Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
is probably safe to say they are here to stay. Due to continuing expansion, we now have an exciting opening for an IAM (IdentityAccessManagement) Security Consultant to join an already successful and growing team. We would the opportunity to speak with candidates … IAM solutions to a wide audience and different sizes organisations using at least two of the following vendors: Okta, CyberArk, ForgeRock, OneLogin, Ping Identity, Auth0, SailPoint, BeyondTrust or another well known vendor. The ability to demonstrate requirement gathering from clients, making assessments including audit work, identifying any risks … and looking to reduce threats, further research & analysis work, looking at the most beneficial accessand then finally designing + implementing IAM solutions for the client. We are looking for credible candidates that have undertaken the whole project. Sound working knowledge of most areas within IAM such as more »
enterprise security architecture framework, roadmap, and strategy. Design and implement security solutions and controls for IT systems and networks, such as firewalls, encryption, identityandaccessmanagement, vulnerability management, and incident response. Conduct security assessments and audits to identify and remediate security … participate in security projects and initiatives and ensure compliance with security policies and regulations. Prepare and deliver security reports and presentations to senior managementand stakeholders. Knowledge of threat modelling techniques such as STRIDE. Experience and Qualifications Required Bachelor's degree in computer science, information systems, cybersecurity, or … are preferred. Strong knowledge and skills in security architecture, design, and implementation. Experience with various security technologies and tools, such as firewalls, encryption, identityandaccessmanagement, vulnerability management, and incident response. Ability to analyse and solve complex security problems and challenges. more »
user-friendly Modern Workplace environment. Implement and manage Microsoft Intune for mobile device and application management. Configure and manage Azure Active Directory for IdentityandAccess management. Collaborate with cross-functional teams to ensure the successful adoption and utilisation of Modern Workplace technologies. Provide deep technical … Microsoft 365 Certified: Enterprise Administrator Expert or Microsoft 365 Certified: Modern Desktop Administrator Associate Monitoring/instrumentation: implement metrics in Prometheus, Grafana, log managementand related systems. Please submit your cv if you want to be part of a greenfield Cloud transformation programme. more »
a hyperscaler (cloud providers), particularly in the public cloud universe (Compute, storage, network, Kubernetes, Database as a service, Artificial Intelligence, Identityandaccessmanagement). more »
Job Title: Head of IdentityandAccessManagement (IAM) Location: London Salary: £100,000 - £135,000 Bonus Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the … navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of IdentityandAccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and … aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of IAM systems, including identity provisioning, authentication, authorization, andaccess controls. Oversees the operation of IAM technologies, ensuring system reliability, scalability, and performance. Establishes and enforces IAM policies, standards, and procedures to mitigate more »
Linux Engineer, IdM, IDAM, PAM, SIEM, Bash, Puppet, Ansible, Python, DNS, LAN, WAN, F5 Linux Engineer Permanent - up to £120,000 bonus/benefits Hybrid (1 day a week onsite in London) Sponsorship not available The role A Leading leading equity firm is looking for a Linux Engineer to join … and performance of the Linux-based infrastructure. Technical skills: Linux proficiency - Red Hat Enterprise Linux, CentOS, Linux Kernel Must have recent involvement in implementing IDAM, PAM or SIEM tooling At least one scripting/programming language, i.e. Bash, Ansible, Puppet, python Basic Networking such as TCP/IP, DNS, LAN …/WAN Experience managing full lifecycle, from design to build stage Linux Engineer, IdM, IDAM, PAM, SIEM, Bash, Puppet, Ansible, Python, DNS, LAN, WAN, F5 McGregor Boyall is an equal opportunity employer and do not discriminate on any grounds. more »
involves a significant amount of stakeholder engagement both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover … and advising on any appropriate management action (Required) Possess complex delivery and business change adoption experience Experience of IdentityandAccessManagement governance environments, challenges, and best practices Implemented large scale Identity Governance and Administration (IGA), IdentityAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password management, audit and compliance, single sign more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
Technologies: SAP Netweaver Data ManagementIdentityAccessManagement Worlflow Content Management Service Orientated Enterprise Integration Liferay JavaScipt Oracle Weblogic Jenkins Sparx Excellent contract opportunity for a Technical Architect to join an International client in the Pharmaceutical sector on an initial … workflow solutions, enterprise integration, SDLC technical standards & SDLC tools - configuration and management. Relevant professional expertise: (eg SAP (ERP, Basis, Netweaver, Portal) Master Data Management, IdentityAccessManagement, Workflow/Case management, Portal/Content Managementand Unified Communications more »
an antiquated finance set up to an MS Dynamics 365 Finance & Operations solution in a complex business environment will require highly credible stakeholder managementand collaboration skills. The Solution Architect will deliver the solution design blueprints & architecture delivery plans for the programme, as well as for the integrated … sync & async) & technology Experienced presenting solutions options (including costs/benefit/risk trade-offs) to senior leadership team, working with technical program management, product managementand technical business analysts to deliver a multi-milestone transformational programme. Any of the following would be desirable but not … experience with SAP Concur Microsoft Certified: Dynamics 365: Finance and Operations Apps Solution Architect Microsoft Certified: Dynamics 365 Finance Functional Consultant Associate Customer Identity & AccessManagement (CIAM) design & experience, including: External identitymanagement solutions (SaaS platforms) Experience with Role-based more »
Architect IAM London/Hybrid Contract - 6 Months Competitive Daily Rate Our client needs an experience IAM Data Architect to work an innovative AccessManagement Programme for a Financial Service organisation. You will lead on Data Architect designs to create build builds data models to fulfil … the strategic data needs of the AccessManagement Programme in accordance with the policies and standards set out by the Chief Data Office. Must have strong recent IdentityandAccessManagement data technologies project experience within a large Big Data environment. Must have experience in designing, building and delivery of data more »
