stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
opportunity available with a leading organisation in the financial services industry. They are currently seeking a skilled PAM Test Analyst to support ongoing initiatives within identityandaccessmanagement systems. Essential skills: • Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). • Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. • Strong understanding of IAM principles, privileged account security, and least privilege access. • Hands-on experience with API testing tools (e.g., Postman, SoapUI). • Proficiency in test management tools such as JIRA • Strong problem-solving skills and attention to More ❯
Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
City Centre, Sheffield S1 4NB, Hybrid (60% office/40% home – 3 days in the office mandatory) Key Skills & Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD More ❯
privilege access, identity governance, and periodic access reviews Assist with overseeing the lifecycle management of identities, including providing, de-provisioning, andaccess modifications Monitor cloud security events, logs and alerts to detect and respond to potential threats Create, configure and maintain automated security playbooks to respond to incidents Identify and … cloud environment Work with cross-functional teams to ensure secure architecture, policies, controls and practices in cloud environment that maintains a high level of security Assist with implementation andmanagement of data security policies including data loss prevention, privileged accessmanagement, insider risk management, etc Assist with the design, engineering andmanagement … computer science, information systems, cybersecurity, or a related field Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps. Experience in one or more areas: identityandaccessmanagement, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics Experience with open standards such as SAML, OAuth or Open ID More ❯
Vallum Associates Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD More ❯
Synechron is looking for an experienced Test Analyst with specific recent PAM experience, to join a dynamic and global team. Essential: Proven experience in software testing within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM) Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM Strong … understanding of IAM principles , privileged account security , and least privilege access Hands-on experience with API testing tools (e.g., Postman, SoapUI ) Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment Knowledge of CI/ More ❯
PAM or IAM experience) - SHEFFIELD 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Sign in to access AI-powered advices Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with … Google Synechron is looking for an experienced Test Analyst with specific recent PAM experience, to join a dynamic and global team. Proven experience in software testing within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM) Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM Strong … understanding of IAM principles , privileged account security , and least privilege access Hands-on experience with API testing tools (e.g., Postman, SoapUI ) Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment Knowledge of CI/CD More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance #J-18808-Ljbffr More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance We know our colleagues work tirelessly to make JD Sports the success it is today and in turn, we offer them some amazing benefits including staff Discount More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential: Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential: * Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). * Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. * Hands-on experience with API testing tools (e.g., Postman, SoapUI). * Proficiency in test management tools such as JIRA * Strong problem-solving skills and attention to detail. * Excellent communication and collaboration skills. Desirable: * Experience working within an Agile (Scrum/Kanban) environment. * Knowledge of CI/ More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
cost-efficiency. Design and maintain EUC platforms including Windows, macOS, VDI, and mobile endpoints. Ensure alignment with enterprise architecture and cloud strategies. 3. Technology Implementation Oversee deployment and lifecycle management of EUC technologies including: Microsoft 365, Windows 10/11 Citrix/VMware VDI Endpoint management (Intune, SCCM) Application packaging and virtualization Drive … automation and standardization across the EUC estate. 4. Security & Compliance Ensure EUC solutions adhere to Barclays' security policies and regulatory requirements. Implement zero-trust principles, identityandaccessmanagement, and data protection strategies. 5. Collaboration & Stakeholder Engagement Partner with infrastructure, security, and business teams to deliver integrated solutions. Engage with vendors and service providers … Familiarity with regulatory frameworks and compliance standards (e.g., GDPR, ISO 27001). Leadership & Communication Proven ability to lead cross-functional teams and mentor junior staff. Strong communication and stakeholder management skills. Ability to influence technical and business decision-making. More ❯
years of experience in cybersecurity, with at least 2 years in a Security Architect or equivalent role. In-depth understanding of network and system security, identityandaccessmanagement (IAM), encryption, and secure software development practices. Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform (GCP). Familiarity with security tools More ❯
