Privileged Access Management Jobs in the North of England

3 of 3 Privileged Access Management Jobs in the North of England

SSH Technical Solution Design/Delivery Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
The successful candidate will work on high-visibility project regarding SSH keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the Identity and Access Management space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations.? Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and access management, Privileged access management and secure access solutions … projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Employment Type: Contract
Rate: £400 - £500 per day
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SSH Technical Solution Designer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
JobTitle: SSHTechnicalSolutionDesigner Location: Sheffield(Hybrid3dayson-siteperweek) ContractType: 6-MonthInitialContract IR35Status: InsideIR35 Industry: FinancialServices StartDate: ASAP Overview: Werepartneringwithaleadingfinancialservicesorganisationtorecruitahighlyexperienced SSHTechnicalSolutionDesigner foracritical,high-visibilityproject.Thisisanexcitingopportunitytocontributetoamajorstrategicinitiativefocusedon SSHkeydiscovery,management,andremediation acrossbothon-premiseinfrastructureandcloudplatforms. Thisrolerequiresdeeptechnicalexpertisein SSHkeymanagement , cryptography ,and Identity&AccessManagement(IAM) tohelpshape,design,andimplementsecureaccesssolutionsacrossacomplexhybridenvironment. KeyResponsibilities: Designandimplementscalableandsecure SSHkeymanagementsolutions acrosson-premandcloudenvironments. DriveSSHkeydiscovery,rotation,remediation,andgovernanceactivities. Leadcryptographicriskassessmentsanddevelopmitigationstrategies. Workcloselywithengineeringandoperationsteamsonsecureautomationandreconfigurationofprivilegedaccess. Definesecuremachine-to-machineandhuman-to-machineaccesscontrolswithinIAMandPAMframeworks. Collaboratewithinternalstakeholderstoensurecompliancewithsecuritystandardsandbestpractices. … Supporttheintegrationof HardwareSecurityModules(HSMs) forsecurekeystorageandcryptographicoperations. Contributetoplanningandreadinessfor Post-QuantumCryptography(PQC) andquantum-resistantencryptionapproaches. Ensurealignmentwith FIPS140-2/140-3 cryptographicmodulestandards. EssentialSkills&Experience: Proventrackrecorddesigningsecure SSHkeylifecycle managementatenterprisescale. Strongbackgroundin cryptographicriskmanagement ,includingthreatmodellingandmitigation. Hands-onexperiencein IAM and PrivilegedAccessManagement(PAM) incomplexenvironments. Deepunderstandingofsecureaccessprotocols,keyexchangemechanisms,andcryptographicprinciples. Familiaritywith HSMs ,securekeystoragestrategies,andrelatedintegrationpractices. Awarenessof NISTPQC initiativesandimplicationsforfutureencryptionstandards. Knowledgeof FIPS-validatedcryptographicmodules andtheiroperationaluseinenterprisesettings. ContractDetails: Duration: 6months(initialterm) Location: Sheffield(Hybrid3daysperweekon-site) IR35: InsideIR35 Start: ASAP HowtoApply: Ifyoureatechnicallystrong More ❯
Employment Type: Contract
Posted: