Privileged Access Management Jobs in the South East

17 of 17 Privileged Access Management Jobs in the South East

CyberArk Operations Engineer

london, south east england, united kingdom
Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged access management, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee Privileged Access Management (CyberArk) and Identity Access Management (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity access management, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Posted:

Cloud Platform Architect

Bracknell, Berkshire, United Kingdom
Wipro Technologies
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and access management (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional Access Management, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Privileged Access Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and Access Management (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and access management, including hybrid identity scenarios. Conditional Access Management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Analyst Identity & Access

Crawley, Sussex, United Kingdom
Virgin holidays
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privileged access management across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and Access Management function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the access management … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Analyst Identity & Access

Crawley, Sussex, United Kingdom
ENGINEERINGUK
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privileged access management across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and Access Management function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the access management … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security & Identity Product Manager

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
date: 23/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and Access Management (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and Privileged Access Management (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Lead

london, south east england, united kingdom
Ant International
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and Access Management) strategies, including role-based access control (RBAC) and privileged access management (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Posted:

Head of IT Security

Oxford, Oxfordshire, United Kingdom
Ellison Institute, LLC
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve Privileged Access Management (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Identity Access Management (IAM) Manager

london, south east england, united kingdom
LT Harper - Cyber Security Recruitment
Identity Access Management (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity Access Management (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, Access Management, or privileged access management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Posted:

IAM Engineer

Southampton, Hampshire, United Kingdom
Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and access management team and act as a liaison to the wider business, providing SME knowledge on identity and access management solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Engineer

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Principal Cyber Security Consultant

london, south east england, united kingdom
Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the Privileged Access Management service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privileged access management and ensure compliance with industry standards and regulations. More ❯
Posted:

OT Cyber Security Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. … You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do … Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, Privileged Access Management (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/ More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Systems Engineer (Linux)

Shoreham-by-sea, Sussex, United Kingdom
Hybrid / WFH Options
Ricardo
, ensuring swift resolution. Oversee change management processes. Manage vulnerability and patch updates to maintain security. Implement Privileged Access Management (PAM) protocols. Conduct cost analysis for cloud services and plan for obsolescence. Resolve 2nd and 3rd line support tickets efficiently. Participate in after-hours upgrades, troubleshooting … implement necessary improvements. Support other technology objectives as required. Key Competencies and Experience Extensive experience in an IT or technology department, including: Administration and management of Linux/UNIX servers. Monitoring system performance and ensuring security. Performing routine system administration tasks and maintaining logs. Providing technical support, troubleshooting, and … user assistance. Installing and optimising Linux-based applications. Managing system access, data integrity, and security protocols. Upgrading systems in line with business needs and coordinating downtime. Developing and maintaining system recovery procedures. Creating and maintaining comprehensive documentation. Technical Skills: Linux Servers: RedHat (ALMA, CentOS, Ubuntu) High-Performance Computing (HPC More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Cyber Security Analyst

london, south east england, united kingdom
Braemar
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, Privileged Access Management (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
Posted:

Senior Cyber Security Analyst

Berkshire, United Kingdom
GCS
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), Privileged Access Management (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum doe
Posted:

Senior PS Consultant

Bracknell, Berkshire, United Kingdom
Hybrid / WFH Options
Delinea
SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and … OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege Access Management (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. … Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Engineer (Security Clearance)

Reading, Oxfordshire, United Kingdom
TieTalent
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Privileged Access Management
the South East
10th Percentile
£64,125
25th Percentile
£72,188
Median
£88,750
75th Percentile
£104,688
90th Percentile
£112,375