Social network you want to login/join with: CyberArk PAM Security Architect (Guardian Certified), slough col-narrow-left Client: Wipro Location: slough, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: The company … services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing PrivilegedAccessManagement (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible More ❯
Social network you want to login/join with: CyberArk PAM Security Architect (Guardian Certified), reading col-narrow-left Client: Wipro Location: reading, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: The company … services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing PrivilegedAccessManagement (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible More ❯
Social network you want to login/join with: CyberArk PAM Security Architect (Guardian Certified), high wycombe col-narrow-left Client: Wipro Location: high wycombe, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description … services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing PrivilegedAccessManagement (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible More ❯
Social network you want to login/join with: CyberArk PAM Security Architect (Guardian Certified), oxford district col-narrow-left Client: Wipro Location: oxford district, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description … services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing PrivilegedAccessManagement (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible More ❯
services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our team. The ideal … candidate will have extensive experience in designing, implementing, and managing PrivilegedAccessManagement (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible … ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities: 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privilegedaccessmanagementMore ❯
third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry … administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred … project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and More ❯
third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry … administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred … project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and More ❯
third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry … administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred … project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and More ❯
third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry … administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred … project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and More ❯
Reading, England, United Kingdom Hybrid / WFH Options
idibu
As a Security & Identity Product Manager , you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM) , Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you’ll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA) , and PrivilegedAccessManagement (PAM) . Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
Robert Half Technology are assisting a global retail organisation to recruit a IAM Consultant/Engineer to design, implement, and maintain Identity and AccessManagement solutions using One Identity Manager and Safeguard . You will play a key role in managing identity life cycles, role-based access controls, and privilegedaccess using One Identity Manager and Safeguard, while working closely with cross-functional teams to align IAM strategies with business objectives and regulatory requirements. Role Design & Implementation : Architect and deploy IAM solutions with One Identity Manager , focusing on user provisioning, de-provisioning, role-based … experience working with One Identity Manager in an enterprise environment. Hands-on experience with One Identity Safeguard for PrivilegedAccessManagement (PAM). Strong understanding of IAM principles, role-based access control, identity life cycle, and governance. Proven ability to configure and customise One Identity Manager More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements … enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements … enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements … enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements … enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
are seeking a highly skilled and experienced CyberArk Architect to lead the design and implementation of cutting-edge PrivilegedAccessManagement (PAM) solutions, with a strong emphasis on CyberArk Cloud technologies. This is a technical role that also requires strategic advisory capabilities, excellent communication skills, and the … ability to engage with senior stakeholders across multiple sectors. Key Responsibilities: Design, architect, and implement CyberArk solutions with a focus on PAM Cloud and cloud-native security models Act as a trusted advisor to clients, providing expert guidance on CyberArk best practices, cloud security strategy, and PAM roadmaps Lead end … to-end PAM projects from requirements gathering to delivery, working across diverse client environments (financial services, retail, public sector, etc.) Collaborate with security, infrastructure, and cloud teams to ensure secure integration of CyberArk within broader IT ecosystems Engage in board-level presentations and security briefings, translating complex technical concepts into More ❯
Social network you want to login/join with: Identity and AccessManagement Engineer, Slough Client: Bonhill Partners Location: Slough, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 3 Posted: 06.06.2025 Expiry Date: 21.07.2025 Job Description: Salary: Up to £85k + bonus Location: Bank … days) Client: Large Investment Bank Responsibilities/Requirements: Develop and implement IAM strategies and solutions that align with organisational goals. Design role-based access control (RBAC), single sign-on (SSO), and multi-factor authentication (MFA) frameworks. Integrate IAM systems with enterprise applications, cloud environments, and third-party services. Define … ForgeRock, SailPoint, CyberArk, or similar platforms. Manage identity federation protocols like SAML, OAuth, OpenID Connect, and LDAP. Oversee PrivilegedAccessManagement (PAM) implementations. #J-18808-Ljbffr More ❯
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) PrivilegedAccessManagement (PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … and compliance stakeholders to align IAM initiatives with business objectives and regulatory requirements. Skill sExtensive experience in Cyber Security, with a focus on Identity & AccessManagement .Proven expertise with leading IAM technologies such as :IGA: SailPoint, Saviynt, Oracle Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta … with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex enterprise environments .Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences . More ❯
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing More ❯
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing More ❯
We're partnering with a leading organisation who are on the lookout for a skilled Identity and AccessManagement (IAM) Specialist to take the lead in safeguarding access to critical systems and services. If you know your SSO from your MFA, and you're passionate about building … across the organisation Driving the implementation of Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Managing PrivilegedAccessManagement (PAM) to ensure the right people have the right access at the right time Making sure authentication and authorisation processes are as strong as they … to make compliance a no-brainer What we’re looking for: Solid experience delivering IAM solutions in complex environments Practical knowledge of SSO, MFA, PAM, and access governance Strong grasp of access control models and authentication protocols Experience in or with the public sector? Even better This is More ❯
in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and … reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data … such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO More ❯
in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and … reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data … such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO More ❯
Senior Business Analyst – (IAM) & (PAM), Slough Client: [Client details not provided] Location: Slough, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 3 Posted: 04.06.2025 Expiry Date: 19.07.2025 Job Description: Senior Business Analyst – (IAM) & (PAM) Location: Glasgow or Newcastle (onsite meetings required) Join a high-impact cybersecurity … This critical contract role involves delivering technical and business change within Identity & AccessManagement (IAM) and PrivilegedAccessManagement (PAM) . Key Responsibilities: Lead end-to-end business analysis for IAM & PAM projects. Drive discovery, requirements gathering, and implementation phases. Collaborate with cross-functional teams … solutions. Support and mentor other Business Analysts. Facilitate workshops, analyze data, and map business processes. What We’re Looking For: Proven experience in IAM & PAM (e.g., CyberArk, SailPoint, Saviynt, Entra/AD). Background in Financial Services or other regulated industries. Strong track record across the full project lifecycle. Proficiency More ❯
Senior Business Analyst – (IAM) & (PAM) Location: Glasgow or Newcastle (Onsite Meetings Required) Join a High-Impact Cyber Security Programme Our client is embarking on a major transformation journey and is looking for a Senior Business Analyst to play a pivotal role in our Cyber Security Programme . This is a … critical contract role focused on delivering technical and business change across Identity & AccessManagement (IAM) and PrivilegedAccessManagement (PAM) . Key Responsibilities: Lead end-to-end business analysis across IAM & PAM projects. Drive discovery, requirements gathering, and implementation phases. Collaborate with cross-functional teams … solutions. Support and mentor other Business Analysts. Facilitate workshops, analyze data, and map business processes. What We’re Looking For: Proven experience in IAM & PAM (e.g., CyberArk, SailPoint, Saviynt, Entra/AD). Background in Financial Services or other regulated industries. Strong track record across the full project lifecycle. Proficiency More ❯