Privileged Access Management Jobs in the UK excluding London

17 of 17 Privileged Access Management Jobs in the UK excluding London

SSH Technical Solution Design/Delivery Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
The successful candidate will work on high-visibility project regarding SSH keys discovery, management and remediation across on-prem and the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the Identity and Access Management space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations.? Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and access management, Privileged access management and secure access solutions … projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Employment Type: Contract
Rate: £400 - £500 per day
Posted:

PAM Consultant SC Cleared

Telford, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
Job Title: PAM Consultant- SC Cleared Location: Hybrid – Stafford Park 1, Telford TF3 3BD (3 days/week Onsite) Duration: 3months+ Description We are seeking a highly experienced Privileged Access Management (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control … mechanisms, identifying risks associated with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key Responsibilities: • Conduct comprehensive assessments of internal infrastructure to identify privileged access risks and gaps. • Analyze current access provisioning models, especially where elevated permissions (e.g., root, Admin access) are broadly granted. • Analyze existing … access control models and recommend enhancements using RBAC, ABAC, and least privilege principles. • Design PAM architectures that support secure delegation of access across diverse platforms. • Design and recommend PAM strategies that enforce least privilege, improve auditability, and enhance operational security. • Evaluate and compare PAM solutions (e.g., CyberArk, BeyondTrust, Delinea) based on technical fit, scalability, and integration capabilities. • Document More ❯
Posted:

Senior Infrastructure Engineer

Northampton, Northamptonshire, United Kingdom
Simply Business
Netskope SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration management and continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement … and supporting Identity and Access Management (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged Access Management (PAM) solutions, including policy definition, Just-In-Time (JIT) access implementation, and proactive monitoring of privileged activity for security threats Our Infrastructure Stack: Operating Systems: Windows, macOS, ChromeOS, Linux More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Glasgow, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Belfast, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Edinburgh, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IAM Systems Integrator (Saviynt) New Belfast, Northern Ireland, United Kingdom

Belfast, United Kingdom
Lightspeed
the bar for quality, drive collaboration, and mentor others to reach their full potential? If so, you might be in the right place! Are you passionate about Identity and Access Management (IAM) and eager to contribute to a secure and efficient technology environment? Lightspeed is seeking a skilled and motivated IAM System Integrator to join our IAM team … . In this role, you will be a key player in ensuring seamless and secure access to our applications and systems. You will be responsible for onboarding and offboarding applications within our IGA tool (Saviynt) and IdP, supporting end-users, contributing to certification audits, and promoting IAM best practices throughout the organization. If you have a strong understanding of … with the ability to create and maintain clear and concise run books and user guides. Experience with ticketing systems (Jira, ServiceNow) Experience with Privileged Access Management (PAM) tools Experience with Java programming is a plus. Experience with SOX compliance is a plus Excellent communication and interpersonal skills, with the ability to support end-users and collaborate effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Project Manager, IAM SC

Stevenage, Hertfordshire, England, United Kingdom
Sanderson
months with the potential of extension Location - Hertforshire - 4-5 days a week onsite Responsibilities Lead the end-to-end delivery of multiple IAM-related projects (e.g., role-based access control, identity lifecycle management, privileged access management, SSO/MFA implementations). Define and manage project scopes, goals, milestones, deliverables, and timelines in collaboration with … and consistency with organisational standards Oversee deployment and configuration activities, ensuring security and compliance are built into IAM implementations Key Skills Proven experience as Technical Project Manager within Identity Access Management Strong knowledge of IAM principles, technologies and frameworks IAM deployment experience Strong technical acumen with the ability to engage confidently with engineers, architects and cybersecurity professionals Aerospace More ❯
Employment Type: Contractor
Rate: £600 - £800 per day
Posted:

