for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
of services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our … Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible for ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities … 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment More ❯
Skills and Experience: Hands-on experience in IAM engineering and implementation in enterprise environments Proficient with tools such as SailPoint, ForgeRock, Okta, Ping Identity, CyberArk, or similar Solid understanding of identity protocols (SAML, OAuth, OpenID Connect, LDAP) Strong scripting/coding skills in PowerShell, Python, Java, or similar Apply More ❯
Entasis Partners are collaborating with a leading and global organisation that are seeking a highly skilled and experienced CyberArk Architect to lead the design and implementation of cutting-edge Privileged Access Management (PAM) solutions, with a strong emphasis on CyberArk Cloud technologies. This is a technical role that … requires strategic advisory capabilities, excellent communication skills, and the ability to engage with senior stakeholders across multiple sectors. Key Responsibilities: Design, architect, and implement CyberArk solutions with a focus on PAM Cloud and cloud-native security models Act as a trusted advisor to clients, providing expert guidance on CyberArk … delivery, working across diverse client environments (financial services, retail, public sector, etc.) Collaborate with security, infrastructure, and cloud teams to ensure secure integration of CyberArk within broader IT ecosystems Engage in board-level presentations and security briefings, translating complex technical concepts into clear business language Conduct detailed assessments of More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
identifi Global Resources
CLEARANCE IS REQUIRED** Applicants must already have this in place. We're looking for an experienced Identity Security Consultant to support a high-profile CyberArk upgrade project for a UK Government client. What You'll Be Doing: Acting as Subject Matter Expert in Identity Security , primarily focusing on CyberArk … with customer needs What You’ll Need: Proven background in IT Security , with hands-on experience in identity and access management Relevant certifications in CyberArk (CDE mandatory) Experience with enterprise security architecture – on-prem and cloud-based Strong consulting skills – from advisory workshops to solution design and implementation Knowledge … of relevant security regulations and frameworks Desirable Tech Stack: CyberArk (CDE – required ) Microsoft/Azure AD AWS CrowdStrike SentinelOne Cisco/Splunk Broadcom/Symantec This is a fully remote role, offering £550/day (Inside IR35) – a chance to work with top-tier talent on a high-impact More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Intec Select
ensuring IT Security is managed through Identity and Access Management and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and Access Management, especially through technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and Access Management … Skills and Experience: Microsoft Active Directory (Certificate Services/Federated Services) Entra ID – management via Powershell modules and Graph API/Conditional Access Policies CyberArk Privileged Access Management DNS configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync More ❯
and technologies. Background/current experience Bachelor's Degree in IT IT-related subject Extensive hands-on experience with IAM technologies (e.g., Okta, SailPoint, CyberArk) Familiarity with cloud platforms such as AWS or Azure Strong understanding of RBAC, authentication protocols (e.g., SAML, OAuth, OIDC), and directory services Automation/… and procedures Support the management and monitoring of privileged accounts and credentials Assist in the deployment and operation of PAM tools and technologies (e.g., CyberArk) Ensure PAM practices align with organisational policies and industry standards Collaborate with system administrators to enforce privileged access policies Contribute to audits and reviews More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Lorien
Identity Security Consultant - CyberArk Exp Remote Working 01-Jun-25 - 31-Jul-25 Inside of IR35 £550 per day A fantastic opportunity has arisen for a Identity Security Consultant to join our dynamic and rapidly expanding Network & Security Consultancy Practice within Computacenter. The successful candidate will report directly to … Skills and Experience You will have a strong background in general IT security with long standing security experience, with relevant accreditation's from vendors. CyberArk (CDE mandatory) The ability to implement Enterprise-wide security architectures for on-prem and cloud-based security solutions. Delivery of Advisory style consulting work More ❯