our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. Essential Skills: Demonstrates good knowledge and/or a proven record of success in the IdentityandAccess … Networking, SDLC, operating systems fundamentals (Windows, Unix, Linux) Conducting quantitative and qualitative analyses of large and complex data Leveraging creative thinking and problem solving skills, individual initiative, and utilizing Google Docs and MS Office (Word, Excel, Access, PowerPoint) Identifying and addressing client needs: building relationships with clients; developing … global trends, including globalisation, and how they impact the firm and our clients. Managing a variety of viewpoints to build consensus and create positive outcomes for all parties Managing and delivering IAM engagements that include strategy, advisory, implementation and assurance, including producing documentation and reports, and quality assuring the work more »
such as user and systems requirements, solutions design, test cases, change requests, deployment and transition plans. Key Responsibilities: Product Analysis & Solution Design: Understand business problem statements and priorities and shape SailPoint proposed solutions to resolution them. Test Technical Configuration: Work with third party solutions providers and developers to conduct review … support incidents, providing resolution to break-fix issues, and deployment of operational changes. Proactively seek ways to reduce the volume of support work, identifying common/recurring issues, and proposing improvements Basic Qualifications: Experience in supporting and working with IdentityAccessManagement platforms Experience … succinct and clear manner Excellent problem-solving, analytical skills with proven ability to take initiative and build strong, productive relationships Proven history of completing multiple product deployment cycles A proactive and positive attitude and demonstrated ability to learn about new tools and technologies, especially around new identityaccessmore »
is to continue refining, scaling, and evolving our ability to enable others to deliver genomic healthcare and conduct genomic research. We are accelerating our impact and working with patients, doctors, scientists, government and industry to improve genomic testing, and help researchers access the health data and technology they … , and ensuring alignment with relevant standards such as NHSE CIS2 and Ga4ga passporting. Defining and enforcing IAM architecture standards aligned to NHSE and Genomics standards, i.e., CIS2 and Ga4gh passporting and DUO. Providing standard patterns, guidance, and technical standards to support squads in delivering IAM solutions. Documenting and assuring … committed to providing and supporting an inclusive environment that promotes equity, diversity and inclusion best practice both within our community and in any other area where we have influence. We are proud of our diverse community where everyone can come to work and feel welcomed and treated with respect regardless more »
IdentityandAccessManagement (IAM) Specialist with experience within IdentityandAccessManagement to join a leading Cyber Security practice, with a focus on Banking & Capital Markets. Essential Skills & Experience Min 3+ years experience working within Identity & AccessManagement as a Business Analyst, Technical Consultant, or an Architect Exposure across one or more of the following: Identity Governance, AccessManagement, Privileged AccessManagement, Consumer Identity Exposure to at least more »
Global Leading Company is currently recruiting for an (IAM) CyberArk IdentityandAccessManagement Engineer who has experience with CyberArk IAM and Active Directory. 6 month rolling contract paying up £800 per day depending on skills and experience and outside IR35 Essential skills and experience required for the CyberArk IAM Engineer, (IAM) IdentityandAccessManagement Specialist … Management CyberArk Security and CyberArk Principals and how they interact with Unix, Windows and Mainframe A high understanding of major IAM solutions Hands-on designing and implementing of CyberArk IAM Package for the CyberArk IAM Engineer, (IAM) IdentityandAccessManagementmore »
AccessManagement with strong client orientation, excellent communication skills (verbal and written) in English, any additional European language will be a bonus with commercial orientation. Roles and Responsibilities: Lead large IDAM-focused Outsourcing deals as a Solution Architect/Consultant. Strong personal presence, capable of engaging … and C-Level. Understanding of regulations such as SOX, FDA, EU Data Privacy Directive, UK Data Protection Act, etc. and industry standards such as NIST 800-53, ISO 27001, ISO 9001, PCI, GxP, etc. Effectively communicate and manage virtual teams to create winning propositions. Own and drive the Identity … and support the bid process. Interact and work with multiple teams to realize the technical solution Work with the internal and partner ecosystem to bring in appropriate and relevant solution(s) Experience and skill set required: BE/BTECH/MBA with 10-15 years of working within Identitymore »
as the forefront. You will manage the products, configure, enhance, optimise and look towards future tools and technologies to ensure the business is constantly improving in the IAM & PAM area. The IAM Lead will be responsible for: Management of IAM/PAM tools Oversee the delivery, continuous development … the IAM platforms. Manage Identity Risks, propose mitigations and develop solutions. Work with security leadership to identify critical identityandaccessmanagement weaknesses and assess the effectiveness of existing controls. Overall strategy for identityAccessManagement The successful IAM Lead will have: Experience of managing an Identify andAccessManagement capability, including Privileged AccessManagement (PAM) in an enterprise environment and experience. Extensive hands on experience using and managing IAM tools including Active Directory, Okta, CyberArk. more »
