Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our London based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: * Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes * Work as a key point of more »
IdentityAccessManagement Analyst Permanent £29,500 - £33,154 London and Manchester offices An excellent opportunity has arisen for an Identity & AccessManagement Analyst to join one of the UK's leading housing organizations. This role will help … improvements and supporting strategic change projects as the IAM function matures and grows. Key Experiences Required: In-depth knowledge of identityandaccessmanagement concepts, such as SSO, role-based access control (RBAC) andidentity federation Knowledge of Azure AD … the new security perimeter Technical components are appreciated such as identity lifecycle, role-based access, multi-factor authentication, and privileged accessmanagement as per industry best practices and standards Technical and an analytical problem solving The role holder will work closely with more »
Role: PAM & EPM Specialist Job type: Permanent Location: Gaydon/Leamington Spa, UK Ready to utilise your expertise in IdentityandAccessManagement ? Are you passionate about Endpoint Privilege Management ? We have an exciting role for you – PAM & EPM Specialist! Careers at … day. Grow your career, while being exposed to new technologies. Fast track your growth with diverse career opportunities internally. The Role The “Privileged AccessManagement (PAM) & Endpoint Privilege Management (EPM) Specialist” will be responsible for delivering PAM & EPM services and associated governance within the … on PAM & EPM Best Practices to different stakeholders/teams. Your Profile Key Skills/Knowledge/Experience: Expertise in IdentityandAccessManagement, in particular deep technical knowledge of identitymanagementand privilege escalation within a Microsoft Environment (Windows more »
who require an IAM Technical Engineer to lead an ongoing implementation of a platform to ensure that all required users have the right access to respective systems and data. Key Requirements: Demonstrable experience working as an IAM (IdentityAccessManagement) Technical Engineer … a large complex environment, with specific expertise in Saviynt Strong working experience with IGA and PAM solutions (e.g., Saviynt, CyberArk, SailPoint) Experience with management of Microsoft Directory and IAM product suites (e.g., AD, Azure AD) Knowledge of Identity standards and their implementation (e.g., SCIM, OAuth) Experience … IdentityAccessManagement) CISSP or similar Cybersecurity Certification ITIL Certified Nice to have: Certified IdentityandAccess Manager (CIAM) or Certified IdentityManagement Professional (CIMP) Project Management Certification Immediate availability If interested, with relevant more »
London, England, United Kingdom Hybrid / WFH Options
(8660) IBM United Kingdom Limited
SAP Security projects, covering all the implementation phases. Big4/leading SI consulting experience, including business development Experience working in both delivery and project management fields. Experience in developing and overseeing the delivery of project deliverables with high standards of quality. Motivation to develop and lead the UKI … Management: SAP GRC Access Control, Identity & AccessManagement, IdentityandAccess Governance (inc Cloud, Cloud Bridge), SoD Models & Implementations, Greenlight AVM SAP Authentication: Single Sign-On 3.0, SAP Authenticator, Integration with Active Directory/… made automatic controls (ABAP, HANA, SLT, SDI, SDQ) SAP Security hardening: SAP Security Baseline, BASIS and NetWeaver, SAP best practice security configuration, vulnerability management for SAP, SAP Solution Manager in the Security domain, SAP FRUN for Security. SAP-SIEM integration: SAP ETD (Enterprise Threat Detection) implementation and configuration more »
As the Head of Directory Services and Enterprise Platforms for IdentityandAccessManagement, your key responsibility will be to lead the development and implementation of effective and innovative IdentityandAccessManagement (IAM) strategies, solutions, and services … solutions, and integrations across all enterprise platforms. Participate in the selection and approval of vendors, products, and technologies related to identityandaccessmanagement services. Work collaboratively with cross-functional teams, such as product engineering, data security, network operations, and business operations, to develop … preferred. Extensive understanding of IAM trends, current industry standards, and best practices. Excellent verbal and written communication skills. Strong analytical, problem-solving, and project management skills more »
the onboarding process for the Entra ID application. Key Responsibilities: Lead the assessment and planning of application migration to the Microsoft Entra ID identitymanagement system. Collaborate with application owners and stakeholders to ensure a smooth transition process. Customize Entra ID configurations to accommodate specific application … Experience: Expertise in application migration to Microsoft Entra ID or similar identitymanagement solutions. Knowledge of identityandaccessmanagement concepts and technologies. Experience with security and compliance standards, such as GDPR, HIPAA, or SOC 2. Relevant certifications, such as … Microsoft Certified: IdentityandAccess Administrator Associate, are advantageous. Rewards & Benefits: TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Central London, London, United Kingdom Hybrid / WFH Options
Vadis People
an antiquated finance set up to an MS Dynamics 365 Finance & Operations solution in a complex business environment will require highly credible stakeholder managementand collaboration skills. The Solution Architect will deliver the solution design blueprints & architecture delivery plans for the programme, as well as for the integrated … sync & async) & technology Experienced presenting solutions options (including costs/benefit/risk trade-offs) to senior leadership team, working with technical program management, product managementand technical business analysts to deliver a multi-milestone transformational programme. Any of the following would be desirable but not … experience with SAP Concur Microsoft Certified: Dynamics 365: Finance and Operations Apps Solution Architect Microsoft Certified: Dynamics 365 Finance Functional Consultant Associate Customer Identity & AccessManagement (CIAM) design & experience, including: External identitymanagement solutions (SaaS platforms) Experience with Role-based more »
Ireland About the role: We are seeking a seasoned IAM Specialist with expertise in SailPoint to bolster our organization's identityandaccessmanagement capabilities. The chosen candidate will be instrumental in safeguarding the security and efficacy of our access controls and … identitymanagement processes, leveraging SailPoint technologies to their fullest potential. The ideal candidate will possess a deep understanding of IAM principles, with hands-on experience implementing and optimizing SailPoint solutions within enterprise environments. Responsibilities will include, but are not limited to: Provide expert guidance and knowledge … existing SailPoint deployments, identifying areas for enhancement and implementing necessary improvements. Take charge of managing and supporting SailPoint implementations, including configuration, troubleshooting, and user access provisioning. Act as a subject matter expert on SailPoint functionalities, providing support and resolution for any issues that may arise. Maintain proficiency in more »
