Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a … comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation cybersecurity … roles or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
portfolio of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture and identity & access management to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful architecture for large … guidance. Key Skills & Expertise Cybersecurity expertise in one or more domains: Security Operations, Threat & Vulnerability, IAM, Cryptography, Infrastructure, Application, Data, or Cloud. Strong understanding of cybersecurity practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & Access Management and Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged Access … Management (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
Cyber Identity Access Architect Specialist Contract Duration: 6 Months, Initially Location: Sheffield (Hybrid - 3 days in-office) Job Type: Contract We are seeking a highly skilled Cyber Identity Access Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identity and access management (IAM) solutions across a … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP IdentityManagement (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in regulated industries. … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity to More ❯