to deliver real results to their clients. Cybersecurity is one of the areas which they have identified for tremendous investment and growth. Their Identity & AccessManagement team focuses on helping their clients design, implement and operate effective access controls that protect against threats, support business objectives, and … enable growth. They support client leadership teams to define their Identity and AccessManagement (IDAM) strategy, roadmap; they define operating and governance models to make IDAM a sustainable capability which responds to evolving business priorities; they deliver complex multi-year transformation programmes both uplifting clients’ IDAM capability, and … to critical assets by focusing on areas like AccessManagement (AM), Identity Governance & Administration (IGA), PrivilegedAccessManagement (PAM), Entitlement Management and Directories. In joining, you’ll be a part of a team that values technical and business acumen and provides training and more »
PrivilegedAccessManagement ConsultantLocation: England or ScotlandAccenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these services. With our thought leadership and culture of innovation, we apply industry … following skills and experience are essential for this role:Essential skills:Five + years of experienceUnderstand of the privilegedaccessmanagement (PAM) suite and the best practices, with experience of having a PAM solution implementedHave work experience in leading vendors e.g. CyberArk/Delinea/BeyondTrust and … Cybersecurity FrameworkExperience on Password Upload Utility for bulk onboarding of privileged accountsExperience on PowerBI, Active DirectoryCloud hosting architecture, onboarding cloud accounts into a PAM solutionSet yourself apart:Strong client relationship management skills new origination and the ability to communicate across the firmEntrepreneurial/innovation experienceWhat’s in it more »
Manager, Identity AccessManagement (IAM) An exciting opportunity for a candidate to join our dynamic and innovative Security team to support the implementation of our Identity and AccessManagement delivery by gathering requirements, advising best practices, documenting processes and supporting our capability. Partner deeply with security … and accurate reports, KRI’s/KPI’s and executive summaries of Information Security topics and techniques Feed threat knowledge into the IAM and PAM requirements Proactive identification of security concerns and address escalated or high-risk vulnerabilities Participate and contribute to the various Business Committees Skills and Knowledge Specification …/FedRamp, SOX, SOC, ISO, SOC2, PCI, ZeroTrust, SaaS Security Framework, Data Security Foundations, etc. Experience of working and managing vendor IAM tools and PAM tools such as SailPoint IdentityIQ, CyberArk, CA PAM, Imprivata, Azure MFA etc Exceptional interpersonal skills and the ability to communicate effectively with both technical and more »
5+ years of experience as an Analyst in PrivilegedAccessManagement ( PAM) , AD, Cyber Security, and IT Infrastructure in large corporations. Familiarity with SailPoint IdentityNow/SailPoint IIQ PrivilegedAccessManagement ( PAM) tool Configuration skills for group and account management in Active Directory. more »
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and accessmanagement (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional AccessManagement, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and PrivilegedAccess Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and AccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and accessmanagement, including hybrid identity scenarios. Conditional AccessManagementmore »
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and accessmanagement (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional AccessManagement, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and PrivilegedAccess Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and AccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and accessmanagement, including hybrid identity scenarios. Conditional AccessManagementmore »
your opportunityYou will be responsible to manage Deloitte UK’s Identity and AccessManagement (I&AM) and Privilege AccessManagement (PAM) operations and solutions in accordance with the firm’s policies and standards, and its legal and regulatory obligations.Primary point of contact for PAM solutions, specifically … with third party applications like Qualys, ServiceNow etc leveraging CyberArk’s Application Access Manager Performing disaster recovery and Power-down exercises to ensure PAM application is ready for contingency failover Working with wider teams to defining and implement onboarding and off-boarding processes for accounts. Developing automation scripts for … day operational activities like account onboarding, updating, provisioning access etc Working with threat intelligence team with the integration of their SIEM solution with PAM solutions Maintaining and creating PAM process documents, such as, operational procedures, break-glass process, user training, DR plan etc. Co-ordinating with vendor for the more »
