/maintain relationships and interact with team members * Strong organisation and time management skills * Strong analytical and problem solving skills Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the more »
East London, London, United Kingdom Hybrid / WFH Options
RiverSafe Ltd
solutions. Lead security remediation efforts following audits against an identified list and extend this list as suitable to provide a rounded security posture. Privilege Management: Strategically manage and reduce standing privileges to minimise risks and ensure compliance with industry best practices and regulatory requirements. Attack Surface Reduction: Identify vulnerabilities … and modern operating systems, focusing on proactive threat mitigation. Policy and Compliance: Formulate and document/diagram process and enforce policies for access control, identitymanagement and device management based on Microsoft security protocols and tools. Skills Minimum of 5 years of experience in a security engineering … tools. CIS SecureSuite and application of CIS Benchmarks across the enterprise. Microsoft Intune and Autopilot. Deep understanding of security principles and technologies related to identity and access management, device management and data protection. Strong experience in reducing standing privileges and minimising attack surfaces in both legacy and more »
SK5, Heaton Norris, Borough of Stockport, Greater Manchester, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
ensuring the efficient, secure, and cost-effective operation of their cloud infrastructure on Microsoft Azure. You will be responsible for the day-to-day management of the Azure environment, including resource provisioning, performance optimization, security configuration, and troubleshooting issues. Responsibilities: Manage and optimize the deployment and configuration of Azure … resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identitymanagement, and threat detection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell) Troubleshoot and … latest Azure services and features Collaborate with development teams to ensure smooth integration with the cloud environment Develop and document operational procedures for Azure management Contribute to cost optimization strategies for the Azure environment Desired Skills: Azure certifications (AZ-104, AZ-500) Experience with DevOps methodologies and CI/ more »
An excellent opportunity has arisen for an Identity & Access Management Analyst to join us. This role will help to support the operational Identity & Access Management activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic … change projects as our IAM function matures and grows. The role reports directly to the Identity & Access Management Lead. The role holder will work closely with our colleagues in Cyber Security Operations team, Risk & Compliance, HR and Infrastructure Teams, as well as L&Q business teams. You will … This would suit someone technical and an analytical problem solver who enjoys working as part of a team in an evolving environment. As an Identity & Access Management Analyst, you will be part of the team thats driving Identity as the new security perimeter. The Identity & Access more »
and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of Privileged Access Management processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, IdentityManagement policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an Employment Business in more »
maintain and develop the Azure Integration and Orchestration platform. Key Requirements: - Experience with Azure PaaS Integrations services, Logic Apps, Service Bus - Thorough understanding of Identitymanagement within Azure - C# Knowledge Why this role? This role offers significant opportunity for growth over time, with a natural progression path into more »
You'll have the opportunity to lead the day-to-day management of all Modern Workplace department, providing services to c.100k users across four regions. You'll lead on all strategy and provide insight on the best solutions and security to meet the growing demands of the organisation. You … are managed, monitored, and secured in accordance with latest controls and standards. Provide leadership and guidance to the Modern Workplace team, ensuring the successful management of BAU and project work. Providing solutions across all IT departments to support projects and future technologies. Mobile Device Management (MDM): Implement and … implement improvements to optimize them. Working closely with other ITSM, Applications and Cyber teams to ensure there is a coordinated approach to security, platform management and continuous improvement. Implement robust security measures to safeguard client data, devices, and communications within the modern workplace environment, adhering to industry standards and more »
Northampton, Northamptonshire, East Midlands, United Kingdom
The University of Northampton
