occur in their infrastructure which are reported. Ensuring enough information is present to deliver a sound security risk assessment. Responsibilities: Support the roll out, management and monitoring of a programme promoting the adoption of the new legislation underpinning the TSR. Provide annual report to the SOS (Secretary of State … Experienced in fixed and mobile signalling (GSM through to 5G) and virtualisation from a telecom’s perspective. Strong understanding across all cyber security risk management domains (strategy; governance and risk management; protection, detection, response, recovery and resumption of services; situational awareness; testing). Knowledge of fixed and mobile … communication skills including clear and effective presentation to both internal and external audiences. Desirable Skills/Experience Managing and monitoring security assurance programmes. Project management including developing and delivering against plans, managing risks and issues along the way. Experience and understanding of some of these technical areas: Supply chain more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
experienced IT Consultant/Engineer/IT Manager to become one of the team. They are a thriving and growing business specialising in IT Management, Device and IdentityManagement, Cyber Security, Networks, Cloud platforms, and Connectivity. Relationships and technical excellence are the name of the game with … ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design fault-tolerant systems, ensure data more »
Identity and Access Management (IAM) Consultant Remote (company based in Germany) €60k - €80k *Must have full right to work* A growing IdentityManagement Consultancy based out of Germany is looking for experienced IAM professionals to join their team as an IAM consultant ! This is an excellent … opportunity to join an independent consultancy and utilise your experience to help the business in their growth through advising clients on digital identity solutions and implementation. They are looking for individuals who speak excellent English and German. Responsibilities of an IAM consultant: Analysis of clients IAM requirements and advising … and process configuration Implementation of technically sophisticated IAM solutions continuous testing of applications and monitoring Requirements of an IAM consultant Proven experience as an Identity and Access Management SME Consulting experience essential – ideally from smaller consultancies and/or ability to deliver on engagements, presentations and workshops. Solid more »
immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical information technology security issues. Recommends and coordinates the application of fixes, patches, & recovery procedures in the event of … breach. Understanding of security tools and platforms including SIEM, IPS/IDS, SecOps, Endpoint and Server protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class Identity and Access Management solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber … Excellent presentation, facilitation and diplomacy skills. High level of personal integrity consistent with Gilead’s core values. EDUCATION & CERTIFICATION Bachelor of Science degree in management information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk more »
mission critical solutions Support Customers on Onboarding Processes. Support Customers in Support Cases What we need in you: SKnow How of TLS and SSH IdentityManagement Platform know how Command of English in spoken and written Good Know How in general security capable of automating repetitve tasks Technical … Skills Hands-on experience with AS2, SFTP, FTP, HTTP protocols Hands-on experience with MFT Systems such as Axway and IBM, etc Identity and Access Management knowledge (Certificate Management) Proficient with security Scripting know-how in Shell and Python more »
leverage security capabilities in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure … by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities and access, supporting secure collaboration, and staying current with the latest technologies. You'll also be instrumental … appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identity and access management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA … We work collaboratively and imaginatively. ABOUT YOU We are looking for an IGA Analyst who is detail-oriented, analytically minded, and well-versed in identity governance and access management practices. The ideal candidate possesses strong technical expertise across various identity technologies (e.g., Saviynt, Azure, SailPoint) and a more »
As an IAM Managing consultant you will use a variety of tools including Azure AD, SailPoint, and Okta as the company’s lead for Identity and Access Management. You will manage the products, configure, enhance, optimise and look towards future tools and technologies to ensure the business is constantly … will be responsible for: Define project scope, milestones, and success/acceptance criteria. Plans will outline the project objectives, timelines, resources, and deliverables. Team Management Risk Management What's in it for you? Bonus Pension 25 Days Holiday + Bank holidays Private Medical + more! “By applying for more »
divisional strategic roadmaps, and industry standard best practices to ensure our infrastructure products & practices are enablers to the wider L&G strategic goals Operational Management & Governance – Taking accountability ofInfrastructure Engineering operations, ensuring the Infrastructure Products are reliable, accessible, and compliant to the L&G Technology & InfoSec Risk Management frameworks. Management of Infrastructure Engineering costs, optimised for maximum value to support business sustainability & growth Ways of Working – Leading organisational consistency of DevSecOps supporting a common orchestration pipeline so that complexity is reduced, enabling enterprise efficiency, scalability, and sustainability. Driving and role modelling agile mindset and methodology, embedding … life cycles, and up-to-date knowledge on industry standards and best practices Knowledge of business models, operating models, financial models, budgeting, and risk management Knowledge of business ecosystems, SaaS, IaaS, PaaS, SOA, API, open data, micro services, event driven IT and predictive analytics and business intelligence/analytics more »