IDAM Senior Project Manage Manchester Fixed term contract 2 Years The program is seeking a dynamic and experienced IdAM Senior Project Manager to play a pivotal role in transforming our IT services. Key Responsibilities: Reporting to the Programme Manager, you will lead the implementation of a robust, scalable, and globally … Managing the end-to-end project lifecycle, ensuring timely delivery, adherence to budget, and stakeholder satisfaction. - Collaborating with other project and programme managers to align with overall program objectives. - Implementing best practices in IdentityandAccessManagement governance, including Identity Governance and … PRINCE2, PMP, AGILE, SixSigma, or equivalent. Qualifications: - Proven experience in project management, successfully delivering complex IT projects on time and within budget. - Exceptional communication and stakeholder management skills, with the ability to convey project status, progress, and risks to senior leadership. - Strong problem-solving skills andmore »
months – Remote Inside IR35, OpenIDM, BPMN Workflows, Groovy/JavaScript, Data Migration An opportunity has arisen for an SC Cleared IdentityandAccessManagement Engineer on an initial 6-month contract working fully remote. The IdentityManagement Engineer will be … well as customising OpenIDM Admin and Self-Service UI. Other duties will involve developing BPMN workflows for roles request and approvals using Groovy or JavaScript as well as involvement in data migration from Oracle Internet Directory to ForgeRock Directory Server. Key Skills Identity platforms expertise (ForgeRock Identity … SCIM, LDAP) Accessmanagementand authorisation mechanisms Orchestrating identity processes/flows with BPMN workflows Securing and hardening identity environments Directory services knowledge (AD, LDAP) Deploying and managing high availability identity infrastructures Adaptive and multi-factor authentication methodologies UI/ more »
London, England, United Kingdom Hybrid / WFH Options
Lucid support services
months – Remote Inside IR35, OpenIDM, BPMN Workflows, Groovy/JavaScript, Data Migration An opportunity has arisen for an SC Cleared IdentityandAccessManagement Engineer on an initial 6-month contract working fully remote. The IdentityManagement Engineer will be … well as customising OpenIDM Admin and Self-Service UI. Other duties will involve developing BPMN workflows for roles request and approvals using Groovy or JavaScript as well as involvement in data migration from Oracle Internet Directory to ForgeRock Directory Server. Key Skills Identity platforms expertise (ForgeRock Identity … SCIM, LDAP) Accessmanagementand authorisation mechanisms Orchestrating identity processes/flows with BPMN workflows Securing and hardening identity environments Directory services knowledge (AD, LDAP) Deploying and managing high availability identity infrastructures Adaptive and multi-factor authentication methodologies UI/ more »
London, England, United Kingdom Hybrid / WFH Options
Legal & General
standards and IT control framework and translating them into architecture patterns and solution designs, to help advise project managers and developers across the business Collaborating with Group IT IAM to review and advise LGIM on architectural designs and recommending IAM controls to be implemented into Group IT and LGIM projects … design phase Maintaining awareness of current and emerging security risks and the changing threat landscape and recommending mitigating solutions to Project Managers and Developers to help ensure security enhancement and controls are pro-actively applied Supporting the development and maintenance of identity principles and building blocks and defining … we’re supported by technology and workplaces that enable us to work effectively wherever we are. We come together in offices to collaborate and connect, and use time at home for individual, focused activities. And, when we achieve great things, we celebrate our success and reward strong performance. Today, there more »
in the maturity of the IdentityandAccessManagement (IAM) process and controls. You will be responsible for managing and monitoring the company's identity governance program, specifically focused on recertifications andaccess reviews. Ideally you should have expereince working … Oracle. Key Responsibilities: Manage and monitor the recertification process to ensure that access rights are appropriate and in accordance with business needs and regulatory requirements Monitor the Identity Governance and Administration mailbox and respond to queries from the business regarding access Review and manage … access exceptions, including requests for temporary access or elevated privileges Provide training and support to end-users on identity governance processes and procedures The role is paying up to £45,000 and is hybrid with 3 times weekly in their Bristol office. If this more »
Lead IAM (Identity & AccessManagement) Architect - Global Bank - Major Long-Term Cloud Migration Project One of my leading clients is a Global Bank, and they are looking for a Lead IAM (Identity & AccessManagement) Architect, to be responsible for the … planning and implementation of the IAM solution architecture as they migrate away from On-premise to GCP. Experience with GCP is beneficial but not necessary; however, strong On-prem AD, Azure AD, LDAP and IAM Architecture experience is vital. Similarly to GCP, experience with One Identity Manager andmore »
