Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Thorpe, Yorkshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Shadwell, Leeds, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Manor Park, Cheshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged AccessManagement (PAM) solution as part of a wider Identity & AccessManagement transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click to find out more about our Key Information Documents. More ❯
practices, ensuring the confidentiality, integrity, and availability of data across multi-cloud environments covering Microsoft Azure and AWS. - Cloud Security Design Implementation: Design and implement identityandaccessmanagement (IAM), role-based access control (RBAC) and Privileged IdentityManagement (PIM) whilst adhering to the least privileged model. - Implement … cloud infrastructure: Develop and deploy cloud infrastructure solutions that meet the organisations requirements for scalability, security, and performance. - Cloud platform management: Implement monitor and alerting solutions for the cloud platforms to ensure optimal performance, availability, and cost-efficiency. - Infrastructure automation: Develop and maintain infrastructure-as-code (IaC) and configuration-as-Code (CaC) solutions using Bicep and PowerShell. - Monitoring More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
documentation. Document software systems, APIs, workflows, and development processes in alignment with internal style guides and standards. Create and deliver engaging PowerPoint presentations for training, stakeholder communications, andmanagement briefings. Ensure consistency, accuracy, and clarity across all written materials and presentations. Contribute to knowledge management systems and support continuous improvement in documentation practices. Review and edit … systems. Education & Experience Extensive experience in technical writing, process documentation, or software engineering-related roles. Good knowledge of cybersecurity concepts, best practices, and current industry trends. Mandatory Skills: IDAM Business Analysis . Experience: 8-10 Years . More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios
Palo Alto, Juniper, Cisco, Netskope, Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise in these areas, who are looking to take More ❯