application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions andidentity/accessmanagement across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, Vulnerability Management, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, Vulnerability Management, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber security support activities (configuration more »
expertise in Microsoft cloud services, including Azure and Microsoft 365. Experience creating and implementing infrastructure policies and standards. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Experience in Azure Cloud Security, with a … strong understanding of Azure security services and configurations. Experience dealing with large global Microsoft 365 migrations/implementations after M&A. Solid stakeholder management up to c-suite If this sounds of interest, please apply for more information. more »
management or leadership role. Strong knowledge of cyber security principles, practices, and technologies, including network security, endpoint security, identityandaccessmanagement, and encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Scotland 💸 £350 - £450 per day - Outside IR35 🔵 3-6 month contract (ASAP Start) The Higher Education institution have a new IdentityandAccessManagement tool which you will be implementing workloads into. Review accounts running on workloads – i.e. Windows Service Accounts, Windows Scheduled Tasks more »
a hyperscaler (cloud providers), particularly in the public cloud universe (Compute, storage, network, Kubernetes, Database as a service, Artificial Intelligence, Identityandaccessmanagement). more »
ISC2 CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, andIDAM systems Understanding of technology risks, threat actors, and mitigation strategies, with a commitment to continuous learning Experience leading the design and architecture of cloud capabilities more »
working in collaboration with partners and internal technical teams. Techstack: Vmware vCloud, VxRail, Vmware ESXI, vSphere, Vcenter, SIEM, AntiVirus, PKI, HSM, Antivirus, Health Monitoring, IDAM,RBAC, ABAC,MFA, Sharepoint, Exchange, Skype, Switching, Routing, Firewalls. Certification in TOGAF version 9.2 or above would be highly beneficial but not essential. Due to more »
London, England, United Kingdom Hybrid / WFH Options
IO Associates
a generous benefits package. We're looking for candidates with strong Entra and Sailpoint experience who's hands on and has experience working on IDAM/IAM/PAM projects. You'll need experience with the following: Strong experience working on IDAM/IAM/PAM projects Exposure or knowledge … role supporting Enterprise Security services, products, and architecture Good understanding of the Security frameworks such as NIST, CIS Deployment and maintenance of Privileged AccessManagement (PAM) solutions such as Cyberark, Delinea etc Deployment and support of Identity Governance and Administration (IGA) solutions such as more »
a generous benefits package. We're looking for candidates with strong Entra and Sailpoint experience who's hands on and has experience working on IDAM/IAM/PAM projects. You'll need experience with the following: Strong experience working on IDAM/IAM/PAM projects Exposure or knowledge … role supporting Enterprise Security services, products, and architecture Good understanding of the Security frameworks such as NIST, CIS Deployment and maintenance of Privileged AccessManagement (PAM) solutions such as Cyberark, Delinea etc Deployment and support of Identity Governance and Administration (IGA) solutions such as more »
a generous benefits package. We're looking for candidates with strong Entra and Sailpoint experience who's hands on and has experience working on IDAM/IAM/PAM projects. You'll need experience with the following: Strong experience working on IDAM/IAM/PAM projects Exposure or knowledge … role supporting Enterprise Security services, products, and architecture Good understanding of the Security frameworks such as NIST, CIS Deployment and maintenance of Privileged AccessManagement (PAM) solutions such as Cyberark, Delinea etc Deployment and support of Identity Governance and Administration (IGA) solutions such as more »
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols andaccess control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents General connectivity/network issue management/service management experience OTHER SKILLS Strong stakeholder management skills Attention to detail in analysing large data sets Excellent interpersonal skills with strong communication skills both written and verbally more »
internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
Consultant to join their rapidly growing team, with the ideal candidate having excellent technical knowledge & understanding of areas such as Cloud Security, Application Security, IDAM, and Network Security. Key Responsibilities: Building and managing strong networks and customer relationships with senior leaders across various public sector organisations Taking responsibility for delivering more »
are currently working on a large scale digital transformation project. Key Responsibilities Managing a team of cross functional skillsets including SailPoint engineers, BA's, IDAM consultants. Production and maintenance QA and training materials Providing professional IDAM subject matter expertise Assisting with the production and maintenance of IAM governance and process … documentation Managing best practices Building the end to end Identitymanagement platform for over 10000 users. You will have: Strong SailPoint technical skills and onboarding application technologies to SailPoint IDN Experience implementing SailPoint and IdentityNow Experience configuring connectors for Active Directory, SAP, Web services/REST more »
Bristol, England, United Kingdom Hybrid / WFH Options
Computershare
flexible working .We give you a world of potentialThe Global Information Security (GIS) team is responsible for driving the development, deployment, monitoring andmanagement of information and cyber security across the Computershare businesses, globally. Through partnerships with the business units, Technology Services and other support functions, the Global … maintain strong, collaborative working relationships with global and regional technology infrastructure, application, and architecture teams.Essential Experience:Relevant experience within any of the following:IdentityAccess ManagementSIEMData Loss PreventionIDS/IPSEmail Threat PreventionEndpoint Detection and ReponseIdentity ProtectionPrivileged Password ManagementCloud SecurityRewards designed for youFlexible work to help you more »
Unix – Linux support and engineering experience Experience of an enterprise Linux, preferably Red Hat Enterprise Linux, CentOS or Oracle Linux. Recent involvement in implementing IDAM, PAM or SIEM tooling. Experience with monitoring and reporting software – Prometheus, Nagios or similar. Solid scripting experience with one of the following: Python, Shell, Bash more »