IAM Solutions Architect

Derby, Derbyshire, East Midlands, United Kingdom
AMS CWS
we are looking for a IAM Solutions Architect for a 12 Month contract based in Derby or Bristol . The Role & Responsibilities: We are seeking an experienced Identity and Access Management (IAM) Solution Architect to support a series of critical projects and service improvements within Rolls Royce over the next three years. This role will work closely with … and implement IAM solutions. Lead solution architecture for Active Directory, joiner/mover/leaver processes, and related identity lifecycle management. Architect solutions utilising SailPoint IdentityNow (cloud) and CyberArk Privileged Access Management tools. Document technical and business requirements, ensuring alignment with project goals. Produce Architecture and Design documents, including high-level and low-level designs. Oversee the … similar role. Strong expertise in Active Directory and identity lifecycle (joiner, mover, leaver). Hands-on experience with SailPoint IdentityNow (cloud) for identity governance. Experience implementing and managing CyberArk privileged access solutions. Strong documentation skills, including producing architecture diagrams, design specifications, and test plans. Ability to liaise effectively with both technical teams and business stakeholders. Understanding of IAM More ❯
Employment Type: Contract
Posted:

SSH Key Technical Solutions Delivery Engineer

Edinburgh, Midlothian, Scotland, United Kingdom
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Employment Type: Contract
Rate: £400 - £500 per day
Posted:

On-site Active Directory Engineer, Reading

Reading, Berkshire, South East, United Kingdom
DXC Technology
Engineering, or related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: Identity and Access Management service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged Access Management principles knowledge and experience Multi Factor More ❯
Employment Type: Permanent
Posted:

Security Architect SC

London, South East, England, United Kingdom
Hybrid / WFH Options
Sanderson
in: Security legislation (GDPR, PCI DSS, ICO) Frameworks (ISO 27001, NIST CSF, CIS Controls v8) HMG/NCSC policies and guidance Cloud security (AWS, Azure) Microservice architectures PKI, Cryptography, Privileged Access Management Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM (or working towards CIISEC/UK Cyber Security Council registration). Soft Skills: Strong analytical thinking More ❯
Employment Type: Full-Time
Salary: £70,000 - £85,000 per annum
Posted:

Cyber Security Architect

Newport, Gwent, United Kingdom
Hybrid / WFH Options
Yolk Recruitment Ltd
and embed Security Architecture Principles to guide all programmes, projects, and changes Develop and maintain ISO27001-compliant security policies and an ISMS framework Create reference architectures for Identity and Privileged Access Management Provide architecture reviews for all new systems and major changes to existing ones Support the redevelopment and testing of the organisation's Security Incident Response More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Architect - Systems Integrator

Bristol, Gloucestershire, United Kingdom
Hamilton Barnes Associates Limited
/Qualifications: Knowledge of MOD ICT and network standards. Familiarity with MOD documentation standards. Technical expertise in: VMware. Linux. Microsoft Windows (including Active Directory, RDS, and Group Policy). Privileged Access Management. Auditing, and Logging policies. Backup and storage systems. IP networking. IR35 Determination: Outside IR35 Duration: Contract-only 6 months Location: Min 4 days per week at More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SSH Technical Solution Designer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
JobTitle: SSHTechnicalSolutionDesigner Location: Sheffield(Hybrid3dayson-siteperweek) ContractType: 6-MonthInitialContract IR35Status: InsideIR35 Industry: FinancialServices StartDate: ASAP Overview: Werepartneringwithaleadingfinancialservicesorganisationtorecruitahighlyexperienced SSHTechnicalSolutionDesigner foracritical,high-visibilityproject.Thisisanexcitingopportunitytocontributetoamajorstrategicinitiativefocusedon SSHkeydiscovery,management,andremediation acrossbothon-premiseinfrastructureandcloudplatforms. Thisrolerequiresdeeptechnicalexpertisein SSHkeymanagement , cryptography ,and Identity&AccessManagement(IAM) tohelpshape,design,andimplementsecureaccesssolutionsacrossacomplexhybridenvironment. KeyResponsibilities: Designandimplementscalableandsecure SSHkeymanagementsolutions acrosson-premandcloudenvironments. DriveSSHkeydiscovery,rotation,remediation,andgovernanceactivities. Leadcryptographicriskassessmentsanddevelopmitigationstrategies. Workcloselywithengineeringandoperationsteamsonsecureautomationandreconfigurationofprivilegedaccess. Definesecuremachine-to-machineandhuman-to-machineaccesscontrolswithinIAMandPAMframeworks. Collaboratewithinternalstakeholderstoensurecompliancewithsecuritystandardsandbestpractices. … Supporttheintegrationof HardwareSecurityModules(HSMs) forsecurekeystorageandcryptographicoperations. Contributetoplanningandreadinessfor Post-QuantumCryptography(PQC) andquantum-resistantencryptionapproaches. Ensurealignmentwith FIPS140-2/140-3 cryptographicmodulestandards. EssentialSkills&Experience: Proventrackrecorddesigningsecure SSHkeylifecycle managementatenterprisescale. Strongbackgroundin cryptographicriskmanagement ,includingthreatmodellingandmitigation. Hands-onexperiencein IAM and PrivilegedAccessManagement(PAM) incomplexenvironments. Deepunderstandingofsecureaccessprotocols,keyexchangemechanisms,andcryptographicprinciples. Familiaritywith HSMs ,securekeystoragestrategies,andrelatedintegrationpractices. Awarenessof NISTPQC initiativesandimplicationsforfutureencryptionstandards. Knowledgeof FIPS-validatedcryptographicmodules andtheiroperationaluseinenterprisesettings. ContractDetails: Duration: 6months(initialterm) Location: Sheffield(Hybrid3daysperweekon-site) IR35: InsideIR35 Start: ASAP HowtoApply: Ifyoureatechnicallystrong More ❯
Employment Type: Contract
Posted:

