Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
Identity & AccessManagement - Senior Analyst – KPMG Curve Base Location: Leeds based (Hybrid – 3 days per week in office) Experienced professional (kpmgcareers.co.uk) As a result of the work that we do, we require applicants to hold or be capable of obtaining UK National Security Vetting … BeyondTust and Microsoft Entra ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from: Enterprise identity, including provisioning, JML, certification, RBAC, entitlement management, policy management, data access governance, identity analytics; Customer IAM … CIAM), including registration, customer experience, authentication, multi-channel, privacy; Accessmanagement, including advanced authentication, identity federation, advanced authorisation. Privileged accessmanagement, including credential management, session management, privileged account discovery and privileged account inventory managementMore ❯
Warning! Vacancy not published Company Description Xalient specializes in the convergence and holistic management of identity, cybersecurity, and networking to deliver secure connectivity within a zero-trust framework. Offering world-class Identity solutions and services including IGA, PAM, customer identity, access … Maintain close, sensitive and long-term working relationships with key customers' acting as a trusted advisor. Technical Pre-Sales design of networking, security, identityand all managed service solutions with a high level of accuracy. This includes defining solution hardware, software, licenses, professional services budgets and services. Lead … experience in a Pre-Sales/Architectural capacity Networking & Security background (i.e. Networking, Security, SD-WAN etc.). Experience or knowledge of Secure Access Service Edge (SASE) Networking/Security Accreditations to minimum CCNA or equivalent, with CCNP or equivalent (preferred) with extensive project/engineering experience in More ❯
Manager to join their team. The Ideal Candidate will need: Excellent understanding of technology and security fundamentals. Experience in technical project/programme management, either in corporate IT, professional services, consulting or product development … or 4 years of experience in an IT system administrator role. Experience with PaaS and SaaS technologies including collaboration tools, identityandaccessmanagement (IAM). Excellent organisational, analytical and influencing skills. Ability to speak and write in English fluently and idiomatically. Preferred Qualifications … and filtering technologies. Experience in mobile device managementand relevant 3rd party integrations. Experience with cloud security including identityandaccessmanagement (IAM), SSO, OAuth, and 2-step verification. Experience with data loss prevention (DLP), retention and e-discovery technologies. Ability to More ❯
wakefield, yorkshire and the humber, united kingdom
Stott & May Professional Search Limited
hoc travel (minimal, must be commutable to central London) We're looking for a specialist engineer to lead a key identityandaccessmanagement project for a client. You'll be responsible for designing and deploying a secure, best-practice solution to separate high … Strong expertise in Active Directory (OU design, GPOs, Tier-0 models). - Advanced knowledge of Azure AD/Microsoft Entra ID, including role andidentity management. - Hands-on experience with Azure AD Connect, including filtering, sync issues, and admin disentanglement. - Familiarity with Privileged IdentityManagement (PIM), JIT access, and PAW deployment. - Solid understanding of zero-trust security, least privilege, and change management principles. - Experience writing technical documentation, test plans, and client-facing reports. - Excellent communication and interpersonal skills, with the ability to manage multiple priorities and stakeholders. JBRP1_UKTJ More ❯
bradford, yorkshire and the humber, united kingdom
Stott & May Professional Search Limited
hoc travel (minimal, must be commutable to central London) We're looking for a specialist engineer to lead a key identityandaccessmanagement project for a client. You'll be responsible for designing and deploying a secure, best-practice solution to separate high … Strong expertise in Active Directory (OU design, GPOs, Tier-0 models). - Advanced knowledge of Azure AD/Microsoft Entra ID, including role andidentity management. - Hands-on experience with Azure AD Connect, including filtering, sync issues, and admin disentanglement. - Familiarity with Privileged IdentityManagement (PIM), JIT access, and PAW deployment. - Solid understanding of zero-trust security, least privilege, and change management principles. - Experience writing technical documentation, test plans, and client-facing reports. - Excellent communication and interpersonal skills, with the ability to manage multiple priorities and stakeholders. JBRP1_UKTJ More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom
Stott & May Professional Search Limited
hoc travel (minimal, must be commutable to central London) We're looking for a specialist engineer to lead a key identityandaccessmanagement project for a client. You'll be responsible for designing and deploying a secure, best-practice solution to separate high … Strong expertise in Active Directory (OU design, GPOs, Tier-0 models). - Advanced knowledge of Azure AD/Microsoft Entra ID, including role andidentity management. - Hands-on experience with Azure AD Connect, including filtering, sync issues, and admin disentanglement. - Familiarity with Privileged IdentityManagement (PIM), JIT access, and PAW deployment. - Solid understanding of zero-trust security, least privilege, and change management principles. - Experience writing technical documentation, test plans, and client-facing reports. - Excellent communication and interpersonal skills, with the ability to manage multiple priorities and stakeholders. JBRP1_UKTJ More ❯
external qualifications that you will have access to, these include: Sponsored training and certifications for AWS, Azure, GCP, CNCF CKAD and CKS,andaccess to many of our other partner product training Accenture’s internal DevSecOps Academy and DevSecOps Academy for Executives Accenture’s internal Master … optimization for cloud environments (AWS, Azure, GCP). You should have a deep understanding of cloud security best practices, including identityandaccessmanagement (IAM), encryption, and security monitoring in the cloud. You have experience integrating security into the CI/CD pipeline using … tools like Snyk, Aqua Security, or HashiCorp Vault for secret management You should have experience in setting up monitoring, logging, and alerting for improved system observability. Tech Stack: GitHub, Kubernetes, Docker,Ansible, Terraform, Gitlab, Synk, Vault, Prometheus, Grafana, Splunk What’s in it for you At Accenture in More ❯
optimization for cloud environments (AWS, Azure, GCP). You should have a deep understanding of cloud security best practices, including identityandaccessmanagement (IAM), encryption, and security monitoring in the cloud. You have experience integrating security into the CI/CD pipeline using … decisions shall be made without regard to age, race, creed, colour, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by applicable law. More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
workflows to improve performance and scalability. Refactoring existing pipelines into reusable templates to support the onboarding of new datasets. Azure SQL: Integrating database access with Microsoft Entra ID for improved identityandaccess management. Designing and implementing STAR schema models to support analytical workloads. More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Fruition Group
and perform reviews to provide assurance of information security controls effectiveness. Be responsible for establishing and implementing the information security and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure … Proven experience in a GRC Analyst role Experience of mentoring or managing team members Strong knowledge of Security controls across Microsoft based technologies, Endpoints, IdAM, Networks, Applications, Email and Cloud. Experience of authoring governance documentation (standards, policies, reporting, proposals, analysis). Experience of delivering culture, training and awareness programmes. Experience More ❯