EITHER CDE Certification within Privileged Cloud or the Guardian Cert. key responsibilities are as follows: Providing subject matter expertise in IdentityandAccessManagement (IAM), specifically in CyberArk Leading transformations in areas such as identity governance, privileged accessmanagement, accessmanagementand customer identityaccessmanagement Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback If this is of interest, please submit More ❯
I am recruiting for a Security Architect who will provide expert advice and guidance on IdentityandAccessManagement (IDAM) and Privileged AccessManagement (PAM) solutions. This is a hybrid role - 2 days in London, 3 days remote. The role … several years experience in a Cyber/Information Security Role. You must hold a relevant Security Certifications (e.g., CISSP, CISM). Extensive experience in IDAM/PAM consulting, with a proven track record of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra … ), standards, and best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience in developing and presenting IDAM/PAM roadmaps and strategic recommendations is also required. You must be eligible for SC Clearance if not already cleared. Please apply ASAP to More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
standards, and guidelines. Collaborate with the Compliance Manager/CISO to ensure adherence to regulatory requirements (e.g., GDPR, ISO 27001). Incident Response andManagement: Establish and maintain incident response plans and procedures. Lead technical response efforts during security incidents or breaches. Conduct post-incident analyses to prevent … preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identityandaccessmanagement, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or More ❯