3 of 3 Identity Access Management Jobs in the East Midlands

Identity & Security Technical Consultant

Hiring Organisation
RedTech Recruitment Ltd
Location
Leicester, Leicestershire, East Midlands, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£55,000
Technical Consultant, Security Consultant, or similar client-facing role within enterprise software environments Proven experience delivering or deploying identity and access management or cybersecurity-related solutions Strong understanding of identity technologies such as authentication, access control, and credential management … Services Consultant/Implementation Consultant/Systems Consultant/Infrastructure Consultant/Pre-Sales Consultant/Post-Sales Consultant/Identity and Access Management/IAM/IDAM/PKI/Active Directory/Windows Server/SQL Server/Networking/MFA/ ...

Cyber & Data Governance Lead

Hiring Organisation
Martin Veasey Talent Solutions
Location
East Midlands, United Kingdom
Employment Type
Permanent
Salary
£60000 - £80000/annum + Bonus + Excellent Benefits
organisation's data governance framework, policies and standards * Strengthening data security controls across systems, platforms and datasets * Implementing governance around identity and access management, encryption, retention and data lifecycle management * Overseeing third-party and supplier data risk, including due diligence and governance … controls * information or data risk management * data protection and regulatory governance * third-party or supplier data assurance * data quality, lifecycle and integrity management Importantly, you will also understand how well-governed data enables organisations to generate commercial insight through analytics, reporting or business intelligence platforms. Sector ...

VP Information Security

Hiring Organisation
GXO Logistics
Location
Northampton, Northamptonshire, England, United Kingdom
Employment Type
Full-Time
Salary
£197,000 per annum
governance mechanisms. Architecture & Engineering Oversee Security Architecture and Engineering; ensure “secure-by-default” across cloud, application, data, identity, and infrastructure landscapes. Establish IDAM function with clear RACI and coherent operating model. Govern the security tooling strategy and operating model (build vs. buy vs. MSSP); maximize value from SIEM … communications, regulator notifications, and post-incident improvements. Act as escalation point for any security related service failures or major incidents. Threat and Vulnerability Management Support the TVM team in continuously reducing vulnerability levels in the organisation. Recommend procedural improvements and reporting to drive constant improvement. Drive secure ...