Permanent Identity Management Jobs in the East of England

1 to 25 of 73 Permanent Identity Management Jobs in the East of England

Cyber Security Analyst - Luton

Luton, Bedfordshire, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data … UTMs. * Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. * Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. * Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. … multitask, prioritize workload, and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data More ❯
Employment Type: Permanent
Salary: £45000 - £50000/annum
Posted:

Cyber Security Engineer

Luton, England, United Kingdom
London Luton Airport
Cybersecurity team, within the LLA IT department, is responsible for information and cyber security at London Luton Airport. Responsibilities include information and cybersecurity risk management and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholder, Aena, and with airport partners, such … background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance are essential, as is a commitment to defending LLA against cyber threats and integrating security across all layers of our IT environment … communicate security intelligence. Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security. Extensive experience within a NOC/SOC environment. Desirable: IT certifications such More ❯
Posted:

Cyber Security Engineer

Luton, south east england, United Kingdom
London Luton Airport
Cybersecurity team, within the LLA IT department, is responsible for information and cyber security at London Luton Airport. Responsibilities include information and cybersecurity risk management and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholder, Aena, and with airport partners, such … background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance are essential, as is a commitment to defending LLA against cyber threats and integrating security across all layers of our IT environment … communicate security intelligence. Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security. Extensive experience within a NOC/SOC environment. Desirable: IT certifications such More ❯
Posted:

Cyber Security Engineer

luton, bedfordshire, east anglia, United Kingdom
London Luton Airport
Cybersecurity team, within the LLA IT department, is responsible for information and cyber security at London Luton Airport. Responsibilities include information and cybersecurity risk management and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholder, Aena, and with airport partners, such … background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance are essential, as is a commitment to defending LLA against cyber threats and integrating security across all layers of our IT environment … communicate security intelligence. Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security. Extensive experience within a NOC/SOC environment. Desirable: IT certifications such More ❯
Posted:

Cyber Security Engineer

Luton, south west england, United Kingdom
London Luton Airport
Cybersecurity team, within the LLA IT department, is responsible for information and cyber security at London Luton Airport. Responsibilities include information and cybersecurity risk management and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholder, Aena, and with airport partners, such … background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance are essential, as is a commitment to defending LLA against cyber threats and integrating security across all layers of our IT environment … communicate security intelligence. Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security. Extensive experience within a NOC/SOC environment. Desirable: IT certifications such More ❯
Posted:

M365 Security Design Engineer

peterborough, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

cambridge, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

stevenage, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

ipswich, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

norwich, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

basildon, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

chelmsford, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

colchester, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

bedford, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

watford, hertfordshire, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

luton, bedfordshire, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

M365 Security Design Engineer

hemel hempstead, east anglia, United Kingdom
LHH
security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged Identity Management (PIM) Provide security input and guidance on identity and access management, conditional access policies, and zero trust architecture. Conduct risk … securing M365 environments in enterprise settings. In-depth knowledge of Microsoft 365 security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, access management, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security More ❯
Posted:

Moder Workplace Solution Architect

Hatfield, Hertfordshire, South East, United Kingdom
COMPUTACENTER (UK) LIMITED
industry players youll get exposure to leading edge technologies which will enable you to advance your skills. What youll do Engaging with Senior IT Management and C-level customers, helping to shape and deliver their IT infrastructure strategy Playing an active role in the continuing growth of our Professional … Microsoft client and server infrastructure and Cloud architecture, in support of complex enterprise customer environments and digital transformation Knowledge of M365, Directory Services, Modern Management, Identity Management and Intune, with a specific focus on Microsoft Teams Unified Collaboration and Microsoft Teams Voice architectures, their integration options, interdependencies … and methods to securely deploy them Broad knowledge of Workplace solutions such as Microsoft Teams, Microsoft Teams Rooms and their associated management portals (such as Teams Admin Center and the Microsoft Teams Rooms Pro Management portal etc.) Good understanding of certified Microsoft Teams Room on Android and Microsoft More ❯
Employment Type: Permanent
Posted:

R&D OT Network Security Engineer

Stevenage, Hertfordshire, United Kingdom
Hybrid / WFH Options
GlaxoSmithKline
specify network changes, assuring continued network availability. The OT Network Security Engineer will support Site Focal Point with technical insight necessary for secure file management according to policies and have a role in new system implementation and incident response. It is key for the OT Network Security Engineer to … controls such as segmentation to isolate different parts of the OT environment, zoning to secure conduits for communication between zones and firewall management. Change Management: Implement change control processes to ensure that network changes are appropriate tested and approved without disruption to critical OT operations. Incident Management: Support … the technical response to operational technology-related incidents, ensuring rapid resolution to minimize downtime and operational disruption. Device Management: Harden devices such as switches, routers, firewalls by partnering and coordinating with the R&D OT Security Team and other key stakeholders aligned to GSK standards and proportionate to risk. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

Luton, England, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

luton, bedfordshire, east anglia, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

Luton, south east england, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

Luton, south west england, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

AWS IAM/PingID Specialist

peterborough, east anglia, United Kingdom
undisclosed
Umbrella inside IR35 Clearance required: Active Security Clearance is essential Key Skills/requirements Has designed, architecture and deployed the Ping One and AWS Identity and integrated the 2. Familiar to SAML and OAUTH/OIDC Competent in the logical configuration of Ping One and AWS Identity cloud … services. Technical Proficiency in IAM Tools: Expertise in using and configuring IAM tools such Ping Identity, and AWS Identity to manage user identities and access permissions. Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and … compliant with DCC Security standards. Authentication and Access Management: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications. Establishes and enforces policies and procedures for More ❯
Posted:

AWS IAM/PingID Specialist

ipswich, east anglia, United Kingdom
undisclosed
Umbrella inside IR35 Clearance required: Active Security Clearance is essential Key Skills/requirements Has designed, architecture and deployed the Ping One and AWS Identity and integrated the 2. Familiar to SAML and OAUTH/OIDC Competent in the logical configuration of Ping One and AWS Identity cloud … services. Technical Proficiency in IAM Tools: Expertise in using and configuring IAM tools such Ping Identity, and AWS Identity to manage user identities and access permissions. Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and … compliant with DCC Security standards. Authentication and Access Management: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications. Establishes and enforces policies and procedures for More ❯
Posted:
Identity Management
the East of England
25th Percentile
£46,250
Median
£47,500
75th Percentile
£51,563
90th Percentile
£53,125