collaboration with internal teams and third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry-leading Identity Governance and Administration … management. Experience in Microsoft technical administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred) Microsoft Certified: Identity and Access … Migration: Collaborate with SMEs and project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and tool implementation. Remediation & Process Improvements More ❯
Netskope SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration management and continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement … and supporting Identity and AccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of PrivilegedAccessManagement (PAM) solutions, including policy definition, Just-In-Time (JIT) access implementation, and proactive monitoring of privileged activity for security threats Our Infrastructure Stack: Operating Systems: Windows, macOS, ChromeOS, Linux More ❯
data-informed decisions and innovations in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: Bachelor’s degree in … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO, MFA, RBAC and ABAC Knowledge More ❯
have extensive hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN, and Virtual Desktop Infrastructure (VDI … Zero Trust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention … Security, Cloud Security, or IT Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), and security automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi-cloud security best practices. Languages More ❯
Architect with extensive hands-on experience of Active Directory and EntraID. We are also seeking an Identity Engineer with hands on experience of Active Directory, EntraID and exposure to privilegedaccessmanagement solutions. Experience of architecture, design and implementation of Identity Governance and Administration technologies such as SailPoint or equivalent is desirable for both positions. Required experience … Proven architecture and design experience with Active Directory and Entra ID (Azure Active Directory) implementation and management. Other Identity Provider experience beneficial. Strong understanding of identity lifecycle management and security principles. Hands-on experience with Conditional Access, MFA, and SSO, Group Policy, Intune and related technologies. Knowledge of protocols such as SAML, OAuth, and OpenID Connect. Experience with More ❯
StrongDM is driven by a clear mission: Secure Access, Zero Trust. We design products and … solutions that reflect this commitment, transforming the way organizations manage privilegedaccess across their critical infrastructure. By leading with Zero Trust PrivilegedAccessManagement (PAM), we help our customers achieve secure, dynamic, and fine-grained control over access to their most sensitive resources. This focus on security has earned us an industry-leading … to master things you may know nothing about. Don't know how to kubectl now? That's fine; you will learn Experience with PrivilegedAccessManagement - PAM (Cyberark, Teleport, Delinea), SASE and related network technologies Experience with Kubernetes, Ansible, Terraform, CI/CD (Jenkins, Github, etc), Identity Providers (Okta, Ping, Azure AD/Entra ID, AWS etc. More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed employees to learn and develop their career with us. At Thales UK, we research, develop, and supply technology and services … suits your lifestyle and helps you reach your ambitions. We are looking for someone enthusiastic and ambitious to join our Pre-Sales team to work with our Identity and Accessmanagement portfolio. In this position, you will be working closely with the Workforce IAM sales team to respond to partner and customer needs for our solutions. The job More ❯
SC Cleared Data Analyst Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM … cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: 2+ years of experience in a data analyst role, preferably within secure … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Regards Chaya More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint … and cloud compliance . Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in More ❯
Business Analyst (PAM/CyberArk/IAM/Migration Project) – Banking – London , Paris, Amsterdam and Brussels Rate: 500 – 700 Duration: 1 year Hybrid – 2 days onsite per week Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of Identity and Access Management. Collect requirements and transform them into a structured … sources of information to determine scope of activities and determine approach. Closely collaborate with key Project stakeholders in identifying, analysing and liaising with technical team the appropriate approach for Privileged Account onboarding to IAM tools. Lead analysis and onboarding activities together with Project Lead. Responsibilities: Working closely with Business and IT stakeholders to gather requirements (functional and non-functional … clear presentations to present the outcome of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key contributors during the project delivery More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Lorien
contract role - Hybrid working - Reading Our client is looking for an experienced and security-focused Product Owner across Identity and PrivilegedAccessManagement workstreams (IAM/PAM). In this role, you will be responsible for defining and managing the roadmap and backlog for key IAM/PAM capabilities, ensuring that systems are secure, compliant, and aligned … to deliver scalable and user-centric access solutions that reduce risk and enhance operational efficiency. Key Responsibilities: • Define and own the product vision and strategy for IAM and PAM capabilities, including identity lifecycle management, authentication, authorization, privilegedaccess controls, and role-based access. • Prioritise and manage a well-groomed product backlog that reflects risk mitigation, compliance … performance, and user satisfaction. Identity experience: • Tangible experience as a Product Owner or similar role in cybersecurity, identity management, or access governance. • Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). • Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). • Experience working in Agile environments and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with … ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior Cyber Security Analyst Contextualise OT Specific Threats: • Understand the Operational Technology … user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/VPN, IDS/IPS, etc. More ❯
