Privileged Access Management Jobs in London

1 to 25 of 27 Privileged Access Management Jobs in London

Privileged Access Management Governance Analyst, Vice President

London, United Kingdom
STATE STREET CORPORATION
Job Title: PAM Governance Analyst, VP About Opportunity: Global Cybersecurity (GCS) protects State Street and its clients from the impact of cyber-attacks against systems by understanding the risks these attacks present and mitigating them through a robust, continuously evolving, cybersecurity program and control environment. Cyber Architecture & Engineering (Cyber A … E designs, architects, deploys, and continually enhances security measures for the protection of State Street's information related to its assets and customers. This PAM Governance Analyst will sit in the PAM Governance sub-function in Cyber A&E. This role is responsible for designing and maintaining automated and manual … Our work requires us to think in terms of risk and design automation and procedures that will mitigate risks and maintain compliance for all PAM standards. . Other responsibility areas are listed below. Responsibilities: Take a lead role in designing our new Compliance Platform. Write requirements, including UI requirements, test More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

CyberArk Operations Engineer

London Area, United Kingdom
Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged access management, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee Privileged Access Management (CyberArk) and Identity Access Management (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity access management, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Posted:

CyberArk Operations Engineer

london, south east england, united kingdom
Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged access management, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee Privileged Access Management (CyberArk) and Identity Access Management (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity access management, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Posted:

Identity and Access Management Senior Manager

London, United Kingdom
Hybrid / WFH Options
AVEVA Denmark
Identity and Access Management Senior Manager page is loaded Identity and Access Management Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to … apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: Identity and Access Management Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the … many other memberships and perks designed to enhance the workplace experience, your health, and wellbeing. The job We are looking for an Identity and Access Management (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

CyberArk Architect

London, United Kingdom
Hybrid / WFH Options
DCL
Are you ready to lead from the front and drive innovation in the Identity & Access Management (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams … and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance Privileged Access Management (PAM) Access Management Customer Identity and Access Management (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently … people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Consultant (Architecture - IDAM Engineer )

London, United Kingdom
Applicable Limited
The team you'll be working with: We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of … competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low … Level). User Profiles, Use Cases & IDAM/PAM processes. Work with other teams to agree Implementation plans and effort. Appropriate metrics, and processes to achieve client objectives and targets. Enact: The setup of test, development and production IDAM & PAM environments. IDAM & PAM technology implementation & configurations. Robust practices for the More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

One Identity Safeguard Engineer

City, London, United Kingdom
Robert Half
Robert Half is collaborating with a leading global consulting firm to recruit a PAM Engineer specialising in Safeguard Privileged Access Management (PAM) solutions. You will play a key role in supporting a newly established team in delivering a large-scale, impactful programme spanning two years. This hybrid … of a global consulting initiative, with the opportunity to directly influence the success of future privileged access management strategies. Job Title : PAM Engineer - Safeguard Expertise Company : Robert Half in collaboration with a leading Global Consulting Firm Contract Type : Initial 6-month Interim Contract (with a possibility to … expert support and engineering solutions within Safeguard PAM. Offer valuable consulting insights, contributing to project scoping and planning. Troubleshoot and address challenges within the PAM life cycle. Collaborate across teams to implement innovative solutions for privileged access management. Identify future opportunities for growth and project expansion. What We More ❯
Employment Type: Contract
Rate: GBP 600 - 650 Daily
Posted:

CyberArk Specialist

Central London, London, United Kingdom
Searchstone Ltd
delivery. Clients will be across multiple different industries, providing a real variety in project work. The suitable candidate will hold EITHER CDE Certification within Privileged Cloud or the Guardian Cert. key responsibilities are as follows: Providing subject matter expertise in Identity and Access Management (IAM), specifically in … CyberArk Leading transformations in areas such as identity governance, privileged access management, access management and customer identity access management Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback More ❯
Employment Type: Permanent
Salary: £90,000
Posted:

