implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. More ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
from servers and networks to storage and endpoint solutions. Working as the Senior Infrastructure Engineer/Network Support Technician youll lead on project workstreams, contribute to critical incident management, and be a go-to expert for more complex technical challenges. Your insight and experience will help shape the way the organisation deliver services to their colleagues and ultimately … or similar) or equivalent experience. Youll have hands-on experience managing cloud and hybrid systems, networks, storage and virtualised platforms, alongside solid knowledge of Microsoft 365, Azure, and endpoint management tools such as Intune. Youll also be a clear communicator and proactive problem solver, able to stay calm under pressure and comfortable working across multiple priorities. If you … in a multi-site environment Experience of virtualised Windows Server platforms and components i.e. Hyper-V, VMWare In depth understanding of Active Directory, Azure AD, IdentityandAccessManagement, account risk managementand role-based access tools Experience in deploying and managing network switches, WiFi, routers, firewall and network appliance More ❯
Bracknell, England, United Kingdom Hybrid / WFH Options
Lorien
technical stakeholders which will require comprehensive communication skills. Work collaboratively with with internal agile engineering teams Deliver value by ensuring quality, efficiency and cost effectiveness from all infrastructure management contracts. Manage suppliers and vendors to ensure Infrastructure Platforms remain secure, stable, robust and performant by delivering and maintaining end to end Operational Excellence Ensure that the services provided … Hosted Service principles, along with proven experience of how these technologies support an enterprise business. Proven experience of managing high value third party contracts delivered predominantly offshore, and having budgetary management skills, understanding of contract penalties and experience with service renewals and supporting processes The ability to work in a time-sensitive situation in a busy environment, with … the following skills and experience: Data Centre Hosting - Virtualisation (VMware | GCVE) Data Centre Storage - SDS, and NAS, and SAN Operating Systems - Wintel, Linux Active Directory | IdentityandAccessManagement | PAM Sever Configuration and Patch Management (SCCM) If this role is of interest to you and you meet the criteria's, please apply More ❯
IdentityandAccessManagement (IAM) & Security Expert We are looking for a hard-working candidate who can design and deliver excellent IAM solutions to a range of major private & public sector clients. You should be able to follow set procedures and be able to work on your own and within a team. Candidates will More ❯
Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity managementand planning in place for the security services and solutions assigned to you and ensure that the … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. More ❯
look for your experience and knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset … managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This role requires you to hold or fulfil the criteria to obtain a UK Security Clearance More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
services. Ensure project designs comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future strategy … deliver a wide range of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person for any project issues More ❯
lead with empathy, and deliver results Public Sector Experience: Ideally with secure government projects and familiarity with compliance/assurance processes IAM Knowledge: Exposure to IdentityandAccessManagement within secure data environments If interested, please share your CV at chaya@mastek.com Regards Chaya Bahl More ❯
in cloud native environments (Azure preferred) Natural leadership style – empathetic, delivery focused, and team first Experience working within secure or highly regulated environments Familiarity with IdentityandAccessManagement (IAM) in secure data contexts You’ll be stepping into a fast moving programme that values clarity, pragmatism, and delivery excellence. 🔐 Must have active SC More ❯
consultative selling. In the security industry, we develop high-quality solutions that are offered both on-premises and as SaaS solutions. Our products focus on IdentityandAccessManagement processes, with the goal of simplifying configuration andmanagement for our customers. End users appreciate our solutions for creating a secure and trusted … element of the role, you must be able to confidently deliver training sessions to engineers of varying levels of expertise; Develop and grow your own knowledge about our access control solutions by testing new functionalities, integrations and providing input for their documentation; Participate in and/or leads complex projects together with business partnersfrom the perspective of the … sales processes; including being part of a presentation/pitch team and delivering compelling product demonstrations; Advise and provide product or selling information to external stakeholders up to management level; Develop strong relationships with end-users and business partners to continuously improve collaboration; Assist and participate in events. Your team In the role of Technical Support & pre-Sales More ❯
have). Experience of implementing Databricks and Data Warehouse solutions (must have). Expertise in integration architecture and design patterns. Protocols and formats SOA, Rest, JSON, XML, etc. IdentityandAccess management. Cloud to Cloud integration & Cloud to On Premise integration. Front End and Back End integrations, network and infrastructure management (desirable). Experience More ❯
dump analysis; knowledge of development testing (JUNIT, Cucumber, Selenium); understanding of Security aspects, OWASP guidelines. experience in Performance Analysis and applications tuning understanding of Kubernetes Identityandaccessmanagement such as Forgerock different integration technologies, data streaming technologies and Kafka understanding of Kafka architecture enterprise level Elastic Solution knowledge More ❯