Cyber Security Analyst, you will design new, mature existing and support the operation of cyber security controls and processes within Insight Investment in line with cyber security risks and the cyber security policies and standards. This includes Identity & AccessManagement (IAM), PAM security monitoring … , pen-testing. vulnerability managementand KRI/KPI reporting. Role Responsibilities Developing a familiarity with new tools and best practices for security operations Defining, implementing and maintaining operational security processes Reviewing and maturing the IdentityandAccessManagement process in … vulnerability management, etc. Technical working knowledge of security systems including: Network and application firewalls reviews and approvals IDS/IPS systems Web Proxies and Content Filtering Authentication technologies (Active Directory) Network Access Management. Privilege AccessManagement (CyberArk would be an advantage) VMWare more »
as they seek an IAM Engineer to provide technical expertise in the design, implementation, and development of the Firm’s identityandaccessmanagement systems. This position has an emphasis … on securely facilitating business operations while critically analysing existing and potential IAM controls in a large, dynamic environment. Responsibilities: Take on the role as the subject matter expert in the design, implementation, operation, and administration of the organisation identityandaccessmanagement program. Provide … and threat landscape that affect the IAM function, contribute to developing and implementing a holistic IAM vision to address those challenges, and approaches. Requirements: Computer Science Bachelor’s Degree. Expert knowledge of enterprise IAM architecture, administration, and operations. Proficient with Microsoft IAM solutions and Azure privileged accessmanagementmore »
City of London, London, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Cloud Apps, Defender for Identity, Purview, Compliance and Security Centre, and Sentinel, and knowledge of cloud computing and the associated security risk and control considerations. Knowledge of endpoint security and device hardening, including Windows, Mac, iOS, Android and Virtual Desktops. (MEM/Intune). Proven expertise in the … management activities and responsibilities. Ability to handle highly confidential information with appropriate discretion and embody the values of the Confidentiality, Integrity, and Availability triad. Customer and service delivery focused mindset and approach, where security, the integrity, availability and confidentiality of our customers, systems and data are of chief more »
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Cloud Apps, Defender for Identity, Purview, Compliance and Security Centre, and Sentinel, and knowledge of cloud computing and the associated security risk and control considerations. Knowledge of endpoint security and device hardening, including Windows, Mac, iOS, Android and Virtual Desktops. (MEM/Intune). Proven expertise in the … management activities and responsibilities. Ability to handle highly confidential information with appropriate discretion and embody the values of the Confidentiality, Integrity, and Availability triad. Customer and service delivery focused mindset and approach, where security, the integrity, availability and confidentiality of our customers, systems and data are of chief more »
Petersfield, Hampshire, South East, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Cloud Apps, Defender for Identity, Purview, Compliance and Security Centre, and Sentinel, and knowledge of cloud computing and the associated security risk and control considerations. Knowledge of endpoint security and device hardening, including Windows, Mac, iOS, Android and Virtual Desktops. (MEM/Intune). Proven expertise in the … management activities and responsibilities. Ability to handle highly confidential information with appropriate discretion and embody the values of the Confidentiality, Integrity, and Availability triad. Customer and service delivery focused mindset and approach, where security, the integrity, availability and confidentiality of our customers, systems and data are of chief more »
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Vanquis Banking Group
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Cloud Apps, Defender for Identity, Purview, Compliance and Security Centre, and Sentinel, and knowledge of cloud computing and the associated security risk and control considerations. Knowledge of endpoint security and device hardening, including Windows, Mac, iOS, Android and Virtual Desktops. (MEM/Intune). Proven expertise in the … management activities and responsibilities. Ability to handle highly confidential information with appropriate discretion and embody the values of the Confidentiality, Integrity, and Availability triad. Customer and service delivery focused mindset and approach, where security, the integrity, availability and confidentiality of our customers, systems and data are of chief more »
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Spencer Rose Ltd
new opportunities and improvements in current practices and processes. Serve as a technical security SME to advise on security designs for new and existing architecture and services, and ensure requirements are incorporated into designs. Identify, assess, document, manage, escalate, and report the risks associated with my role and business area … Suppliers, and company employees. Provide support for engineering, operations, and security teams to resolve security events. Oversee IT systems risk assessments and control validation. Skills/Experience required: 5+ years of experience in technical information security role, and 3+ of experience with regulatory compliance and information security management … Cloud Apps, Defender for Identity, Purview, Compliance and Security Centre, and Sentinel, and knowledge of cloud computing and the associated security risk and control considerations. Knowledge of endpoint security and device hardening, including Windows, Mac, iOS, Android and Virtual Desktops. (MEM/Intune). Proven expertise in the more »
