An excellent opportunity has arisen for an Identity & AccessManagement Analyst to join us. This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our … strategic change projects as our IAM function matures and grows. The role reports directly to the Identity & AccessManagement Lead. The role holder will work closely with our colleagues in Cyber Security Operations team, Risk & Compliance, HR and Infrastructure Teams, as well as L&Q business teams. You … would suit someone technical and an analytical problem solver who enjoys working as part of a team in an evolving environment. As an Identity & AccessManagement Analyst, you will be part of the team thats driving Identity as the new security perimeter. The Identity & AccessManagementmore »
Hiring: PrivilegedAccessManagement Consultant (PAM) Location: Hybrid working - various clients in London area 6 month initial contract - likely extension Competitive day rate - inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor's degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
Role: Sailpoint SME Location: London Duration: 6 months Key essential skills: 5+ years of experience in Identity and AccessManagement 4+ years of SailPoint IIQ experience Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations Expertise working with SailPoint Identity IQ … platform - Access Lifecycle Management, Certifications, Role Management VS Code, SQL Management Studio, Jira, Git. Programming languages: Java, Python, SQL Server 2022. Databases: MSSQL, Oracle. Cloud Technology: Azure QA duties: usability, performance & automated testing, test scripts, cases and plans. Expertise in onboarding applications with various connectors like … Active Directory. Develop APIs leveraging Java-based development, particularly SCIM and REST APIs. Demonstrate understanding and experience with PrivilegedAccessManagement (PAM) concepts and use cases. Collaborate with the team to ensure compatibility and integration of IAM solutions with other systems and platforms. Stay updated with industry more »
into the UK Market as an integrator of third-party Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions for businesses across various sectors. Their expertise lies in seamlessly integrating third-party IAM and … PAM solutions into complex IT environments, ensuring enhanced security, compliance, and operational efficiency for their clients. Job Description: As a IAM/PAM Security Consultant you will play a crucial role in delivering bespoke IAM and PAM integration solutions to clients across various sectors. You will be responsible for the … design, configuration, testing, deployment, and post-implementation support. This role requires a deep understanding of both the technical and strategic aspects of IAM and PAM technologies, as well as the ability to design and implement solutions that integrate smoothly with clients' existing IT infrastructure. The successful candidate will act as more »
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
Job Title: Identity and AccessManagement Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found iconic brands by remixing … that are music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective Identity and AccessManagement (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities and access to … Oracle Cloud, Microsoft 365, and other cloud-based applications. Oversee access governance for on-premise servers and vendor partnerships. Track, report, and maintain audit readiness for IDAM-related processes and procedures. Create and manage a process for managers to periodically reconfirm permissions. Your Key Tasks: Manage user accessmore »
Job Title: Identity and AccessManagement Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found iconic brands by remixing … that are music to the ears of consumers, customers, colleagues, and the planet alike. Your Key Responsibilities: Develop, implement, and maintain effective Identity and AccessManagement (IDAM) processes and governance to ensure the confidentiality, integrity, and availability of our systems and data. Manage identities and access to … Oracle Cloud, Microsoft 365, and other cloud-based applications. Oversee access governance for on-premise servers and vendor partnerships. Track, report, and maintain audit readiness for IDAM-related processes and procedures. Create and manage a process for managers to periodically reconfirm permissions. Your Key Tasks: Manage user accessmore »
in the Identity Security and Security Operations space, specializing in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM). Committed to providing top-notch consulting and managed services to enterprise-level clients, we are seeking an experienced Sales Manager/Account Executive to … as the primary point of contact for key accounts. Drive sales efforts for both services and products, with a specific focus on IAM/PAM solutions. Collaboration with Lead Generation and Marketing: Work closely with the Lead Generation and Marketing teams to refine messaging and enhance the go-to-market … sales and business development, particularly in the Identity Security and Security Operations space. Experience working with enterprise-level clients, preferably in the IAM/PAM domain. Strong understanding of consulting and managed services sales processes. Excellent communication and interpersonal skills. Attributes: Results-oriented and target-driven. Strategic thinker with the more »
Stanmore, England, United Kingdom Hybrid / WFH Options
Sky
you to be your best. ”. The remit extends to enterprise workplace platforms and systems including client devices, productivity, unified communications, video conferencing, identity, privilegedaccessmanagement, file services and corporate applications. This includes the user journey and UI experience of GWS services and products. GWS also … environment. What you'll do Ability to manage and deliver complex projects within set timelines, exhibiting a solid understanding of Agile and Waterfall project management principles and practices. Practical knowledge and understanding of the UK Telecoms Security, and its impact on areas such as network infrastructure, privilegedaccessmanagement, Active Directory, and Identity and Access Management. Familiarity with Telecoms regulations and standards would be advantageous. Proactivity in fostering effective collaboration with various technical partners across the organization. This includes understanding key business functions, maintaining strong relationships at all levels, aligning project goals with business objectives more »
month contract Inside IR35 We're seeking a skilled individual to join our clients CyberArk delivery team, deploying the cutting-edge CyberArk core PrivilegedAccess Security (PAS) solution to their esteemed clients. Responsibilities: Lead the deployment, configuration, and testing of CyberArk PAS, ensuring seamless integration across platforms like … support and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of PrivilegedAccessManagement processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, Identity Management policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an more »
responsible for leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and accessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best practices. Design … vulnerabilities. Lead threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and accessmanagement strategies, including user authentication, authorization, and privilegedaccess management. Collaborate with cross-functional teams to integrate security controls and measures … CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. Strong knowledge of regulatory compliance more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust Business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical: Extensive background in Cyber Security engineering and … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
change initiatives in the company. Candidates should have additional experience of: Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identity accessmanagement and PrivilegedAccess management. Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to … project documentation with excellent skills in the use of the MS Office suite of tools and MS Project Formal training or certification in Project Management Certification (MSP/PRINCE2/PMI/APM/SIX SIGMA) Professional PM accreditation (Prince 2, PMI, APM etc…) Significant project management experience more »
to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threat management, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps automations to … and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business continuity plans, disaster recovery, and critical management plans to ensure the resilience of our operations in the face of cyber threats and other emergencies. Key Competencies Technical Significant experience in Cyber … protecting IT, OT, and IP networks, including IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Expertise in PrivilegedAccessManagement and related tools High level of expertise in Vulnerability and Compliance Management; DDOS protection Hands-on experience in Cyber more »
emails with encryption. Become the gatekeeper of our inboxes. • Platform Maestro: Deploy, configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threat detection and reducing false alarms. • Network Security Sage: Possess a deep understanding … Incident response methodologies (MITRE ATT&CK, D3FEND) • Microsoft 365 Security • DMARC, SPF, DKIM • Strong Scripting (e.g., PowerShell or Python) • Security automation frameworks • Security platform management • Vulnerability management tools • Privilege AccessManagement • Industry-standard frameworks (NIST, SANS) and best practices controls (CIS) About Us ComfortDelGro is one more »