MBR partners are working with a UK based Telecommunication client that offers digitalidentity solutions that allow enterprises, such as banks, to verify Mobile Service Provider information via an API, for the purpose of building up fraud scores for transactions. For example, companies would be able to understand … prioritised recommendations as well as consultative support to their clients while partnering with internal leadership teams and colleagues in helping the clients protect their digital assets, information, and systems from cyber threats and vulnerabilities. A crucial function of the role includes designing and tailoring these services for inclusion in More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identity and access management efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. The ideal candidate will possess extensive … and risk management. We welcome applications from individuals of all backgrounds and experiences. Heres a taste of what you will be doing as an Identity Governance Access Manager at Nottingham Building Society: Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and … operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security Principles: Ensure segregation of duties and least privilege principles are enforced. IAM Management: Manage IAM processes and tools, including SSO, MFA, and federation More ❯
We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identity and access management efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. The ideal candidate will possess extensive More ❯