Bristol, England, United Kingdom Hybrid / WFH Options
TRIA
or remote working for a candidate with the right skillset has arisen for a candidate with suitable IAM (IdentityAccessManagement) experience. As a proactive and motivated individual with a focus on customer service, you will bring to the table relevant experience within an … Management processes and technologies to keep pace with Global Security requirements • Identify and implement improvements to the existing IAM processes/systems working alongside the global technology functions • Work with the wider global business to promote understanding of IdentityandAccessManagement processes and obligations • Assist in the managementand/or monitoring of systems associated with IAM, PAM, SSO and MFA • Enforce IAM policies and support existing systems in accordance with standards, guidelines, and procedures. If you meet the above requirements and would welcome the opportunity to more »
Bournemouth, England, United Kingdom Hybrid / WFH Options
J.P. Morgan
IdentityandAccessManagement Engineer - JP Morgan - Bournemouth - 12 months - Hybrid - PAYE We are seeking an IdentityandAccessManagement Engineer to join JP Morgan in Bournemouth on an initial 12 months contract. You should have previous experience … and knowledge of Single Sign On processes and standards such as SAML and OIDC/oAuth as well as ideally some full stack development experience using skills including Java or Python and react. JOB DESCRIPTION - We are looking for someone with previous experience of integrating applications with federated identity … experience and knowledge of Single Sign On process and standards such as SAML and OIDC/oAuth. Prior development experience in either Java or Python (or a similar mainstream programming language), and an understanding of web development Self-starter able to thrive in a fast-paced, complex, collaborative, and cross more »
and digital consulting, you will assist large organizations - including FTSE 100, Fortune 500 and CAC40 clients - in their most critical transformations. You will be responsible for delivering pragmatic and agile cybersecurity and/or operational resilience strategies that align client priorities and support top management in … mentoring, and coaching team members and leading by example Collaborating and coordinating across the different location (New York, Dallas, London and Paris) in order to participate in the global practice development by creating thought leadership and marketing materials for selling and promoting our offerings Continuing to upskill and stay current … people culture through regular events, meetings, and committees. Experience ethical responsibility with flexible work options, strong CSR commitment, and a culture promoting work-life balance and time-off. Benefits 4% company pension, private health and dental cover, life insurance, company share scheme and additional flexible benefits you can select from more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Crimson
(IAM) within the IT security and compliance function. The ideal candidate will have extensive experience and knowledge surrounding overseeing standards, processes, and technology within IAM, contributing to business goals and security requirements. Primary Responsibilities: Take the lead in Identity & AccessManagement, ensuring … services, authentication, and authorization. Lead the development and upkeep of IAM policies, standard procedures, and documentation. Manage the application and compliance of IAM procedures, with a primary focus on day-to-day IAM operations. Lead the response to incidents within the IAM team, offering recommendations for action and enhancing control … business objectives. Actively advocate for and integrate Equality, Diversity, and Inclusion (EDI) principles into all work, while complying with organizational initiatives, policies, and procedures related to EDI. Key Competencies: Relationship Building: Proficiency in cultivating and maintaining robust relationships with internal and external stakeholders. Product Management: Skill in managing more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
(IAM) within the IT security and compliance function. The ideal candidate will have extensive experience and knowledge surrounding overseeing standards, processes, and technology within IAM, contributing to business goals and security requirements. Primary Responsibilities: Take the lead in Identity & AccessManagement, ensuring … services, authentication, and authorization. Lead the development and upkeep of IAM policies, standard procedures, and documentation. Manage the application and compliance of IAM procedures, with a primary focus on day-to-day IAM operations. Lead the response to incidents within the IAM team, offering recommendations for action and enhancing control … business objectives. Actively advocate for and integrate Equality, Diversity, and Inclusion (EDI) principles into all work, while complying with organizational initiatives, policies, and procedures related to EDI. Key Competencies: Relationship Building: Proficiency in cultivating and maintaining robust relationships with internal and external stakeholders. Product Management: Skill in managing more »