3 of 3 Privileged Access Management Jobs in the East of England

Identity and Access Management Specialist

Hiring Organisation
COMPUTACENTER (UK) LIMITED
Location
Hatfield, Hertfordshire, South East, United Kingdom
Employment Type
Permanent
Life on the team As an Access Specialist within Cyber Operations, youll sit at the heart of Computacenters Access Management capability. Youll work across security, platforms, and the wider business to design secure, scalable access models that enable our people, partners, and customers to do their … best worksafely. This is an influential role where youll bridge strategy and delivery, mentor others, and help shape the future of access governance across both established and emerging platforms. What youll do Design and evolution of complex application, enterprise, and privileged access roles across Microsoft platforms Define ...

CyberArk Technical Architect

Hiring Organisation
COMPUTACENTER (UK) LIMITED
Location
Hatfield, Hertfordshire, South East, United Kingdom
Employment Type
Permanent
architectures across on-premises and cloud platforms Deep understanding of Identity and Access Management (IAM) and Privileged Access Management (PAM) Ability to produce and govern architecture artefacts (HLDs, LLDs, standards) Strong stakeholder management skills, with the ability to engage at senior and executive level … compliance requirements Eligible for SC Clearance (or currently holds it) Vendor/Technology Experience (expertise in at least 2 of the following) Identity & PAM: CyberArk (CDE, Cloud and On-Prem) SailPoint or equivalent IGA solutions SSE/SASE: Zscaler Palo Alto Cisco SASE Broader Security Technologies: Microsoft security stack ...

Cyber Security Engineer

Hiring Organisation
Atkinson Moss
Location
Norwich, Norfolk, England, United Kingdom
Employment Type
Full-Time
Salary
£50,000 - £65,000 per annum
threat intelligence platforms Analyse logs and security events to identify risks, unusual activity, and potential breaches Investigate incidents such as phishing, malware, and unauthorised access, coordinating response activities Maintain and update the cyber security risk register Advise on secure configuration and system hardening across infrastructure and cloud environments Review … firewall rules, access controls, and integrations to ensure least-privilege access Support compliance with regulatory requirements (e.g. FCA, GDPR) and internal policies Develop and maintain cyber security policies aligned with best practice Deliver internal security awareness initiatives, including phishing simulations and training Administer identity and access controls ...