Date: 09/10/2025 Job Type: Contract until end of the year with potential extension Role Description: Our client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the … pillars of that programme is Privileged Access Management (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line … presenting and sharing solutions at design authorities and senior leadership & stakeholders as well as working with global teams to both explain the design and agree designs related to the PasswordManagement of new Technologies. More ❯
software. Provide onboarding support, including setting up and configuring devices, user accounts, and email systems for new employees. Educate and train end-users on basic technology tasks such as passwordmanagement, data backup, and software usage. Document help desk tickets, issue resolutions, and repetitive problems to enable efficient troubleshooting and to inform future preventative measures. Escalate unresolved issues More ❯
and configure Active Directory (AD) User Accounts; recover and restore AD objects. Support mobile computing and end user devices to include resetting and configuring devices. Identify and troubleshoot Enterprise Management (EM) issues related to patches and servers. Troubleshoot and resolve Data-at-Rest (DAR) issues. Provide Site Administrator support and Enterprise monitoring for Group Policy Objects (GPO), initial troubleshooting … policies. Perform system administration tasks on Enterprise server and end-user clients, extend scheduled lockout condition, initiate data recovery operations and unlock machines as required. Install, administer, and perform passwordmanagement for Enterprise software. As required to resolve issues, remotely access government equipment. If unable to resolve an issue, escalate to Enterprise Operations (Tier 3). Provide the … spillage events to determine scope of issues and coordinate with technical POCs and Mission Partner POCs. Review security configuration and technical data to ensure a secure environment. Follow Change Management practices to schedule and implement approved changes within the tenant. Follow change coordination practices to notify stakeholders of scheduled maintenance events and expected impact. Requirements: Must be a U.S. More ❯
and configure Active Directory (AD) User Accounts; recover and restore AD objects. Support mobile computing and end user devices to include resetting and configuring devices. Identify and troubleshoot Enterprise Management (EM) issues related to patches and servers. Troubleshoot and resolve Data-at-Rest (DAR) issues. Provide Site Administrator support and Enterprise monitoring for Group Policy Objects (GPO), initial troubleshooting … policies. Perform system administration tasks on Enterprise server and end-user clients, extend scheduled lockout condition, initiate data recovery operations and unlock machines as required. Install, administer, and perform passwordmanagement for Enterprise software. As required to resolve issues, remotely access government equipment. If unable to resolve an issue, escalate to Enterprise Operations (Tier 3). Provide the … spillage events to determine scope of issues and coordinate with technical POCs and Mission Partner POCs. Review security configuration and technical data to ensure a secure environment. Follow Change Management practices to schedule and implement approved changes within the tenant. Follow change coordination practices to notify stakeholders of scheduled maintenance events and expected impact. Requirements: Must be a U.S. More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged Access Management (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments, and delivering enterprise … design decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & Dependency Management Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME across IT … teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & Access Management (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design decision records). Experience in large More ❯
organizations. This role will be responsible for supporting the current infrastructure by checking for system vulnerabilities and managing various Data flow/Watch desk projects. Responsible for providing request management support, which can include but is not limited to, account creation, removal, transfer, grouping, passwordmanagement, as well as storage allocation, locality, recovery, backup, and restoration, etc. … deadlines. Experience communicating and documenting technical issues, risks, and approaches to direct reports, peers, superiors, and clients Experience providing support for the escalation and communication of status to agency management and internal customers Experience gathering requirements based on feedback and feature requests of users. Information Assurance Technical (IAT) Certification 8570 Level 1 compliant Desired/Preferred Skills: Experience with … UNIX and LINUX operating systems Previous Watch Desk Support experience ServiceNow Asset Management experience Experience with Information Technology Infrastructure Library framework/approach Working Conditions: Work is typically based in a busy office environment and subject to frequent interruptions. Business work hours are normally set from Monday through Friday 8:00am to 5:00pm, however some extended or weekend More ❯
interact with multiple levels of the Agency's organizations. Support the current infrastructure by checking for system vulnerabilities and managing various Data flow/Watch Desk projects. Provide request management support, which can include but is not limited to: account creation, removal, transfer, grouping, passwordmanagement, as well as storage allocation, locality, recovery, backup, and restoration, etc. More ❯