Privileged Access Management Jobs in Berkshire

9 of 9 Privileged Access Management Jobs in Berkshire

Data Analyst

Reading, England, United Kingdom
Mastek
data-informed decisions and innovations in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: Bachelor’s degree in … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privileged access management (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO, MFA, RBAC and ABAC Knowledge More ❯
Posted:

Identity Engineer and Lead Engineer

Reading, Berkshire, United Kingdom
Harvey Nash Group
Architect with extensive hands-on experience of Active Directory and EntraID. We are also seeking an Identity Engineer with hands on experience of Active Directory, EntraID and exposure to privileged access management solutions. Experience of architecture, design and implementation of Identity Governance and Administration technologies such as SailPoint or equivalent is desirable for both positions. Required experience … Proven architecture and design experience with Active Directory and Entra ID (Azure Active Directory) implementation and management. Other Identity Provider experience beneficial. Strong understanding of identity lifecycle management and security principles. Hands-on experience with Conditional Access, MFA, and SSO, Group Policy, Intune and related technologies. Knowledge of protocols such as SAML, OAuth, and OpenID Connect. Experience with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Engineer

Reading, Oxfordshire, United Kingdom
GCS
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
Employment Type: Permanent
Salary: GBP 70,000 - 72,500 Annual
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, United Kingdom
GCS
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
Employment Type: Permanent
Salary: £70000 - £72500/annum
Posted:

Data Analyst - SC Cleared only

Reading, England, United Kingdom
Mastek
SC Cleared Data Analyst Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM … cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: 2+ years of experience in a data analyst role, preferably within secure … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privileged access management (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Regards Chaya More ❯
Posted:

Cyber Security Lead

Slough, Berkshire, UK
Ant International
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint … XDR), and cloud compliance. Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years More ❯
Employment Type: Full-time
Posted:

Lead Cyber Security Specialist

Slough, Berkshire, UK
Ant International
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint … XDR), and cloud compliance. Good understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in More ❯
Employment Type: Full-time
Posted:

Product Owner

Reading, England, United Kingdom
Hybrid / WFH Options
Lorien
contract role - Hybrid working - Reading Our client is looking for an experienced and security-focused Product Owner across Identity and Privileged Access Management workstreams (IAM/PAM). In this role, you will be responsible for defining and managing the roadmap and backlog for key IAM/PAM capabilities, ensuring that systems are secure, compliant, and aligned … to deliver scalable and user-centric access solutions that reduce risk and enhance operational efficiency. Key Responsibilities: • Define and own the product vision and strategy for IAM and PAM capabilities, including identity lifecycle management, authentication, authorization, privileged access controls, and role-based access. • Prioritise and manage a well-groomed product backlog that reflects risk mitigation, compliance … performance, and user satisfaction. Identity experience: • Tangible experience as a Product Owner or similar role in cybersecurity, identity management, or access governance. • Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). • Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). • Experience working in Agile environments and More ❯
Posted:

OT Cyber Security Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with … ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior Cyber Security Analyst Contextualise OT Specific Threats: • Understand the Operational Technology … user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/VPN, IDS/IPS, etc. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Privileged Access Management
Berkshire
25th Percentile
£58,750
Median
£62,500
75th Percentile
£66,250