divisional strategic roadmaps, and industry standard best practices to ensure our infrastructure products & practices are enablers to the wider L&G strategic goals Operational Management & Governance – Taking accountability ofInfrastructure Engineering operations, ensuring the Infrastructure Products are reliable, accessible, and compliant to the L&G Technology & InfoSec Risk Management frameworks. Management of Infrastructure Engineering costs, optimised for maximum value to support business sustainability & growth Ways of Working – Leading organisational consistency of DevSecOps supporting a common orchestration pipeline so that complexity is reduced, enabling enterprise efficiency, scalability, and sustainability. Driving and role modelling agile mindset and methodology, embedding … life cycles, and up-to-date knowledge on industry standards and best practices Knowledge of business models, operating models, financial models, budgeting, and risk management Knowledge of business ecosystems, SaaS, IaaS, PaaS, SOA, API, open data, micro services, event driven IT and predictive analytics and business intelligence/analytics more »
Manager (CPM) Privileged Session Manager (PSM) HTML5 Gateway (H5G) Privileged Threat Analytics Essential Responsibilities and Requirements: Demonstrated hands-on experience with CyberArk's Privileged Identity and Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR). Proven experience in extending existing CyberArk technologies and practices, providing recommendations … ideally CyberArk. Required Experience & Qualifications: Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and Middleware technologies. Understanding of Active Directory structures, IdentityManagement policies, and processes. Knowledge of PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience in facilitating business process design … Ability to organize and prioritize tasks effectively. Strong interpersonal skills to establish and maintain relationships and interact with team members. Excellent organization and time management skills. Strong analytical and problem-solving skills. more »
Identity and Access Architect/Engineer – Edinburgh or Glasgow - 9 Month Contract Lorien’s Public Sector client are currently recruiting for a Business Architect to join on a 9 month initial contract, inside IR35. The successful candidate will have the following skills/knowledge: Okta Workforce Identity Cloud … able to use MS Excel to monitor and track work as well as perform analysis when required including vlookups, pivot tables etc. Okta Workforce Identity Cloud SAML/OIDC Active Directory Working knowledge of other cloud-based security platforms which complement the IdP landscape, i.e., Entra, zScaler, Crowdstrike, etc. more »
Skills: · Proficient in supporting and maintaining SAP ECC/ECP and SAP PI/PO environments. · Comprehensive SAP Basis knowledge, including system patching, user management, performance tuning, transport management, monitoring, authorisations, and troubleshooting. · Experience with server OS support and troubleshooting across Windows Server and Linux. · Knowledgeable in networking … Familiarity with integration platforms such as SAP CPI, SAP PI/PO, and Dell Boomi. · Experience with Single Sign-On (SSO) implementations. · Understanding of identitymanagement solutions, including Microsoft Entra ID (formerly known as Azure AD) and Active Directory. · Experience in MS SQL Server database administration. · Expertise in … Soft Skills: · Exceptional proficiency in English, both in speaking and writing. · Capable of employing a logical and analytical approach to problem-solving. · Proven time management capabilities, with the ability to adhere to project timelines while juggling multiple client engagements. · Openness to acquiring new abilities and adapting to change. more »
Strong experience in Agile Development Methods including Scrum. A very good knowledge of IAM Concepts, Architectures & Technologies. A good understanding in the field of IdentityManagement (SSO, identity encouragement, role-based access control, etc.). Your Profile: Completed University Degree in the area of Computer Science or more »
the platform architecture, technology strategy, and implementation standards. Design and develop scalable, high-performance data architecture solutions that support marketing analytics, customer segmentation, campaign management, and personalization initiatives. Focused on data modeling, data quality, data integration and data governance. Provide technology guidance to shape the overall strategy. Collaborate with … and concise manner. Create and maintain architecture diagrams, design documents, and other artifacts to facilitate understanding and communication among stakeholders. Present solutions to leadership, management, architects, and developers Provide technical leadership and guidance to junior architects and engineering teams, ensuring best practices are followed in architecture design and implementation. … techniques. Familiar with agile software development methodologies and understanding of enterprise project lifecycle. Experience in developing architectural solutions that contain multiple tiers. Familiar with identity resolution and identitymanagement concepts within customer-facing web applications. Qualifications: Bachelor's or master's degree in computer science, Information Systems more »