Position : PAM Manager Company Overview: Our client is a prestigious private institution specializing in investment banking, wealth and asset management, and corporate banking. Catering primarily to high-net-worth individuals, institutions, and corporations, they are renowned for their commitment to excellence and innovation in financial services. Role Summary: The … company is seeking a highly technical and business-engaged PAM (PrivilegedAccessManagement) Engineer. While they currently utilize Delinea for PAM, they are open to candidates with experience in any PAM tooling, demonstrating an agnostic approach. The ideal candidate will have hands-on engineering experience and be … able to effectively implement and manage PAM tools in both operational and business contexts. You will be responsible for understanding and managing user bases, privilege profiles, authentication rules, and the team structure. Your role will also involve close collaboration with the Security Operations (SecOps) function and other security teams, particularly more »
of our customers and contributing to the success of the business every day. Job Description We have an incredible opportunity for an Identity and AccessManagement (IAM) Platform Support Analyst! You’ll be joining a dynamic, hands-on team helping to support technology-based changes within the security … support the uptake of security platforms Supporting and implementing technology changes to platforms such as IdentityNow and ServiceNow Training to support the Identity Now accessmanagement solution, with a view to train to move into a more technical development role Reviewing controls and reporting any risks identified within … Supporting and analysing issues across mainframe, Wintel and database environments Qualifications Who we're looking for: Previous experience in areas such as identity lifecycle management, accessmanagement, single sign-on, identity federation, privilegedaccessmanagement, access certification – although if you simply have a more »
City of London, London, United Kingdom Hybrid / WFH Options
Intec Select
all applications across all areas of the business. You will lead and be collectively responsible for ensuring IT Security is managed through Identity and AccessManagement and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and AccessManagement, especially through … technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and AccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. Proactively initiate investigations for improvements for standard operating processes and procedures, utilising the … current owned/licensed tools available, to evidence and escalate issues to the management team. Play a leading role in documenting, presenting and using direct communication to map software lifecycle, create work breakdown structures (WBS) and the appropriate supporting documentation Lead technical delivery, supporting the programme and project managers more »
Senior Identity and Access Security Manager Birmingham (Hybrid) £100,000 Key Responsibilities: Ensure robust security practices are in place to protect against identity-related threats by collaborating with architects, security professionals, and both internal and external stakeholders. Establish standards and lead the design and implementation of identity and access … Performance Indicators (KPIs), and executive summaries on Information Security topics and techniques. Contribute threat knowledge to IAM and PrivilegedAccessManagement (PAM) requirements. Identify and address security concerns proactively and manage high-risk vulnerabilities. Participate in and contribute to various organizational committees. Skills and Abilities: Understanding of … executing enterprise identity solutions. Familiarity with IAM concepts and best practices, as well as security and compliance frameworks. Experience with managing vendor IAM and PAM tools such as SailPoint IdentityIQ, CyberArk, CA PAM, Imprivata, and Azure MFA. Exceptional interpersonal skills and the ability to communicate effectively with both technical and more »
Methods are currently looking for a PrivilegedAccess Manager/PAM Consultant to work on a new contract assignment which falls Outside IR35 regulations. Our client is currently moving away from a PAM associated software and needs an individual to support the ongoing Migration. As the PAM Lead … you will be responsible for the deployment and maturity of our PAM platforms, and lead in the design of Privilege Access controls rules, roles, and policies, while ensuring consistency regardless of technologies in use. You will be responsible for installation, integration, and maintenance one or more Privilege AccessManagement products such as CyberArk. You will evaluate and support complex PAM technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement and maintain standards of excellence across all areas of delivery, including user experience, accessibility, reliability, and performance. more »