Cyber Security Lead

London Area, United Kingdom
Ant International
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Posted:

Cyber Security Lead

london, south east england, united kingdom
Ant International
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Posted:

Lead Cyber Security Engineer

London, United Kingdom
WorldFirst
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Identity Access Management (IAM) Manager

London Area, United Kingdom
LT Harper - Cyber Security Recruitment
Identity Access Management (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity Access Management (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, Access Management, or privileged access management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Posted:

Identity Access Management (IAM) Manager

london, south east england, united kingdom
LT Harper - Cyber Security Recruitment
Identity Access Management (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity Access Management (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, Access Management, or privileged access management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Posted:

IAM Engineer

London
Hybrid / WFH Options
Starling Bank
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and access management team and act as a liaison to the wider business, providing SME knowledge on identity and access management solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Employment Type: Permanent
Posted:

Security Architect - IDAM

City of London, London, United Kingdom
Access Computer Consulting
Security Architect who will provide expert advice and guidance on Identity and Access Management (IDAM) and Privileged Access Management (PAM) solutions. This is a hybrid role - 2 days in London, 3 days remote. The role falls inside IR35 so you will need to work through … experience in a Cyber/Information Security Role. You must hold a relevant Security Certifications (e.g., CISSP, CISM). Extensive experience in IDAM/PAM consulting, with a proven track record of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra, AWS IAM … best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience in developing and presenting IDAM/PAM roadmaps and strategic recommendations is also required. You must be eligible for SC Clearance if not already cleared. Please apply ASAP to discuss further. More ❯
Employment Type: Contract
Rate: £500 - £600/day
Posted:

Principal Cyber Security Consultant

London Area, United Kingdom
Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the Privileged Access Management service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privileged access management and ensure compliance with industry standards and regulations. More ❯
Posted:

Principal Cyber Security Consultant

london, south east england, united kingdom
Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the Privileged Access Management service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privileged access management and ensure compliance with industry standards and regulations. More ❯
Posted:

Principal Consultant - Identity & Access Management

London Area, United Kingdom
RiverSafe
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … Cyber Security, with at least 5 years focused on IAM. Proven expertise with leading IAM technologies such as: IGA: SailPoint, Saviynt, Oracle Identity Governance PAM: CyberArk, BeyondTrust, Delinea SSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD) Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect … with cloud IAM in AWS, Azure or GCP. Hands-on experience designing and deploying IAM in large, complex enterprise environments. Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences. More ❯
Posted:

Principal Consultant - Identity & Access Management

london, south east england, united kingdom
RiverSafe
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … Cyber Security, with at least 5 years focused on IAM. Proven expertise with leading IAM technologies such as: IGA: SailPoint, Saviynt, Oracle Identity Governance PAM: CyberArk, BeyondTrust, Delinea SSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD) Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect … with cloud IAM in AWS, Azure or GCP. Hands-on experience designing and deploying IAM in large, complex enterprise environments. Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences. More ❯
Posted:

Head of Identity & Access Management London, Agile

London, United Kingdom
Enstar Group
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The … users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential … policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Operations Manager

London, United Kingdom
Barclay Simpson
of IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents … including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Analyst

London Area, United Kingdom
Braemar
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, Privileged Access Management (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
Posted:

Senior Cyber Security Analyst

london, south east england, united kingdom
Braemar
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, Privileged Access Management (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
Posted:

Technology Graduate Trainee, Information Security

London, United Kingdom
Marex Group
Security London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services … agency and execution, market making, and hedging and investment solutions. It has a leading franchise in many major metals, energy and agricultural products, with access to 60 exchanges. The group provides access to the world's major commodity markets, covering a broad range of clients that include some … security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Manager - Infrastructure Team Leader, 365, Azure

London, United Kingdom
Hybrid / WFH Options
Reed Technology
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privileged access management, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Privileged Access Management
London
10th Percentile
£64,500
25th Percentile
£67,500
Median
£75,000
75th Percentile
£106,250
90th Percentile
£123,500