|
10 of 10 Privileged Access Management Jobs in Slough
slough, south east england, United Kingdom Wipro
services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing Privileged Access Management ( PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible … ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities: 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management More ❯
slough, south east england, united kingdom Hybrid / WFH Options Lorien
Identity & Access Management (IAM) Manager Location: Hybrid/London Salary: Up to £80k + Discretionary Bonus + Additional corporate benefits package The Client: A leading global consultancy firm requires an IAM Manager About the Role: We are seeking a highly skilled Identity & Access Management (IAM) Manager … delivery. Technical Expertise & Skills Required: Strong subject matter expertise across IAM domains, including Identity Governance Administration (IGA) and Privileged Access Management ( PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends … delivery and business development activities effectively. Desirable Experience: Proven background in corporate, utilities, or financial sectors. Hands-on expertise in enterprise identity, customer IAM, access management, and privileged access management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness More ❯
slough, south east england, United Kingdom Hybrid / WFH Options Intec Select
all applications across all areas of the business. You will lead and be collectively responsible for ensuring IT Security is managed through Identity and Access Management and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and Access Management, especially through … technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and Access Management platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. Proactively initiate investigations for improvements for standard operating processes and procedures, utilising the … current owned/licensed tools available, to evidence and escalate issues to the management team. Play a leading role in documenting, presenting and using direct communication to map software lifecycle, create work breakdown structures (WBS) and the appropriate supporting documentation Lead technical delivery, supporting the programme and project managers More ❯
slough, south east england, United Kingdom Entasis Partners
are seeking a highly skilled and experienced CyberArk Architect to lead the design and implementation of cutting-edge Privileged Access Management ( PAM) solutions, with a strong emphasis on CyberArk Cloud technologies. This is a technical role that also requires strategic advisory capabilities, excellent communication skills, and the … ability to engage with senior stakeholders across multiple sectors. Key Responsibilities: Design, architect, and implement CyberArk solutions with a focus on PAM Cloud and cloud-native security models Act as a trusted advisor to clients, providing expert guidance on CyberArk best practices, cloud security strategy, and PAM roadmaps Lead end … to-end PAM projects from requirements gathering to delivery, working across diverse client environments (financial services, retail, public sector, etc.) Collaborate with security, infrastructure, and cloud teams to ensure secure integration of CyberArk within broader IT ecosystems Engage in board-level presentations and security briefings, translating complex technical concepts into More ❯
slough, south east england, united kingdom Spike Reply UK
Identity and Access Management (IAM) Cybersecurity Consultant Job Summary: The Identity and Access Management (IAM) Cybersecurity Consultant is responsible for designing, implementing, and managing identity solutions to ensure secure and efficient access to systems and applications. This role enforces authentication, authorisation, and identity governance to … etc. Key Responsibilities: ·Develop and maintain IAM solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management ( PAM). ·Manage identity lifecycle processes, including provisioning, de-provisioning, and role-based access control (RBAC). ·Implement identity federation, directory services, and identity governance … ensure adherence to industry standards such as NIST, ISO 27001, and Zero Trust principles. ·Automate IAM processes to improve efficiency and security. ·Conduct regular access reviews and audits. Qualifications: ·Bachelor’s degree in Cybersecurity, Information Technology, or related discipline. ·NICE TO HAVE: o Security Clearance o Hands-on experience More ❯
slough, south east england, United Kingdom RiverSafe
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management ( PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … and compliance stakeholders to align IAM initiatives with business objectives and regulatory requirements. Skill sExtensive experience in Cyber Security, with a focus on Identity & Access Management .Proven expertise with leading IAM technologies such as :IGA: SailPoint, Saviynt, Oracle Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta … with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex enterprise environments .Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences . More ❯
slough, south east england, United Kingdom Hybrid / WFH Options Siena Partnership
work, with a slight bias towards project work. Key current and upcoming projects are in the following areas: * Privileged Access Management ( PAM) * Data Loss Prevention (with an element of AI) * Managed Services Security Providers (MSSP) * Network segmentation This role would suit someone with a security engineering background … environment. I have a full JD I can share once we've spoken, but these are the key requirements: * Endpoint Detection and Response, WAF, Privileged Access Management, Cloud Security, CASB, Firewalls, SIEM platforms * Microsoft tech stack - Azure, M365, Windows Server 201202022, OnPrem EntraID * Security framework knowledge across More ❯
slough, south east england, United Kingdom Hybrid / WFH Options Ultima
design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications … Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management ( PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
slough, south east england, United Kingdom CyberClan
ISPs) to ensure 99.9% uptime of the network infrastructure. This also includes maintaining and renewing network solution contracts and documenting them in our contract management system Design, maintain and recommend improvements to our cloud platform firewall and network design to improve network management and operations Create detailed network … the business needs and recommend network solutions that fits best Participate in planning, designing and maintaining the OT network infrastructure of our clients Operational Management Assist DFIR team with imaging, data acquisition & installing agents for compromised clients on-site Assist with the scoping of new engagements using a whole … incidents using network monitoring tools and other systems to maintain 99.9% uptime of our network Monitor and take ownership of network incidents using ticket management systems that requires further investigation and analysis Configure, install and maintain network hardware such as a Router, Switch, Access Points, etc. in both More ❯
slough, south east england, United Kingdom CyberClan
for solving customer issues and advocating for their success, in a fast paced, highly technical environment. Ability to learn new technologies quickly. Excellent relationship management, customer service and communication skills in a variety of forms (written, live chat, conference calls, in-person). Ability to work independently with little … solutions Experience supporting full range of security and remediation applications including EDR, software Firewalls and data recovery tools Exposure to implementation and maintenance of privileged access management solutions. Linux troubleshooting experience a plus Experience with troubleshooting Windows, Mac and ChromeOS MCP, ITIL, CompTIA, CDRE Certifications an asset More ❯
|
|