london, south east england, united kingdom Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and accessmanagement (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional AccessManagement, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and PrivilegedAccess Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and AccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and accessmanagement, including hybrid identity scenarios. Conditional AccessManagementMore ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
date: 23/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccessManagement (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
london, south east england, united kingdom Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. … You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do … Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/ More ❯
Shoreham-by-sea, Sussex, United Kingdom Hybrid / WFH Options
Ricardo
, ensuring swift resolution. Oversee change management processes. Manage vulnerability and patch updates to maintain security. Implement PrivilegedAccessManagement (PAM) protocols. Conduct cost analysis for cloud services and plan for obsolescence. Resolve 2nd and 3rd line support tickets efficiently. Participate in after-hours upgrades, troubleshooting … implement necessary improvements. Support other technology objectives as required. Key Competencies and Experience Extensive experience in an IT or technology department, including: Administration and management of Linux/UNIX servers. Monitoring system performance and ensuring security. Performing routine system administration tasks and maintaining logs. Providing technical support, troubleshooting, and … user assistance. Installing and optimising Linux-based applications. Managing system access, data integrity, and security protocols. Upgrading systems in line with business needs and coordinating downtime. Developing and maintaining system recovery procedures. Creating and maintaining comprehensive documentation. Technical Skills: Linux Servers: RedHat (ALMA, CentOS, Ubuntu) High-Performance Computing (HPC More ❯
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, PrivilegedAccessManagement (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), PrivilegedAccessManagement (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
Delinea
SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and … OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege AccessManagement (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. … Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS More ❯
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