Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
in the Identity Security and Security Operations space, specializing in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM). Committed to providing top-notch consulting and managed services to enterprise-level clients, we are seeking an experienced Sales Manager/Account Executive to … as the primary point of contact for key accounts. Drive sales efforts for both services and products, with a specific focus on IAM/PAM solutions. Collaboration with Lead Generation and Marketing: Work closely with the Lead Generation and Marketing teams to refine messaging and enhance the go-to-market … sales and business development, particularly in the Identity Security and Security Operations space. Experience working with enterprise-level clients, preferably in the IAM/PAM domain. Strong understanding of consulting and managed services sales processes. Excellent communication and interpersonal skills. Attributes: Results-oriented and target-driven. Strategic thinker with the more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, PrivilegedAccessManagement, and Network Appliance tooling. What … holiday per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Manchester, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat management and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … the lead in the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetration testing and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present … standard accreditations and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privilegedaccessmanagement, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Interviews to be held Tuesday 18th June2024 Main duties of the job more »
industry. The position requires the ability to provide guidance on how to architect/design, leverage, and operate, various operational platforms, including Identity, Credential, AccessManagement (ICAM), Security Information and Event Management, and Security Orchestration, Automation & Response (SIEM/SOAR), and PrivilegedAccessManagement … and 12-15 years of related experience. Additional years of experience and cyber certifications may be considered in lieu of degree. Familiar with the management, operational, and technical aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered. … of Zero Trust Capabilities, Infrastructures and Architecture. 8 years of team and/or operational leadership experience. 10+ years experience in USG cyber risk management, assessments and authorization (A&A), certification & accreditation (C&A) and using NIST Special Publications (SP) (e.g.: SP800-30, SP800-37, SP800-53, etc.) 10+ more »
the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: PrivilegedAccessManagement (PAM) Identity Governance and Administration Security Best Practices Our client is looking to interview candidates from Tuesday 30th April so please get in touch if you more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
team, leads and executes the programs within the GRC team, is a subject matter expert for Information Security (consulting to technical/non-technical management and the user community), and performs key risk management functions within the Security Governance department. Primary functions include life cycle management of … client responses, Policy & Standards life cycle management, Security Vendor Risk program management, Security Awareness, Controls Assurance, and GRC platform and program management. Responsibilities: Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and lifec-ycle. Manage the exception request process and consult more »
team, leads and executes the programs within the GRC team, is a subject matter expert for Information Security (consulting to technical/non-technical management and the user community), and performs key risk management functions within the Security Governance department. Primary functions include life cycle management of … client responses, Policy & Standards life cycle management, Security Vendor Risk program management, Security Awareness, Controls Assurance, and GRC platform and program management. Responsibilities: Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and lifec-ycle. Manage the exception request process and consult more »
of this project, I cannot reveal much information at this point, but key experience is: LLD & HLD Infrastructure - MS Suite MoD Cloud (Ideally Azure) PAM (PrivilegedAccessManagement) You must have A ctive DV Clearance & be a sole British National to apply for this role. Any experience more »
to be onsite in Berkshire 3 days a week. Key experience for these roles are: LLD & HLD Infrastructure & Data Centre MS Suite Private Cloud PAM (PrivilegedAccessManagement) Directory Services DNS, DHCP, NTP Cyber Security Awareness - Vulnerability, Malware, Compliance You must have A ctive DV Clearance & be more »
Incident Specialist Join our Cyber Security product group as a Security Incident Specialist, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privilegedaccessmanagement processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
Incident Specialist Join our Cyber Security product group as a Security Incident Specialist, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privilegedaccessmanagement processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK & abroad. … in total) Flexible working Competitive salary Social fund ---------------------- About CyberIAM CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in Identity AccessManagement and PrivilegedAccess Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identity management services to the best customers is where our passion lies. more »
as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat management and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … the lead in the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetration testing and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present … standard accreditations and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privilegedaccessmanagement, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Some duties include: This role will be required to research, implement, and more »
Partners are excited to be working with a growing global cyber security consultancy to recruit a Managing Consultant/Project Lead IAM (Identity and AccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world’s leading … ClearSkye, CyberArk, Delinea. 5 years proven project management experience within IAM. Delivery of large scales IAM projects, Ideally in SailPoint and/or PAM technologies In-depth knowledge of IAM principles, standards, and best practices. Excellent leadership and communication skills, with the ability to effectively interact with diverse stakeholders. … Ability to manage multiple projects in parallel. Experience with IAM technologies such as identity governance and privilegedaccess management. Familiarity with regulatory requirements related to data privacy and security Proficiency in project management tools and methodologies Responsibilities will involve: Develop detailed project plans covering all phases: Definition more »
SOC Technical writing experience 4+ years of Information Security experience Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Strong knowledge of risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerability assessment … and forensic investigations tools. Knowledge of PrivilegedAccessManagement technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical writing for policies, standards, and communications. Lead in the creation and … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and life cycle. Manage the exception request process and consult more »