to help enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identity and accessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory compliance, and … the ability to clearly communicate complex technical concepts are essential. What you'll be doing Lead enterprise-wide IAM standardization efforts, including identity lifecycle management, access governance, and policy enforcement across global regions. Support enterprise applications onboarding into Azure Entra ID, including SSO, conditional access, and role-based access control (RBAC). Enhance privilegedaccessmanagement and implement scalable monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. Design, implement, and continuously improve Roku's Zero Trust Architecture, aligning with NIST SP 800-207 and SP 1800-35 guidance. Collaborate with IT, Networking, and Security teams to troubleshoot identity-related issues and support global infrastructure initiatives. Identify and More ❯
The Cybersecurity team, within the IT department, is responsible for information and Cybersecurity. Responsibilities include information and cybersecurity risk management, and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholders, and partners, such as retailers, ground handlers, as well as suppliers, to ensure a joined-up approach to information and cyber … will have a strong technical background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance is essential, as is a commitment to defending against cyber threats and integrating security across all layers of our IT environment to protect organisational data and technology. … to produce reports and communicate security intelligence. * Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. * Knowledge of Cloud computing, computer network defence, identity management, privilegedaccessmanagement, incident management and network security. * Extensive experience within a NOC/SOC environment. Desirable * IT certifications such as CompTIA A+, Network+ * Cyber More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
Enterprise Information Technology Services Location: London, Hybrid Main Purpose: Identity is a core security component in any modern IT estate, ensuring the right people, machines, and software components have access to the correct resources at the appropriate time, while preventing unauthorised access and maintaining a secure environment. The Identity and Access Manager role heads up this crucial … security function within the Cyber Security Team and will Lead strategic development and operational management of identity services. Develop and manage identity and access related tooling and processes to ensure mature, efficient, and secure working practices. Be an advocate for best practices in Identity and Access Management. Ensure compliance and risk management standards are met. Main … Responsibilities: Lead the Identity and Access function within the Cyber Security team, including: o AccessManagement o Identity Governance and Administration o Role Based Access Control o PrivilegedAccessManagement o Identity Threat Detection and Response o Access Certification o Identity Data Management & Analytics Ensure that only authorised identities have accessMore ❯
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or insurance sector. The IT Operational … platforms. • Manage identity and accessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … management best practices. • Identity & AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking & Infrastructure Security: Understanding of firewalls More ❯
Netskope SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration management and continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement … and supporting Identity and AccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of PrivilegedAccessManagement (PAM) solutions, including policy definition, Just-In-Time (JIT) access implementation, and proactive monitoring of privileged activity for security threats Our Infrastructure Stack: Operating Systems: Windows, macOS, ChromeOS, Linux More ❯
UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within PrivilegedAccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged account security … and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD pipelines and DevSecOps practices. Experience with Cloud security More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … platforms. Manage identity and accessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … management best practices. Identity & AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … platforms. Manage identity and accessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … management best practices. Identity & AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls More ❯
areas are listed below. Responsibilities: Strategic Leadership: Develop and lead the global Infrastructure AccessManagement strategy aligned with enterprise cybersecurity, IAM, and risk management objectives. Represent PAM in internal governance forums and external regulatory engagements. Program Ownership: Own the end-to-end lifecycle of privileged and infrastructure access, including onboarding, provisioning, session management, monitoring … and deprovisioning. Drive modernization and automation initiatives, including vaulting, just-in-time (JIT) access, and zero trust implementations. Technology & Architecture: Oversee the architecture, engineering, and operations of PAM platforms. Partner with infrastructure, cloud, and DevSecOps teams to integrate PAM into hybrid and cloud-native environments. Risk & Compliance: Ensure alignment with global regulatory requirements (e.g., FFIEC, EBA, MAS, APRA, etc. … and internal policies .Manage audit readiness, response, and remediation related to privileged access. People & Stakeholder Management: Lead and develop a high-performing, globally distributed PAM team. Partner with application owners, IT operations, risk, and compliance to embed PAM controls across the enterprise. Metrics & Continuous Improvement: Define and track KPIs and KRIs for PAM effectiveness and risk reduction. Continuously More ❯