and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of Privileged Access Management processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, IdentityManagement policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an Employment Business in more »
London, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
AWS and Azure environments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as … tasks. Capability to organise and prioritise tasks Strong interpersonal skills to establish/maintain relationships and interact with team members Strong organisation and time management skills Strong analytical and problem solving skills more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Broad knowledge and … experience of solution areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Ability to rapidly understand the business, commercial and technical requirements to write clear and concise technical high-level designs more »
of 2 completed deployments. Essential Responsibilities and Requirements: * Proven 'Hands on' experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) * Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and applications/middleware technologies/platforms * Familiarity with Active Directory structures and IdentityManagement policies and processes * Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. * Experience facilitating business process design as … tasks. * Capability to organise and prioritise tasks * Strong interpersonal skills to establish/maintain relationships and interact with team members * Strong organisation and time management skills * Strong analytical and problem solving skills Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the more »
best suited for this position will be someone who loves to stay on forefront of technology and bring practical and efficient solutions in network management and connectivity, is able to work independently and is highly motivated to engage various teams to improve employee and customer experience. The Network and … strong work ethic and pride in delivering quality work with a security first attitude. Strong experience with firewall and network design (Palo Alto Firewall management), SD-WAN and BGP routing (7-8 yrs.) Experience with Site-to-Site IPsec VPN management and optimization, AWS VPC's, QOS and … Differentiated Services. Familiarity with Public cloud (AWS and Azure) design, and Colocation, Datacenter, Hybrid Cloud Delivery Models Understanding of Endpoint Configuration Management Concepts (Intune, JAMF, Mosyle) Experience with IdentityManagement Concepts (Azure, Active Directory, DUO, Okta) Experience with Cisco Meraki switches, Aruba WiFi, RUCKUS WiFi, layer more »
Warwickshire, Coventry, West Midlands (County), United Kingdom
Adria Solutions Ltd
based in Warwickshire is currently looking for an experienced Cloud Solutions Engineer. In this position, you Contribute to the architecture, deployment, delivery, configuration, and management of our clients Hybrid Cloud Solutions, with particular emphasis on the Microsoft Azure estate, ensuring optimum performance, availability, and security. Key Duties and Responsibilities … Implementation and management of Azure-based cloud storage Utilising Microsoft and industry security best practices, aligning with the Microsoft Cloud Adoption Framework for Azure, Working closely with our Development Team supporting and following Continuous Integration (CI), and Continuous Deployment (CD) best-practices using Azure DevOps build and release pipelines. … complex issues surrounding the Azure estate Attend cross-functional meetings to help drive appropriate cost-effective design solutions to support business goals and strategy Management of Azure IdentityManagement Experience: Excellent knowledge of Azure Architecture and Solutions and Administration Experience delivering Azure IaaS/PaaS solutions with more »
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identitymanagement, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
the platform architecture, technology strategy, and implementation standards. Design and develop scalable, high-performance data architecture solutions that support marketing analytics, customer segmentation, campaign management, and personalization initiatives. Focused on data modeling, data quality, data integration and data governance. Provide technology guidance to shape the overall strategy. Collaborate with … and concise manner. Create and maintain architecture diagrams, design documents, and other artifacts to facilitate understanding and communication among stakeholders. Present solutions to leadership, management, architects, and developers Provide technical leadership and guidance to junior architects and engineering teams, ensuring best practices are followed in architecture design and implementation. … development methodologies Agile/Scrum/Kanban and understanding of enterprise project lifecycle. Experience in developing architectural solutions which contain multiple tiers. Familiar with identity resolution and identitymanagement concepts within MarTech. Qualifications: Bachelor's or master's degree in computer science, Information Systems, or related field. more »
vendors, customers, and team partners. Ability to solve technical problems involving a variety of integrated software and hardware platforms. Well-versed with Linux system management, specifically with Red Hat OS including IdentityManagement (IdM) and Single Sign On (SSO). Experience with scripting (Ansible, Python, Bash, Puppet more »
vendors, customers, and team partners. Ability to solve technical problems involving a variety of integrated software and hardware platforms. Well-versed with Linux system management, specifically with Red Hat OS including IdentityManagement (IdM) and Single Sign On (SSO). Experience with scripting (Ansible, Python, Bash, Puppet more »