We are looking for an experienced IdentityAccessManagement (IAM)Consultant, with 7+ years of relevant experience with consulting and IAM architect background to join our client on an upcoming project. The role will suit an ambitious individual with experience with a background in more »
Job Title: Information Security Analyst (IdentityandAccessManagement) Overview: Seeking a Security Compliance Analyst to ensure regulatory, client, and industry cybersecurity compliance, with a focus on IAM. Leverage SailPoint, Tenable, and Microsoft Security Suite for effective access management. Key Responsibilities: Access Audits: Conduct IAM-focused access certification audits using SailPoint. Collaborate on permissions accuracy. Policy and ISO Compliance: Evaluate compliance using SailPoint and adhere to ISO standards. Document variations for remediation. Metrics Generation: Generate actionable metrics using Tenable for leadership review. Offer insights based on metric analysis. … Documentation: Maintain IAM-centric documentation for internal use. Issue Management: Monitor and close compliance issues using SailPoint. Implement corrective actions within the IAM framework. Communication and Follow-Up: Respond to IAM-related inquiries promptly. Address questions and suggestions with urgency. Qualifications: Bachelor's degree in Information Security or more »
journey. Role Description Proven experience working as a Solution Architect or in a Similar role. Preparing detailed solution design documents for the Privileged AccessManagement Vault and its integration for existing and strategic use cases Delivery of integration patterns of target applications, services, databases, and others … well as Cloud native toolings Assisting in preparation of demonstrable journeys on the configured PAM tooling Role Requirements Proficiency in Security and Enterprise Identity & AccessManagement Collaborate with business stakeholders to understand their requirements and translate them into technical solution. Excellent knowledge of English more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
of DLP work. My client have a fully operational DLP so we need people who understands how the DLP works and has some strong IDAM, Windows Security and Azure experience. This is a really important new Security hire for this business helping to protect and secure the systems, IP and … or Windows Security background. Enterprise Security Experience - preferably in the Hedge Fund or Investment Management space. DLP IDAMIdentityandAccessManagement SIEM Scripting Experience Computer Science degree or similar level qualification. Senior Security Engineer £130,000 - £160,000 base salary +Bonus more »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
to technology risks. Working knowledge of Data Sciences, AI & Machine Learning. Knowledge of information security principles, concepts, practices, systems software, database software, and immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management … protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class IdentityandAccessManagement solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber threat and vulnerability analysis and remediation. Forensic examination and data … information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk management domains Equal Employment Opportunity (EEO) It is the policy of Gilead Sciences, Inc. and its subsidiaries and affiliates (collectively "Gilead" or the "Company more »
Key Responsibilities: Define the technical vision and roadmap for Google Cloud Identity, aligning with evolving business needs and industry trends. Lead a team of talented engineers in the design, development, and implementation of core functionalities for Google Cloud Identity services. Foster a culture of innovation and … cross-functional teams (engineering, product, security) to translate user requirements into robust technical architectures and solutions. Stay at the forefront of cloud security andidentitymanagement advancements, identifying and evaluating emerging technologies and standards. Architect secure and scalable systems capable of handling high user volumes and … practices (IAM, access control, data encryption) within a GCP environment. Demonstrated experience in designing and implementing large-scale identityandaccessmanagement (IAM) systems. Strong understanding of distributed systems, databases, and containerization technologies (Docker, Kubernetes). Experience with API design and development more »
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »
incidents in a global 7/24/365 operating environment . The successful individual will monitor and investigate security events using case management (Service Now) and SIEM tools. This is a HYBRID role where you will be expected to attend the London City office for a minimum … solid background in information security or with systems and computer operations (e.g. Identity & AccessManagement, Vulnerability and Configuration Management, Threat Intel, IT operations, Certification & Key Management, Security Platform Administration, Security Incident Response) Experience of scripting and coding skills in one … to contextualize events with the goal of identifying potential security threats, vulnerabilities, and patterns of malicious activity. Collaborate with other security teams (incident management, incident response, threat intelligence, insider threat) to escalate and manage security incidents effectively. Provide recommendations for improving security monitoring operations via enhanced automation andmore »
Description: Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a … documentation with excellent skills in the use of the MS Office suite of tools and MS Project Formal training or certification in Project Management Certification (MSP/PRINCE2/PMI/APM/SIX SIGMA) Professional PM accreditation (Prince 2, PMI, APM etc…) Significant project managementmore »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
will manage the accesses for end-users throughout the different stages in the lifecycle of their career, hereby ensuring they get the right access at the right moment for the right period of time. In this role, you will, more specifically: (de)provision accesses to end users that … or leave the company Manage day2day processes on our IAM platform (Sailpoint) Perform daily application extracts (to ensure Sailpoint has the latest updated access information) Assist in remediation exercises at the back of access recertification Prevent toxic pairing and undue accesses Assist in end user migration … activities (from old to new access packages) Ensure process documentation linked to the day2day core is always up to date You will bring: A university degree, preferably in Information Systems, Engineering, Computer Science, Economics or Finance Knowledge of Identity & AccessManagement principles more »