Job Title: PAM Governance Analyst, VP About Opportunity: Global Cybersecurity (GCS) protects State Street and its clients from the impact of cyber-attacks against systems by understanding the risks these attacks present and mitigating them through a robust, continuously evolving, cybersecurity program and control environment. Cyber Architecture & Engineering (Cyber A … E designs, architects, deploys, and continually enhances security measures for the protection of State Street's information related to its assets and customers. This PAM Governance Analyst will sit in the PAM Governance sub-function in Cyber A&E. This role is responsible for designing and maintaining automated and manual … Our work requires us to think in terms of risk and design automation and procedures that will mitigate risks and maintain compliance for all PAM standards. . Other responsibility areas are listed below. Responsibilities: Take a lead role in designing our new Compliance Platform. Write requirements, including UI requirements, test More ❯
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
london, south east england, united kingdom Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
StrongDM is driven by a clear mission: Secure Access, Zero Trust. We design products and solutions that reflect this commitment … transforming the way organizations manage privilegedaccess across their critical infrastructure. By leading with Zero Trust PrivilegedAccessManagement (PAM), we help our customers achieve secure, dynamic, and fine-grained control over access to their most sensitive resources. This focus on security has earned … know nothing about. Don't know how to kubectl now? That's fine; you will learn. Experience with PrivilegedAccessManagement - PAM (Cyberark, Teleport, Delinea), SASE and related network technologies. Experience with Kubernetes, Ansible, Terraform, CI/CD (Jenkins, Github, etc), Identity Providers (Okta, Ping, Azure AD More ❯
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and accessmanagement (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional AccessManagement, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and PrivilegedAccess Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and AccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and accessmanagement, including hybrid identity scenarios. Conditional AccessManagementMore ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
Identity & AccessManagement - Senior Analyst – KPMG Curve Base Location: Leeds based (Hybrid – 3 days per week in office) Experienced professional (kpmgcareers.co.uk) As a result of the work that we do, we require applicants to hold or be capable of obtaining UK National Security Vetting, the requirements for which … knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from: Enterprise identity, including provisioning, JML, certification, RBAC, entitlement management, policy management, data access governance, identity analytics; Customer IAM (CIAM), including registration, customer experience, authentication, multi-channel, privacy; Accessmanagement, including advanced authentication, identity federation, advanced authorisation. Privilegedaccessmanagement, including credential management, session management, privileged account discovery and privileged account inventory management, Proven track record of delivering high quality outputs, on time and meeting/exceeding expectations. Project managementMore ❯
Managing Consultant - IAM/PAM Managing Consultant - IAM/PAM Location: Global role - UK based - Manchester, London Or Cheltenham Role Purpose: NCC Group are investing in expanding our digital identity service line, to grow and expand capabilities, offerings and propositions. This new global practice will focus on three key core … competencies - Identity, Governance and Administration (IGA), PrivilegedAccessManagement (PAM), AccessManagement (AM) and Customer Identity (CIAM). The opportunity is for an IAM technical consultant with hands-on technical experience, performing as an engineer/developer to support large-scale IAM deployments, supporting the … service line leader. Summary: This is a fantastic new opportunity to join our Global IAM team. The ideal candidate will have previous IAM/PAM engineering and development experience and exposure gained from delivering complex IAM engagements, ideally across a broad client base. In addition to your technical skills, you More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Newport, Wales, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Identity & AccessManagement (IAM) Specialist Salary: Up to £57,000 + Benefits Location: Hybrid | Newport | Utilities Sector We are working with a leading organisation in the utilities sector seeking an Identity & AccessManagement (IAM) Specialist to join their Cyber Resilience Team . This role is integral … governance, and compliance . Design and deploy solutions for Single Sign-On (SSO), Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM) . Work closely with IT, HR, and security teams to streamline identity processes. Lead IAM incident response and risk mitigation initiatives. What We Are Looking … For: Proven experience in IAM, access governance, and security frameworks . Strong technical expertise in SSO, MFA, PAM, and Active Directory . Knowledge of cybersecurity best practices, compliance, and accessmanagement regulations . Experience within critical national infrastructure (CNI), utilities, or a highly regulated industry is beneficial. More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to … apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: Identity and AccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the … many other memberships and perks designed to enhance the workplace experience, your health, and wellbeing. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
DCL