Storage Spaces) Virtual Infrastructure VMWare, Hyper V, Nutanix Linux/Unix administration Mimecast Web and Email Backup and recovery/DR Testing Service Monitoring IdentityManagement (IDM) MS Certificate Services Azure/AWS and AZURE MFA security configuration PowerShell scripting You will be able to demonstrate at interview … that you have experience working as part of a team, while giving exceptional customer service to end users. Knowledge/experience of project management processes and delivery of project elements. Experience at undertaking operational activities, such as support, monitoring and trouble shooting incidents. Personal Qualities: Excellent interpersonal skills with … Storage Spaces) Virtual Infrastructure VMWare, Hyper V, Nutanix Linux/Unix administration Mimecast Web and Email Backup and recovery/DR Testing Service Monitoring IdentityManagement (IDM) MS Certificate Services Azure/AWS and AZURE MFA security configuration PowerShell scripting Qualifications Essential: Relevant Professional IT Certification or experience more »
Essential Functions Take a lead role in the delivery of BAU Identity and Access management operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory/Entra ID : Analyze, design … Support synchronization and federation between on-premises AD, Azure AD, and Entra ID. Troubleshoot and optimize synchronization processes to maintain consistency across environments. Privileged Management (PIM, PAM, and Endpoint Privilege Management) : Implement time-based and approval-based role activation to mitigate risks associated with privileged accounts. Administer PAM … and manage role-based access control (RBAC) for various systems and applications. Define and enforce group-based access policies to elevate privileges when necessary. Identity Governance and Administration (IGA) : Contribute during phases of design, configuration, deployments, and operations in the area of IAM. Work on access management, identitymore »
Identity and Access Architect/Engineer – Edinburgh or Glasgow - 9 Month Contract Lorien’s Public Sector client are currently recruiting for a Business Architect to join on a 9 month initial contract, inside IR35. The successful candidate will have the following skills/knowledge: Okta Workforce Identity Cloud … able to use MS Excel to monitor and track work as well as perform analysis when required including vlookups, pivot tables etc. Okta Workforce Identity Cloud SAML/OIDC Active Directory Working knowledge of other cloud-based security platforms which complement the IdP landscape, i.e., Entra, zScaler, Crowdstrike, etc. more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Experience of solution … areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Understand the business, commercial and technical requirements to write clear technical high-level designs is vital Lead Workshops and reduce complex ideas more »
IIS, NPS, RDS, DFS. Active Directory with multiple forests and forests with multiple domains Troubleshoot basic problems in MS SQL Microsoft Azure, IaaS and Identitymanagement (ADFS, WAP) Working knowledge Private and Public Cloud platforms, Azure and AWS Virtualisation Technologies (VMware, Hyper-V,) SAN and Clustering technologies (Dell more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identitymanagement and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to deliver outcomes for users Desire more »
changes. The programme of works includes: Network modernisation, including a change to the Virtual Private Network (VPN) and mobile authentication Active Directory Consolidation and IdentityManagement Upgrade to Exchange Online Upgrade to Windows 11 Implementation of Microsoft Intune for Mobile Device Management. So if you are an experienced more »
are looking for, Role: Front-End Developer (React.js/Redux) Location: Leeds, UK Role Type–Hybrid–FTC 12 Months Must have Prior experience with identitymanagement, implementing MFA, and rolling out features such as SSO using tools like Okta and Auth0. NO SPONSORSHIP WILL BE PROVIDED If you more »
Senior Application Security Engineer, strategy, stakeholder conversations, thought leader, proactive, identitymanagement, consulting, influencing, forward thinking, autonomy, code review, audits, pen testing, application reviews A fantastic opportunity has arisen for a skilled Senior Application Security Engineer with excellent communication skills to join a global cloud-based platform provider more »
Lead cross-functional teams in developing both high-level and detailed technical designs, ensuring security is integrated at all stages of project development. Risk Management and Compliance : Perform in-depth risk analyses and compliance assessments, contributing to the overall security strategy and roadmap. Advocate for a balanced approach to … risk management that supports business objectives while protecting critical assets. Innovation and Research : Stay abreast of the latest cybersecurity trends, tools, and technologies. Lead initiatives to pilot and adopt innovative security solutions that enhance defense capabilities. Stakeholder Engagement : Act as a key advisor on security matters to stakeholders across … the organization. Provide expert guidance on security best practices, risk management, and technology solutions. Requirements: Experience : A minimum of 12 years in IT, with at least 10 years focused on Information Security. Demonstrated experience in security architecture and strategy is essential. Education : Bachelor's degree in Computer Science, Information more »
you'll also need are: Power Apps Power Automate Power BI Power Virtual Agent You must have an understanding of: Azure Integration Services Microsoft IdentityManagement Solutions If you're looking for work please do send me your updated CV and I will shortlist you for the role. more »