PAM Test Analyst Sheffield - 3 days in the office mandatory Until 30/11/2025 £350-395 per day - Umbrella only Would you like to join a global leader in consulting, technology services and digital transformation? Our client is at the forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and … platforms. Essential: Proven experience in software testing, preferably within PrivilegedAccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI … . Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD pipelines and DevSecOps practices. Experience with Cloud security testing (AWS, Azure, or Google Cloud). Certifications such as ISTQB, CISSP, CISM, or More ❯
The team you'll be working with: IDAM Engineer JD We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the worlds largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of the worlds most recognised Security Technology providers. We … solutions and platforms. Leveraging core competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes Identify; Client needs and drivers for IDAM & PAM technology adoption Technical Security requirements, functional & non-functional Gaps, issues and failings in client Security designs and configurations. Define; IDAM & PAM designs (High Level & Low Level) User Profiles, Use Cases … IDAM/PAM processes Work with other teams to agree Implementation plans and effort Appropriate; metrics, and processes to achieve client objectives and targets. Enact; The setup of test, development and production IDAM & PAM environments IDAM & PAM technology implementation & configurations Robust practices for the protection of Client systems Oversee, evaluate, and support; Discovery and audits, for the extraction of findings More ❯
Telford, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Job Title: PAM Consultant- SC Cleared Location: Hybrid – Stafford Park 1, Telford TF3 3BD (3 days/week Onsite) Duration: 3months+ Description We are seeking a highly experienced PrivilegedAccessManagement (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control … mechanisms, identifying risks associated with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key Responsibilities: • Conduct comprehensive assessments of internal infrastructure to identify privilegedaccess risks and gaps. • Analyze current access provisioning models, especially where elevated permissions (e.g., root, Admin access) are broadly granted. • Analyze existing … access control models and recommend enhancements using RBAC, ABAC, and least privilege principles. • Design PAM architectures that support secure delegation of access across diverse platforms. • Design and recommend PAM strategies that enforce least privilege, improve auditability, and enhance operational security. • Evaluate and compare PAM solutions (e.g., CyberArk, BeyondTrust, Delinea) based on technical fit, scalability, and integration capabilities. • Document More ❯
IAM SME Financial/Commodities Sector London Hybrid Permanent - market rate This is an exciting opportunity for a senior IAM focused professional to shape the future of identity and accessmanagement for a large dynamic organisation within the commodities sector. You ll work at the forefront of IAM technologies, ensuring secure access to critical systems and applications … days on-site per week Office Location : Mayfair, London Responsibilities Design, implement, and manage IAM solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC). Configure and maintain IAM tools, with a focus on Entra ID (Azure AD) and on-premises Active Directory. Collaborate with IT and security teams to enforce security … security policies, particularly in financial services or commodities. Troubleshoot and resolve IAM-related issues, including authentication and access failures. Implement and manage PrivilegedAccessManagement (PAM) solutions to protect sensitive systems. Stay current with IAM technologies, trends, and vulnerabilities, and maintain comprehensive documentation. Required Experience Minimum of 5 years experience in identity and accessmanagementMore ❯
IAM SME | Financial/Commodities Sector | London | Hybrid | Permanent - market rate This is an exciting opportunity for a senior IAM focused professional to shape the future of identity and accessmanagement for a large dynamic organisation within the commodities sector. You’ll work at the forefront of IAM technologies, ensuring secure access to critical systems and applications … days on-site per week Office Location : Mayfair, London Responsibilities Design, implement, and manage IAM solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC). Configure and maintain IAM tools, with a focus on Entra ID (Azure AD) and on-premises Active Directory. Collaborate with IT and security teams to enforce security … security policies, particularly in financial services or commodities. Troubleshoot and resolve IAM-related issues, including authentication and access failures. Implement and manage PrivilegedAccessManagement (PAM) solutions to protect sensitive systems. Stay current with IAM technologies, trends, and vulnerabilities, and maintain comprehensive documentation. Required Experience Minimum of 5 years experience in identity and accessmanagementMore ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