have 12 Experience in Architecting Data Analytics Platforms like Cloud Big Data EDW s Must have 5 years in Data Governance Solutions Metadata Management Data Quality Data Lineage Data Catalogue Must have 5 solution experience in Reporting Visulization Platform Modernization Canned Self Service and Real Time Reporting Must … Data technologies e g Oracle SQL Server Postgres Spark Hadoop other Open Source Must have experience in Data Security Solutions IdentityandAccessManagementand Data Security AccessManagement Must have 3 years experience of DevOps CI CD Minimum At … Interact with End users clients Worked in Onsite Offshore model Demonstrated excellent communication presentation and problem-solving skills Experience in project governance and enterprise customer management Please send your resumes to surya.prakash@s3staff.com for immediate consideration. Send me alerts about jobs like this. Please enter your email address more »
strong technical background, with direct experience implementing, integrating and planning people facing systems similar to ours: this includes our HRIS , identityandaccessmanagement systems (we use Okta), service platforms (we use ServiceNow), workplace communication and office platforms (we use Slack and GSuite) and … for investment, and connect our workplace technology strategy to our overall business strategy; Proven experience in a leadership role overseeing workplace technology and service management teams, having worked in organisations of a similar size or scale with a track record of changing, building and developing high-performing teams … a long term strategy and roadmap for our HRIS and all the systems that depend on it - from our financial systems to payroll andidentitymanagement systems, learning and development systems and communication platforms; Build a strong understanding of how our systems work together and are more »
team to focus on learning; partner and collaborate with other teams. Qualifications Required Qualifications (RQs) 7+ years of technology-related sales or account management experience AND leading sales organization OR Bachelors Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years of technology-related … sales or account management experience OR equivalent experience Preferred Qualifications 9+ years of technology-related sales or account management experience OR Bachelors Degree in IT, or related field AND 8+ years of technology-related sales or account management experience OR Masters Degree in Business … security technologies - Threat protection (Endpoint security, E-mail security, Incident Response , etc.), Kill Chain, CNAPP, SIEM ., Multi-Cloud Security, IdentityandAccessmanagement, Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color more »
Job Description We are looking for a Senior Oracle Identity Engineer for one of our public sector clients . Rate: up to £700 per day Duration: 12 months Inside … IR35 Location: National, hybrid working, mostly remote As an Oracle Identity Engineer you will have experience with: Oracle IdentityandAccessManagement 11 Oracle Fusion Middleware Oracle EBS (E-business Suite) SSO (single sign on) Oracle Access Gate and Web … Gate Oracle DB 12, 19c Installation, migration, patching, upgrading, integration, and federation with other ID providers Life Cycle Management (LCM) tools for automation and installation If you are interested regarding this Senior Oracle Identity Engineer role please apply here for the full details. Senior Oracle Identitymore »
building an outstanding alternative to university and corporate training via professional apprenticeships View company page We re on a mission to provide equitable access to economic opportunity, for everyone. We close critical skill gaps in the workforce through a new kind of apprenticeship that combines work and learning. … Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment IdentityandAccessManagement, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor … company-wide wellbeing days Health & Wellness - private medical Insurance with Bupa, a medical cashback scheme, life insurance, gym membership & wellness resources through Gympass andaccess to Spill - all-in-one mental health support Hybrid & remote work offering - with weekly or monthly visits to the London office and the more »
investment banks & hedge funds, aerospace and defense, life and health sciences, semiconductor, telecommunications, and advanced manufacturing companies. Time series and vector data analytics andmanagement are at the heart of our products, independently benchmarked as the fastest on the market. They help our customers process data at unmatched … Terraform, Ansible, or CloudFormation. Familiarity with containerization technologies such as Docker and Kubernetes. Strong understanding of cloud security principles including identityandaccessmanagement, data encryption, network security, and applicable compliance frameworks. Knowledge of security assessment tools and techniques such as vulnerability scanning and … and the labour market. Individually tailored training and skills development. Private healthcare package including coverage for partners and children. Employee Assistance Programme providing access to mental health support. Generous maternity and paternity package. "KX For Good" Program: we offer our team members Volunteer Days to actively participate in more »
risk assessments and vulnerability scans to identify and mitigate potential security threats and vulnerabilities. Implement and manage security controls to protect against unauthorized access, data breaches, and other security incidents. Monitor security logs and alerts to detect and respond to security incidents in a timely manner. Provide guidance … Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent certification preferred. Minimum of [X] years of experience in information security management roles. Strong knowledge of information security principles, standards, and best practices. Experience with ITIL (Information Technology Infrastructure Library) and COBIT (Control Objectives for Information … and Related Technologies) frameworks. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, encryption, andidentity/accessmanagement solutions. Excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to technical and non-technical more »
A global investment management company located in the City of London is looking for an Information Security Manager to join their Security Team on a permanent basis. As a Cloud Security and Risk Lead, you ll have the opportunity to lead technical resources to ensure that technical security … the risk appetite position. Responsibilities: Ensure the security of the environments that host business application platforms, as well as networks that connect andaccess them. Contribute to the development of architecture blueprints and system designs by conducting research, reviewing, and collaborating. Aid in the automation of security at … API Gateways etc.) Threat & Incident Management (SOC, SIEM, SOAR, Threat Intelligence, etc) Penetration Testing methodologies and toolsets Data Security (DLP, DRM, etc) IDAM (FIAM, SSO, etc). Experience of Azure AD would be advantageous Mobile Security (EMM, MAM, MDM etc) Cryptography (including HSM, Key Management, andmore »