Permanent Privileged Access Management Jobs in the UK excluding London

21 of 21 Permanent Privileged Access Management Jobs in the UK excluding London

PAM Consultant SC Cleared

Telford, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
Job Title: PAM Consultant- SC Cleared Location: Hybrid – Stafford Park 1, Telford TF3 3BD (3 days/week Onsite) Duration: 3months+ Description We are seeking a highly experienced Privileged Access Management (PAM) Consultant to lead the assessment and strategic planning of PAM solutions within a complex hosting infrastructure. This role focuses on evaluating existing access control … mechanisms, identifying risks associated with over-privileged accounts, and recommending scalable PAM solutions tailored to diverse operating systems and on-premises environments. Key Responsibilities: • Conduct comprehensive assessments of internal infrastructure to identify privileged access risks and gaps. • Analyze current access provisioning models, especially where elevated permissions (e.g., root, Admin access) are broadly granted. • Analyze existing … access control models and recommend enhancements using RBAC, ABAC, and least privilege principles. • Design PAM architectures that support secure delegation of access across diverse platforms. • Design and recommend PAM strategies that enforce least privilege, improve auditability, and enhance operational security. • Evaluate and compare PAM solutions (e.g., CyberArk, BeyondTrust, Delinea) based on technical fit, scalability, and integration capabilities. • Document More ❯
Posted:

Technical Solution Design and Delivery Engineer

Edinburgh, United Kingdom
i-confidential Limited
for a Technical Solution Design and Delivery Engineer to work with one of our financial services clients. This is to work on high profile project regarding SSH keys discovery, management and remediation across on-prem and the Cloud.We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the … Identity and Access Management space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations. Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and … access management, Privileged access management and secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage. Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Glasgow, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Belfast, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Edinburgh, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

S/4 HANA Access Senior Manager, Financial Transformation

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Access management work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust access management policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IDAM Solutions Specialist / Architect

Handsworth, South Yorkshire, UK
Hybrid / WFH Options
Experis
Role Title: Identity and Access Management (IDAM) Solutions Specialist/Architect Duration: contract to run until 28/11/2025 Location: Sheffield, Hybrid 3 days in the office is mandatory Rate: up to £552 p/d Umbrella inside IR35 Role purpose/summary Big Bank Funding. FinTech Thinking. Our Technology teams work closely with our global … is forecast to be 5 years plus with significant change to be designed, planned and implemented globally. The transformation encompasses all aspects of IDAM from Authentication through to elevated access and will cover human and non-human identities. We're looking for an experienced Solutions Specialist/Architect who has deep expertise in Identity Management and a successful … up to C level. Be responsible for the successful delivery of relevant parts of IDAM transformation that you are architecting The role requires effective communication across the workstreams and management of their inter-dependencies including oversight of any risks and issues arising. Risk and Issue Management - proactively identifies and manages risks and issues against the architecture ensuring these More ❯
Posted:

Cyber Security Test Analyst

Sheffield, England, United Kingdom
Vallum Associates
UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged Access Management (PAM) or Identity & Access Management (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged account security … and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD pipelines and DevSecOps practices. Experience with Cloud security More ❯
Posted:

Cyber Security Engineer

Luton, Bedfordshire, United Kingdom
Connect2Employment
The Cybersecurity team, within the IT department, is responsible for information and Cybersecurity. Responsibilities include information and cybersecurity risk management, and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholders, and partners, such as retailers, ground handlers, as well as suppliers, to ensure a joined-up approach to information and cyber … will have a strong technical background and a thorough understanding of IT systems, which is essential for effectively securing our infrastructure, systems, and networks. Expertise in information security, risk management and compliance is essential, as is a commitment to defending against cyber threats and integrating security across all layers of our IT environment to protect organisational data and technology. … to produce reports and communicate security intelligence. * Advanced knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity. * Knowledge of Cloud computing, computer network defence, identity management, privileged access management, incident management and network security. * Extensive experience within a NOC/SOC environment. Desirable * IT certifications such as CompTIA A+, Network+ * Cyber More ❯
Employment Type: Permanent
Salary: £62700/annum
Posted:

Security Manager - Identity & Access Engineering

Alderley Edge, Cheshire, United Kingdom
Royal London
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Security Manager - Identity & Access Engineering Company: Royal London Group Job Title: Security Manager - Identity Engineering Contract Type: Permanent Location: Edinburgh or Alderley Edge Working style: Hybrid 50% home/office based Closing date: 7th July 2025 We are looking to recruit … an exciting role within our Security & Resilience function. This is an operationally focussed role which involves maintaining a high benchmark to assure colleagues only have appropriate access for their role, minimising the potential damage from cybersecurity incidents. The successful candidate shall be able to work with minimal guidance in the Identity & Access Management field and will take … accountability for the day-to-day support of Identity tooling. The role has direct people management accountabilities of a small team of Identity Engineers and will provide the day-to-day task management for the team. The role will assist in developing the skills within the team to ensure expertise are in place to operate Identity Management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

SSH Key Technical Solutions Delivery Engineer

Dunfermline, Fife, UK
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

Central, Inverclyde, UK
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

edinburgh, central scotland, United Kingdom
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

North East, Glasgow, UK
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

Broughton, Scottish Borders, UK
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

Livingston, West Lothian, UK
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

broughton, central scotland, united kingdom
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

SSH Key Technical Solutions Delivery Engineer

dunfermline, north east scotland, united kingdom
Networker Global Limited
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & access management, cryptography, privileged access management, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Posted:

Infrastructure Support Engineer (Security Clearance)

Chippenham, Wiltshire, South West
CGI
an on-call rota to support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot key management systems like HashiCorp Vault and Thales HSM. -Support privileged access management solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational knowledge of network principles. System More ❯
Employment Type: Permanent
Posted:

Remediation Engineer

Birmingham, Staffordshire, United Kingdom
Cyberclan
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privileged access management solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Architect

Newport, Gwent, Wales, United Kingdom
Hybrid / WFH Options
Yolk Recruitment Ltd
and embed Security Architecture Principles to guide all programmes, projects, and changes Develop and maintain ISO27001-compliant security policies and an ISMS framework Create reference architectures for Identity and Privileged Access Management Provide architecture reviews for all new systems and major changes to existing ones Support the redevelopment and testing of the organisation's Security Incident Response More ❯
Employment Type: Full-Time
Salary: £69,000 - £78,850 per annum
Posted:
Privileged Access Management
the UK excluding London
10th Percentile
£57,625
25th Percentile
£58,750
Median
£95,000