INTEC SELECT LIMITED
operation, development and support of all applications across all areas of the business. You will lead and be collectively responsible for ensuring IT Security is managed through Identity and AccessManagement and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and AccessManagement, especially through technical workshops and … coaching sessions Daily management and maintenance of the Authentication, CyberArk and AccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. Proactively initiate investigations for improvements for standard operating processes and procedures, utilising the current owned/licensed tools available, to evidence and escalate issues to the management … technical delivery, supporting the programme and project managers delivering specialist tasks to time and cost. Essential Skills and Experience: Microsoft Active Directory (Certificate Services/Federated Services) Entra ID – management via Powershell modules and Graph API/Conditional Access Policies CyberArk PrivilegedAccessManagement DNS configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Accessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Accessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Cyber Security Specialist (PAM/IAM Solutions/Application Control - whitelisting/blacklisting) Location: Dartford Salary: Competitive base, car/travel allowance + benefits Job Type: Permanent Be part of transforming the construction industry, be part of our Cyber Security team. Are you able to support comprehensive Cyber Security programs whilst optimising the operational performance and reliability of Infrastructure technologies … Focusedon day-to-day operational tasks and maintenanceof core Cyber Security infrastructure service platforms, including but not limited to: Manage and administer the PrivilegedAccessManagement (PAM) platform, including user access, permissions, audits and configurations. Collaborate with IT and business teams to integrate and expand PAM controls into existing systems and applications. Manage and administer the … enterprise systems and cloud solutions? The join our Cyber Security team and showcase your knowledge of regulation standards, compliance and governance. Essential experience includes: Experience in configuring and managing PAM solutions in enterprise environments. Familiarity with identity and accessmanagement (IAM) principles , including role-based access control (RBAC) and least privilege. Strong understanding of Application Control concepts More ❯
Information Security Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Security Manager - Identity & Access Engineering Company: Royal London Group Job Title: Security Manager - Identity Engineering Contract Type: Permanent Location: Edinburgh or Alderley Edge Working style: Hybrid 50% home/office based Closing date: 7th July 2025 We are looking to recruit … an exciting role within our Security & Resilience function. This is an operationally focussed role which involves maintaining a high benchmark to assure colleagues only have appropriate access for their role, minimising the potential damage from cybersecurity incidents. The successful candidate shall be able to work with minimal guidance in the Identity & AccessManagement field and will take … accountability for the day-to-day support of Identity tooling. The role has direct people management accountabilities of a small team of Identity Engineers and will provide the day-to-day task management for the team. The role will assist in developing the skills within the team to ensure expertise are in place to operate Identity ManagementMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with … ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior Cyber Security Analyst Contextualise OT Specific Threats: • Understand the Operational Technology … user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/VPN, IDS/IPS, etc. More ❯
a highly skilled CyberArk Engineer with hands-on experience in deploying, integrating, troubleshooting, and managing CyberArk Privilege cloud solutions. The candidate should have a deep understanding of cybersecurity principles, privilegedaccessmanagement, and hands-on experience with CyberArk's suite of tools. Key Responsibilities: Research, validate, and deploy solutions meeting security and business needs. Process and analyze … for CyberArk. Assist with incident response and system availability issues. Act as an escalation point for CyberArk issues and coordinate troubleshooting with vendors. Experience & Skills: Experience with CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, DR). Strong understanding of integrating CyberArk with other security tools and infrastructure. Experience with cloud More ❯
designing and implementing identity solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No one day is the same … non-technical audiences. Desirable Experience of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC … using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and More ❯
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