SSH Technical Solution Designer

handsworth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
VANLOQ LIMITED
JobTitle: SSHTechnicalSolutionDesigner Location: Sheffield(Hybrid3dayson-siteperweek) ContractType: 6-MonthInitialContract IR35Status: InsideIR35 Industry: FinancialServices StartDate: ASAP Overview: Werepartneringwithaleadingfinancialservicesorganisationtorecruitahighlyexperienced SSHTechnicalSolutionDesigner foracritical,high-visibilityproject.Thisisanexcitingopportunitytocontributetoamajorstrategicinitiativefocusedon SSHkeydiscovery,management,andremediation acrossbothon-premiseinfrastructureandcloudplatforms. Thisrolerequiresdeeptechnicalexpertisein SSHkeymanagement , cryptography ,and Identity&AccessManagement(IAM) tohelpshape,design,andimplementsecureaccesssolutionsacrossacomplexhybridenvironment. KeyResponsibilities: Designandimplementscalableandsecure SSHkeymanagementsolutions acrosson-premandcloudenvironments. DriveSSHkeydiscovery,rotation,remediation,andgovernanceactivities. Leadcryptographicriskassessmentsanddevelopmitigationstrategies. Workcloselywithengineeringandoperationsteamsonsecureautomationandreconfigurationofprivilegedaccess. Definesecuremachine-to-machineandhuman-to-machineaccesscontrolswithinIAMandPAMframeworks. Collaboratewithinternalstakeholderstoensurecompliancewithsecuritystandardsandbestpractices. … Supporttheintegrationof HardwareSecurityModules(HSMs) forsecurekeystorageandcryptographicoperations. Contributetoplanningandreadinessfor Post-QuantumCryptography(PQC) andquantum-resistantencryptionapproaches. Ensurealignmentwith FIPS140-2/140-3 cryptographicmodulestandards. EssentialSkills&Experience: Proventrackrecorddesigningsecure SSHkeylifecycle managementatenterprisescale. Strongbackgroundin cryptographicriskmanagement ,includingthreatmodellingandmitigation. Hands-onexperiencein IAM and PrivilegedAccessManagement(PAM) incomplexenvironments. Deepunderstandingofsecureaccessprotocols,keyexchangemechanisms,andcryptographicprinciples. Familiaritywith HSMs ,securekeystoragestrategies,andrelatedintegrationpractices. Awarenessof NISTPQC initiativesandimplicationsforfutureencryptionstandards. Knowledgeof FIPS-validatedcryptographicmodules andtheiroperationaluseinenterprisesettings. ContractDetails: Duration: 6months(initialterm) Location: Sheffield(Hybrid3daysperweekon-site) IR35: InsideIR35 Start: ASAP HowtoApply: Ifyoureatechnicallystrong More ❯
Posted:
Privileged Access Management
the UK excluding London
10th Percentile
£57,575
25th Percentile
£58,625
Median
£81,250
75th Percentile
£95,000