data-informed decisions and innovations in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: Bachelor’s degree in … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO, MFA, RBAC and ABAC Knowledge More ❯
Architect with extensive hands-on experience of Active Directory and EntraID. We are also seeking an Identity Engineer with hands on experience of Active Directory, EntraID and exposure to privilegedaccessmanagement solutions. Experience of architecture, design and implementation of Identity Governance and Administration technologies such as SailPoint or equivalent is desirable for both positions. Required experience … Proven architecture and design experience with Active Directory and Entra ID (Azure Active Directory) implementation and management. Other Identity Provider experience beneficial. Strong understanding of identity lifecycle management and security principles. Hands-on experience with Conditional Access, MFA, and SSO, Group Policy, Intune and related technologies. Knowledge of protocols such as SAML, OAuth, and OpenID Connect. Experience with More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
SC Cleared Data Analyst Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM … cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: 2+ years of experience in a data analyst role, preferably within secure … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Regards Chaya More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint … XDR), and cloud compliance. Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint … XDR), and cloud compliance. Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Lorien
contract role - Hybrid working - Reading Our client is looking for an experienced and security-focused Product Owner across Identity and PrivilegedAccessManagement workstreams (IAM/PAM). In this role, you will be responsible for defining and managing the roadmap and backlog for key IAM/PAM capabilities, ensuring that systems are secure, compliant, and aligned … to deliver scalable and user-centric access solutions that reduce risk and enhance operational efficiency. Key Responsibilities: • Define and own the product vision and strategy for IAM and PAM capabilities, including identity lifecycle management, authentication, authorization, privilegedaccess controls, and role-based access. • Prioritise and manage a well-groomed product backlog that reflects risk mitigation, compliance … performance, and user satisfaction. Identity experience: • Tangible experience as a Product Owner or similar role in cybersecurity, identity management, or access governance. • Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). • Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). • Experience working in Agile environments and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with … ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior Cyber Security Analyst Contextualise OT Specific Threats: • Understand the Operational Technology … user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/VPN, IDS/IPS, etc. More ❯