Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable … level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation cybersecurity roles … or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within large scale enterprises More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Experis
and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable … level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation cybersecurity roles … or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within large scale enterprises More ❯
other supporting systems it will need to integrate with as part of the end-to-end journey. Project Overview: Our client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the … pillars of that programme is Privileged Access Management (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with … senior leadership & stakeholders. Job Responsibilities/Objectives: You will be responsible for leading the end-to-end design and delivery of secure, scalable architecture solutions within the Privileged Access Management (PAM) programme, ensuring alignment with business requirements, security principles, and architectural standards while providing technical thought leadership, managing design teams across onshore and offshore locations, and driving governance, risk More ❯
York, Yorkshire, United Kingdom Hybrid / WFH Options
Hiscox SA
roles to track, enable and report upon the delivery work across the project portfolio. Key responsibilities: Project Governance & Support of the portfolio of data projects Maintain the WAVE project management tool for updates to project status, milestone tracking, risks, issues, financial tracking, KPI's and regular reporting to the Transformation Office. Support project managers in planning, documentation, and delivery … Data Strategy. Provide insights into data project performance using tools like PowerBI, Excel, and JIRA. Prepare reporting packs for project steering committees, risk forums, and Transformation Office. Financial & Resource Management support. Assist in budget tracking and forecasting for the data programme and projects, including vendor spend and internal resource allocation. Monitor capacity planning across data teams, proactively identify potential … accurate data capture and reporting. Support integration of project data with enterprise platforms. Promote best practice - explain, negotiate, embed and agree best change methodology and governance and develop knowledge management for future projects from past projects. Post Implementation Review/Health Checks - accountable for ensuring all deliveries are reviewed at key points and when completed. Governance/Compliance - enhance More ❯
80K You will be the strategic leader responsible for defining and embedding a unified approach to change delivery across a global organisation. Reporting to the Group Head of Change Management , your focus is to mature our change environment and establish a high-performing global PMO function. Core Responsibilities and Impact Establish the Group Change Framework: Accountable for embedding a … the Group. PMO Service and Capability Maturation: Build and mature an effective global PMO service offering. This includes owning key associated tools (e.g., PPM tool, JIRA & Confluence) and portfolio management processes. Delivery Assurance and Oversight: Provide Delivery Assurance oversight for the IT Change portfolio. This involves regular portfolio deep dives, thematic reviews, and a focus on maturing assurance in … areas like dependencymanagement and risk escalation. Drive Strategic Insight: Create and own Group MI Dashboards. Deliver insight through improved MI to drive decision-making from senior stakeholders. Provide adequate assurance on budget control, benefit realisation, and risk management. Process Improvement: Transform current Change functions into more efficient organisations by implementing best practices, new standards, and governance. Improve More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged Access Management (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments, and delivering enterprise … for design decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & DependencyManagement Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME … teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & Access Management (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design decision records). Experience in large More ❯
using Mockito to ensure robust and reliable applications. oSolid understanding of Architectural Patterns, with a focus on Clean Architecture, which is frequently used in modern Android development. oExpertise in Dependency Injection frameworks. oStrong knowledge and working experience with Retrofit for API integration. oHands-on experience with Dagger for dependencymanagement and scalable application development. 3.Experience Requirement We More ❯
Experience working with third-party vendors and outsourcing partners. Strong track record in end-to-end project delivery within medium to large organisations. Exposure to ITIL environments and service management principles. Experience working with cross-functional teams including SMEs, business analysts, and technical teams. Desirable Experience of MSP transitions Skills & Competencies Strong project planning and coordination skills. Excellent communication … and stakeholder engagement abilities. Risk, issue, and dependency management. Ability to work under pressure and manage competing priorities. Comfortable working in structured project environments (e.g., Agile, Waterfall, Hybrid). Tools & Methodologies Proficiency in project management tools such as MS Project, Jira, Confluence, or Azure DevOps. Familiarity with ITIL processes (certification desirable). Competence in producing project documentation and More ❯