methods, you do not need to be a practitioner. KEY TECHNOLOGIES: Cloud platforms: Primarily AWS and Azure covering organisation design (layout), tenancy/account management, security, identitymanagement, service provisioning and reporting functions. Identity and Directory services: Design, management and maintenance of Microsoft Active Directory … OpenLDAP, KeyCloak and Microsoft's enterprise Single Sign-On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusion detection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities and access, supporting secure collaboration, and staying current with the latest technologies. You'll also be instrumental … appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identity and access management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA … We work collaboratively and imaginatively. ABOUT YOU We are looking for an IGA Analyst who is detail-oriented, analytically minded, and well-versed in identity governance and access management practices. The ideal candidate possesses strong technical expertise across various identity technologies (e.g., Saviynt, Azure, SailPoint) and a more »
and forests with multiple domains Troubleshoot basic problems in MS SQL Office 365 tenant setup and configuration to best practise Microsoft Azure, IaaS and Identitymanagement (ADFS, WAP) Working knowledge Private and Public Cloud platforms, Azure and AWS Virtualisation Technologies (VMware, Hyper-V,) SAN and Clustering technologies (Dell more »
level. Design, implement, and manage M365, Azure AD, Intune, Exchange, and Networking solutions. Troubleshoot and resolve issues related to cloud-based services, including email, identitymanagement, and network connectivity. Collaborate with internal teams and external stakeholders to deliver technical solutions that meet business requirements. Continuously monitor and optimize more »
security technologies and tools. - Relevant industry qualifications preferred. - Familiarity with cybersecurity standards and frameworks. - Experience securing infrastructure and OT/ICS systems. - Knowledge of identitymanagement and cyber threats. - Understanding of Tactics, Techniques, and Procedures. - Proficiency in Cloud security principles. Please apply with your up to date CV more »