institution to build out their IAM capabilities with the introduction of two new SailPoint Developers. This role will report into the Senior Manager, IAM, PAM & Secrets Management. Main Responsibilities: Contribution to function strategies and architectures, leading engineering and the associated aspects across the areas of identity & accessmanagement, privilegedaccessmanagement Responsibility for the controls related to the domain area and ensure they remain effective. Lead and deliver variety of projects or discrete workstreams for larger projects as part of the cyber programme and other initiatives. Manage and … deliver changes to controls as necessary which are not part of project activity. Main Skillset Deep working knowledge in the engineering and operation of PAM and/or IAM technologies and the integration with relevant platforms. Level of knowledge in the domain technology area would be considered competent. Contemporary engineering more »
delivery of our information security strategy. You'll drive forward the use of good architectures and best practice in areas such as Identity and AccessManagement and Software Development. The post holder will lead with maintaining our privilege access posture, reviewing our firewall rules and adherence to … our policies, how we give third party access and auditing access and permissions. The role will require great stakeholder management skills to influence teams across technology and the wider business. The post holder will be expected to work closely with the other information security managers to support … of information security across all domains, it will also be beneficial if you have specific experience in some of the following areas: Identity and AccessManagement, Infrastructure Security, Privilege Access Management. Comfortable with leading change, and challenging where appropriate, to drive good security standards, you'll be more »
delivery of our information security strategy. You'll drive forward the use of good architectures and best practice in areas such as Identity and AccessManagement and Software Development. The post holder will lead with maintaining our privilege access posture, reviewing our Firewall rules and adherence to … our policies, how we give third party access and auditing access and permissions. The role will require great stakeholder management skills to influence teams across technology and the wider business. The post holder will be expected to work closely with the other information security managers to support … of information security across all domains, it will also be beneficial if you have specific experience in some of the following areas: Identity and AccessManagement, Infrastructure Security, Privilege Access Management. Comfortable with leading change, and challenging where appropriate, to drive good security standards, you'll be more »
SOC & SIEM, if applicable participating in the design and development of the SOC/SIEM, gearing towards ISO27001 and setting up a TVM and PAM Solution, as well as improving policies and standards and setting KPIs & KRIs. Skills & Experience: Over 5+ years experience in cyber and information security roles … systems. Up-to-date understanding of cybersecurity threats, regulatory standards (e.g., PCI DSS, GDPR), and industry best practices. Familiarity with data protection, encryption, and access control mechanisms. Expertise in various information security domains, including risk management, secure development lifecycle, vulnerability management, and third-party risk management. Key … the need for an in-house or outsourced Security Operations Center (SOC). Oversee the deployment of a PrivilegedAccessManagement (PAM) solution, coordinating with relevant teams and managing KPI reporting. Develop and deliver regular security metrics and key performance indicators for executive reporting. more »
solution architecture and design. The Technical Writer will be editing, and maintaining high-quality documentation that supports our PrivilegedAccessManagement (PAM) project, ensuring the information is accessible and understandable for both technical and non-technical stakeholders. Key Responsibilities: PAM Project Documentation: Develop and maintain comprehensive documentation … specifically related to the PAM project, including architecture overviews, configuration, integration and implementation design documents. Solution Design and Architecture: Collaborate with solution architects and engineers to create detailed solution design and architecture documents that are clear, accurate, and aligned with project goals. Visual and Editorial Excellence: Produce visually appealing and … well-structured documentation that effectively combines graphics and text to convey complex technical information related to the PAM project. Document Library: Own and maintain project document repository, ensuring that all PAM project documentation is organised, accessible, and up to date. Collaboration: Work closely with project managers, engineers, and other stakeholders more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
