roles and their associated permissions Policy Enforcement: Testing correct application of access policies under varied conditions Experience with IdAM tools is required , including (but not limited to): Microsoft Entra CyberArk SailPoint ServiceNow Savyint Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised if you haven't heard from us within More ❯
and planning to launch and iteration. Technical Expertise: This role requires a deep understanding of security concepts, infrastructure, and the specific technologies used in Privileged Access Management, such as CyberArk or Delinea. Collaboration: Working closely with engineers, designers, security teams, and business stakeholders to deliver effective PAM solutions. Customer Engagement: PAM Technical PMs understand customer needs by interacting with More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
and planning to launch and iteration. Technical Expertise: This role requires a deep understanding of security concepts, infrastructure, and the specific technologies used in Privileged Access Management, such as CyberArk or Delinea. Collaboration: Working closely with engineers, designers, security teams, and business stakeholders to deliver effective PAM solutions. Customer Engagement: PAM Technical PMs understand customer needs by interacting with More ❯
Recommend improvements using RBAC, ABAC, and least privilege principles Design PAM architectures that support secure delegation across Windows, Linux, Solaris, and AIX platforms Evaluate and compare PAM solutions (e.g., CyberArk, BeyondTrust, Delinea) for technical fit and scalability Produce detailed documentation including architecture diagrams, risk assessments, and implementation roadmaps Collaborate with cross-functional teams to align PAM strategies with business … hosting environments Hands-on experience with Windows, Linux, Solaris, and AIX Familiarity with Active Directory, LDAP, SSH key management, and service account governance Proficiency with PAM tools such as CyberArk, BeyondTrust, Delinea Knowledge of identity federation and authentication protocols (Kerberos, SAML, OAuth) Exceptional analytical, documentation, and presentation skills Job Title: Privileged Access Management (PAM) Consultant Location: West Midlands, UK More ❯
which are accounts with elevated access to an organisation's critical systems and data. This role involves understanding business needs, translating them into technical requirements for PAM systems like CyberArk, documenting processes, and partnering with stakeholders and technology teams to reduce cyber risk and ensure compliance. Key Responsibilities: Business & Technical Analysis: Assess how PAM solutions can meet business and … implement improvements to PAM processes based on industry best practices and practical experience. Solution Design & Implementation: Support the design and deployment of PAM solutions, often involving specific products like CyberArk, to provide granular control and visibility over privileged accounts. Risk Management: Identify, assess, and report on security risks related to privileged access and work to reduce them through effective … requirements. Communication: Excellent verbal and written communication skills for interacting with diverse stakeholders. Technical Knowledge: Understanding of identity and access management (IAM), security principles, and potentially specific PAM tools (Cyberark, TPAM, BeyondTrust) Project Management: Ability to work on project deliverables and manage requirements through the development lifecycle Candidates will ideally show evidence of the above in their CV in More ❯
Bilston, West Midlands, United Kingdom Hybrid / WFH Options
Sky
the PAM system to ensure the confidentiality, integrity, and availability of sensitive data and systems. Mentoring and support for other members of the Team. What you'll bring Be CyberArk certified to at least Defender level. Strong recent experience with administrating and configuration of: CyberArk Azure AD Solid understanding of Identity Governance and Administration platforms (preferably One Identity More ❯