Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This … remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active … internal teams (IT,. security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication More ❯
IAM-related processes and controls through scripting and Infrastructure-as-Code (IaC) practices. Maintain documentation, architectural diagrams, and technical artifacts related to IAM andaccess control solutions. Support audit, compliance, and governance initiatives, ensuring adherence to standards such as ISO 27001, NIST, CIS, and SOC 2. Requirements Requirements … IAM tools such as Entra ID (Azure AD), Okta, AWS IAM, GCP IAM, CyberArk, and SailPoint. In-depth understanding of identityandaccessmanagement concepts, including authentication, authorization, provisioning, de-provisioning, and lifecycle management. Strong expertise with authentication protocols and frameworks: OAuth 2.0, OIDC … and token-based access strategies. Familiarity with modern identity frameworks including Zero Trust, Identity as the Perimeter, andIdentity Federation. Experience implementing IAM controls for hybrid and multi-cloud environments, containerized workloads, and serverless applications. Knowledge of mTLS, certificate pinning, and mutual More ❯
Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and … Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerability management, and penetration testing to identify and mitigate security risks. Oversee security awareness training programs, ensuring a strong security culture is implemented and embedded … Control (RBAC) are enforced. Manage and improve Privileged AccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable experience in cybersecurity leadership roles within enterprise-sized organisations. More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations … both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end … of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. We're the UK's largest water and wastewater More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