Experience within Information Security Engineering, focusing on Network Infrastructure & Network Engineering. Practical Experience with SIEM, Firewalls, SASE Solutions & PrivilegedAccessManagement (PAM) Systems. Highly Proficient in Microsoft & Linux OS (RHEL, CentOS, Ubuntu) with a Strong Understanding of Data Encryption, Key Management & PKI. Expertise within Cloud Security … Neurodiverse Individuals, LGBTQ+ Community Members, Veterans & those from Diverse Socioeconomic Backgrounds Searches: Linux/SIEM/Information Security Engineer/Network Security Engineer/PAM/Cyber Security Engineer/SIEM Engineer/Infrastructure Security Engineer/Linux Security Engineer more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
Experience within Information Security Engineering, focusing on Network Infrastructure & Network Engineering. Practical Experience with SIEM, Firewalls, SASE Solutions & PrivilegedAccessManagement (PAM) Systems. Highly Proficient in Microsoft & Linux OS (RHEL, CentOS, Ubuntu) with a Strong Understanding of Data Encryption, Key Management & PKI. Expertise within Cloud Security … Neurodiverse Individuals, LGBTQ+ Community Members, Veterans & those from Diverse Socioeconomic Backgrounds Searches: Linux/SIEM/Information Security Engineer/Network Security Engineer/PAM/Cyber Security Engineer/SIEM Engineer/Infrastructure Security Engineer/Linux Security Engineer more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Greater Manchester Combined Authority
of the following technologies: AD DS, Azure AD, DHCP, DNS and Group Policy Azure AD app integration PowerShell and Command Line Interface Microsoft Conditional Access Microsoft Defender suite Administering M365 suite of core platforms Maintenance of Microsoft operating systems (Win 11 OS and above), including BitLocker, patch managementand third … party patching Microsoft MECM and Intune, including OS and application deployments Microsoft Autopilot Microsoft Purview PrivilegedAccessManagement and Privileged Identity Management Windows LAPS About us: As an employer, the Greater Manchester Combined Authority (GMCA) is made up ofa number ofkey Greater Manchester strategic functions more »
Liverpool, England, United Kingdom Hybrid / WFH Options
TWX
Clarify incident severity Knowledge of security methodologies for investigation Comfortable with RAW output Threat Intel Info - against alerts Threat Hunting Internal Security and Log Management On top of the SOC Management you can be working on other services:- Dark Web monitoring service Guiding and Shaping Ideas for Crisis … Produce incident reports to present activity and outcome of operational security services and activity. Select appropriately from applicable standards, methods, tools and applications. Incident management Aid with the investigation of security breaches following established procedures and make sure any recommended follow up actions are taken to ensure a reduction … Incidents, the operation and optimisation of security tooling/products, including network security (IDS/IPS/Firewalls), logging and auditing, event and incident management, and privilegedaccessmanagement controls. Act on security incidents, requests and events to ensure that threats, vulnerabilities and breaches are managed more »
providing 1st and 2nd line support to a growing user base covering Microsoft O365, AWS and other internal systems Setting up new, and managing PAM (privilege accessmanagement)/IAM (identity accessmanagement) and user accounts more generally Installing updates and patches, managing software systems and … and diagnose software and hardware issues Nice to haves: Experience with Intune MDM Experience with Microsoft Azure Experience with scripting languages such PowerShell MacOS management Experience with managing Meraki infrastructure An interest in cyber security Ability to use network diagnosis tools found in Windows/MacOS/Linux CompTIA more »
Job Title: PAM Analyst Location:London, UK, Work Type:6 Months FTC Work Mode: Hybrid. • Minimum of 4 years of experience as an Analyst working within AD or Cyber Security or IT Infrastructure in large corporate environments. • Broad knowledge of PrivilegedAccessManagement in an enterprise environment … and experience with PAM tools, e.g. BeyondTrust or CyberArk. •Configuration skills in Active Directory for groups/account management •Excellent communication skills (verbal & written), as this role involves close partnership with Business and Technology stakeholders. •Excellent stakeholder management skills. •Proven ability to work effectively across all organisational levels. … Effective multi-tasking and time management skills. •Multi-platform access provisioning including Mainframe RACF, Sybase, Unix, Citrix and Crest more »
Manchester Area, United Kingdom Hybrid / WFH Options
bet365
Linux OS including RHEL7,8,9, CentOS 6, 7 and Ubuntu 22.04, 24.04 . Practical experience and understanding of NG Firewalls, SASE solutions and privilegedaccessmanagement systems. Good understanding of data encryption, key management and PKI. Knowledge of development in security technologies and automation principles more »
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
Linux OS including RHEL7,8,9, CentOS 6, 7 and Ubuntu 22.04, 24.04 . Practical experience and understanding of NG Firewalls, SASE solutions and privilegedaccessmanagement systems. Good understanding of data encryption, key management and PKI. Knowledge of development in security technologies and automation principles more »