will be exposed to different stakeholders, including different business teams within the Bank. This project is highly visible. Typical Day in Role: • Deliver solutions for IdentityandAccessManagement in a large enterprise environment in alignment with enterprise security requirements and standards • Act as a Subject Matter Expert (SME) for IdentityAccess … assigned on call hours Candidate Requirements/Must Have Skills: • 10+ years of experience as a Security Analyst and Developer • 3+ years experience with Microsoft Entra ID and Conditional Access in a large enterprise environment • 3+ years of experience with Microsoft Graph • 3+ years of experience with PowerShell scripts • 3+ years of experience with Azure DevOps Nice-To … such as CISSP, CISA, CISM, GISF, GSEC will be considered an asset • Knowledge on technologies about web accessmanagement, authentication, single sign-on , authorization andidentity lifecycle management, such as on SAML, OAuth2, OpenID Connect, JWT, LDAP, MFA, REST and API Gateway integration. • Knowledge on technologies about cloud computing, Windows server operating More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lonza
that’s the kind of work we want to be part of. The IAM Engineer for directory services at Lonza, you will be responsible for the design, implementation, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) across the organization's global infrastructure. Your role will involve ensuring the security, availability, and scalability of these … directory services, which are critical to the company's identityandaccessmanagement framework. You will work closely with cybersecurity, IT operations, and business units to develop and enforce access control policies, manage user identities, and support seamless integration with both cloud and on-premises applications. Additionally, you will ensure that the … while continuously evaluating and adopting emerging technologies to enhance the organization's security and operational efficiency. Key responsibilities: Design and Implementation of Directory Services: Lead the design, deployment, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) environments, ensuring they are secure, scalable, and optimized for performance. Develop and implement policies for directory services that More ❯
Microsoft Azure, including key services like: Azure Migrate Azure Compute (VMs, App Services) Azure Networking (VNet, NSG, Load Balancers) Azure Storage and Databases (Blob Storage, Azure SQL) Azure Identity & AccessManagement (Azure AD, RBAC, Managed Identities) Experience in cloud migration projects (e.g., Lift-and-Shift, Re-platforming, Re-architecting). Experience of both Windows … scripting (PowerShell, Bash) and automation tools (ARM, Bicep, Terraform). Familiarity with CI/CD pipelines using Azure DevOps or GitHub Actions. Understanding of cloud security, governance, and cost management best practices. Knowledge of containerization and orchestration (e.g., Docker, Kubernetes in Azure AKS) is a plus. Qualifications Certifications (preferred but not required): Microsoft Certified: Azure Administrator Associate (AZ … supported as part of learning and development. A range of retail discounts to enhance your lifestyle, encompassing restaurants, supermarkets, travel, leisure activities and health and well-being services. Access to our Employee Resource Groups, our groups represent diverse backgrounds and provide a platform for colleagues to connect, learn, and support one another. Company information Join Netcompany, where we More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer – Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … the following technologies: • Entra Collaboration Solutions (B2B, B2C) • Identity Models: Managed (PHS/PTA) vs Federated • Hybrid Identity Solutions • Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: • Active Directory Federation Services (ADFS) or third-party federation • Privileged IdentityMore ❯
Design and implement security solutions to mitigate identified risks Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc Respond to security events and incidents Perform regular security audits and risk assessments Maintain security controls, identify risks and propose treatment plans Conduct regular vulnerability scans and penetration … years of experience in Information Security Strong understanding of security principles, technologies, and best practices Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.) Experience … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions Experience with implementation of identityandaccessmanagement (IAM) solutions Ability to work in a team to deliver project outcomes within timeframes and objectives Self-directed work experience, including planning and organising tasks More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JIM - Jobs In Manchester
to £70,579 per annum depending on experience Faculty/Organisational Unit: Professional Services Location: Oxford Road Employment type: Permanent Division/Team: Information Security, IdentityandAccessManagement Hours Per Week: Full Time (1 FTE) Closing date (DD/MM/YYYY): 09/07/2025 Contract Duration: Permanent School/Directorate … IT Services. We’re seeking someone with the vision, depth and pragmatism to lead secure design across a complex, constantly evolving environment, where research data, intellectual property, and personal identity must be protected with care and foresight. This role is about embedding security into the foundation of how a world-leading university operates. Why this Role? As a … people that drive innovation across the University. As a University we are investing in security as a strategic priority including new capabilities in secure cloud adoption, automation and threat detection, identity governance, Zero Trust architecture, and real-time risk awareness. You will play a central role in shaping the future of these capabilities and helping colleagues across the More ❯