solutions, including NSX, to enhance both performance and security. You will also be responsible for implementing and managing Single Sign-On (SSO) and PrivilegedAccessManagement (PAM) solutions to strengthen authentication and security. Collaboration with cross-functional teams will be vital to define technical roadmaps and drive innovation. In this role, you will: • Develop and implement scalable … Design and integrate cross-domain solutions to enable secure data exchange across environments. • Architect and optimise network solutions to enhance both performance and security. • Implement and manage SSO and PAM solutions to strengthen authentication security. • Collaborate with engineering and security teams to ensure best practices and compliance standards are met. Required qualifications to be successful in this role To succeed … VMware Cloud Foundation, NSX, and VxRail to develop and manage virtualised environments. • In-depth knowledge of networking principles and security best practices. • Experience with implementing and managing SSO and PAM solutions for enhanced security. • Strong problem-solving, communication, and stakeholder management skills to work effectively across teams. #LI-JW1 Together, as owners, let's turn meaningful insights into action. More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
designing and implementing identity solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No one day is the same … non-technical audiences. Desirable Experience of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC … using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and More ❯
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯
optimisation of the SharePoint environment. Essential Skills & Experience: Proven experience delivering multiple end-to-end SharePoint Online implementations. Strong hands-on knowledge of SharePoint Online, including site collections, permissions management, content types, metadata, and Power Platform integrations. Experience designing solutions that cater to varied organisational structures and workflows. Excellent interpersonal and stakeholder engagement skills, with the ability to explain … Experience working in cross-functional project teams and managing change in complex environments. Desirable Skills: Knowledge of Entra ID (formerly Azure AD) and PrivilegedAccessManagement (PAM) principles. Awareness of AI and Microsoft Copilot and how they can be leveraged to enhance SharePoint capabilities. Experience with Microsoft Teams and broader Microsoft 365 ecosystem. Familiarity with governance, compliance … and lifecycle management within Microsoft 365 environments. More ❯
/Qualifications: Knowledge of MOD ICT and network standards. Familiarity with MOD documentation standards. Technical expertise in: VMware. Linux. Microsoft Windows (including Active Directory, RDS, and Group Policy). PrivilegedAccess Management. Auditing, and Logging policies. Backup and storage systems. IP networking. IR35 Determination: Outside IR35 Duration: Contract-only 6 months Location: Min 4 days per week at More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
team on a 6 month initial contract working hybrid, based out of their site in Warwickshire. This role requires candidates to hold an active security clearance. Experience: Implementation and Management: Oversee … the implementation and management of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and resolve issues related to CyberArk … implementation and management. Certifications: Relevant certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various teams and stakeholders. Due to More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
VANLOQ LIMITED
connectivity. Excellent stakeholder engagement and communication skills. Ability to work independently and take full ownership of delivery. Proficient in MS Project and resource planning tools. Strong risk and issue management capabilities. Effective leadership, conflict resolution, and problem-solving skills. Highly organized with excellent time management abilities. Team-oriented mindset with a positive and proactive … approach. Desirable Skills Experience working in global teams or within large organizations. Familiarity with tools such as JIRA and JIRA Plans. Background in Architecture or Design teams. Understanding of PAM (PrivilegedAccessManagement) tools. Previous experience working within financial services. Seniority Level Mid-Senior level Industry IT Services and IT Consulting Employment Type Contract Job Functions Project … Management Skills J More ❯
an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot key management systems like HashiCorp Vault and Thales HSM. -Support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System More ❯
systems. Key Responsibilities: Advanced Support & Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. -Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a strong foundation More ❯
and adaptability are part of the culture - and youre excited to help shape a growing product alongside a close-knit, mission-driven team. Must-Haves 5+ years in product management, ideally in EdTech accessibility or SaaS. Proven experience working in a startup or scale-up environment - confident navigating ambiguity, autonomy and competing priorities. Experience leading discovery efforts and working … practices. Direct experience working with or designing for neurodivergent users. Why Join Us? 9-day fortnight (every second Friday off) 33 days holiday (including public holidays) Remote-first with access to our Glasgow office for collaborative sessions Wellbeing cashback plan and assistive tech support £150 home working setup budget Make a real impact - building inclusive tech for every mind … United Kingdom 4 days ago Glasgow, Scotland, United Kingdom 7 hours ago Glasgow, Scotland, United Kingdom 4 weeks ago Paisley, Scotland, United Kingdom 1 month ago Product Owner - Privilege AccessManagement Glasgow, Scotland, United Kingdom 1 week ago Bothwell, Scotland, United Kingdom 1 week ago Business Analyst (Transaction Reporting) Glasgow, Scotland, United Kingdom 3 days ago Glasgow, Scotland More ❯
thinking and enables boundaryless opportunities that can drive your career in new and exciting ways If you’re looking for a challenging career working in a vibrant environment with access to training and a global network of experts, this could be the role for you. As part of our global team, you'll be working with cutting-edge technologies … are looking for experience in the following skills: Passion for improving the UK public sector security posture Experience applying security technologies to architectures and solution designs, such as Privilege AccessManagement, SSO, IDAM, Network security and encryption Understanding of IT infrastructure, technical concepts, and design methodologies Understand threat modelling and development of reference architecture Ability to learn and More ❯
Posted:
Salary Guide
Privileged Access Management the UK excluding London