Location: Edinburgh Hybrid Working Permanent Are you an experienced Identity & AccessManagement professional with a passion for designing and implementing cutting-edge security solutions? We are looking for a Lead Architect, where you'll play a key role in helping clients enhance their IAM capabilities, protect critical data … transformation. You'll leverage your expertise to provide strategic guidance on areas such as: Identity Governance & Administration (IGA) PrivilegedAccessManagement (PAM) AccessManagement (AM) Entitlement Management Directories & Authentication Solutions You will have the opportunity to work with innovative technologies and frameworks, ensuring that … businesses can securely manage access to critical assets while enabling growth. What You'll Be Doing Providing subject matter expertise in IAM and leading transformation projects for clients Developing IAM roadmaps, operating models, and governance frameworks Driving innovation by integrating IAM capabilities into wider digital transformation strategies Building and More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams … and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance PrivilegedAccessManagement (PAM) AccessManagement Customer Identity and AccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently … people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to More ❯
The team you'll be working with: We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of … competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low … Level). User Profiles, Use Cases & IDAM/PAM processes. Work with other teams to agree Implementation plans and effort. Appropriate metrics, and processes to achieve client objectives and targets. Enact: The setup of test, development and production IDAM & PAM environments. IDAM & PAM technology implementation & configurations. Robust practices for the More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street time type Full time posted on Posted 2 Days Ago job requisition id R010049 AVEVA is creating software trusted by over 90% of … leading industrial companies. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the … IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication, and the full user lifecycle, while overseeing identity governance and privilegedaccess management. Act as a subject-matter More ❯
Robert Half is collaborating with a leading global consulting firm to recruit a PAM Engineer specialising in Safeguard PrivilegedAccessManagement (PAM) solutions. You will play a key role in supporting a newly established team in delivering a large-scale, impactful programme spanning two years. This hybrid … of a global consulting initiative, with the opportunity to directly influence the success of future privilegedaccessmanagement strategies. Job Title : PAM Engineer – Safeguard Expertise Company : Robert Half in collaboration with a leading Global Consulting Firm Contract Type : Initial 6-month Interim Contract (with a possibility to … expert support and engineering solutions within Safeguard PAM. Offer valuable consulting insights, contributing to project scoping and planning. Troubleshoot and address challenges within the PAM lifecycle. Collaborate across teams to implement innovative solutions for privilegedaccess management. Identify future opportunities for growth and project expansion. What We're More ❯
Robert Half is collaborating with a leading global consulting firm to recruit a PAM Engineer specialising in Safeguard PrivilegedAccessManagement (PAM) solutions. You will play a key role in supporting a newly established team in delivering a large-scale, impactful programme spanning two years. This hybrid … of a global consulting initiative, with the opportunity to directly influence the success of future privilegedaccessmanagement strategies. Job Title : PAM Engineer - Safeguard Expertise Company : Robert Half in collaboration with a leading Global Consulting Firm Contract Type : Initial 6-month Interim Contract (with a possibility to … expert support and engineering solutions within Safeguard PAM. Offer valuable consulting insights, contributing to project scoping and planning. Troubleshoot and address challenges within the PAM life cycle. Collaborate across teams to implement innovative solutions for privilegedaccess management. Identify future opportunities for growth and project expansion. What We More ❯
delivery. Clients will be across multiple different industries, providing a real variety in project work. The suitable candidate will hold EITHER CDE Certification within Privileged Cloud or the Guardian Cert. key responsibilities are as follows: Providing subject matter expertise in Identity and AccessManagement (IAM), specifically in … CyberArk Leading transformations in areas such as identity governance, privilegedaccessmanagement, accessmanagement and customer identity accessmanagement Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Description The Identity & AccessManagement (IAM) team, sitting within the Cyber Security function, ensures that access for all Motability Operations (MO) employees and customers is correct, appropriate, and secure. Within the IAM function: The IDaaS team is responsible for customer identities, SSO, and MFA. The IGA team … manages internal employee accessmanagement and governance. This role leads the IGA team and reports into the Cyber Security Technical Manager. As IGA Team Lead, you will manage the identity governance function, ensuring robust access governance, compliance, and security policies across the organisation. You will work closely … and key business stakeholders. Knowledge of industry frameworks such as ISO 27001, NIST, or other security governance models. PrivilegedAccessManagement (PAM) experience. Benefits Motability Operations is a unique organisation, virtually one of a kind. We combine a strong sense of purpose with a real commercial edge More ❯
Employment Type: Permanent, Part Time, Work From Home
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
all about Kubernetes (K8s) where a DevOps mind and experience is going to be paramount. You will get involved in the design, setup and management of our K8s clusters across various datacentres. We are building a value-add on-prem, bare-metal K8s platform (with the option to expand … Working in a DevOps approach that involves concepts of code review, automated testing and release pipelines. Work in an environment that is protected by PAM (PrivilegedAccessManagement). Who are we looking for? K8s (must; administration as well as best-practise for usage), Calico Enterprise (desirable … a DevOps approach that involves concepts of code review, automated testing and release pipelines. Accustomed to work in an environment that is protected by PAM (PrivilegedAccessManagement). What we offer you: Private pension plan - 10% of base salary contribution by Berenberg. Private Health Insurance. Enhanced More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccess Management. (PAM) Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to address More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