4 of 4 Identity Access Management Jobs in Cheshire

Junior Technical Consultant

Hiring Organisation
CyberIAM
Location
Chester, England, United Kingdom
opportunity to launch your future with CyberIAM. Key Responsibilities As a Graduate Junior Technical Consultant at CyberIAM, you will: Work with market-leading Identity and Privileged Access Management (IAM/PAM) solutions Gain hands-on experience with leading cloud platforms such as AWS and … solutions What we’re looking for We want to hear from you if you have: Experience with Active Directory – understanding of user, group, and access management Knowledge of Identity Access Management or Privileged Access Management – academic ...

Cyber Security Engineer Cyber Support

Hiring Organisation
Telstra Associates
Location
Macclesfield, Cheshire East, Cheshire, United Kingdom
Employment Type
Permanent
Salary
£50000 - £60000/annum £50-60k
posture. Key Accountabilities: Deliver a range of key cyber security activities including: Vulnerability remediation Security Investigations & Monitoring & Reporting Risk Assessment Application Security audits Identity Access Management ...

Cyber Security Engineer

Hiring Organisation
Mexa Solutions LTD
Location
Macclesfield, Cheshire, England, United Kingdom
Employment Type
Full-Time
Salary
£50,000 - £60,000 per annum
Supporting and improving core cyber security controls across the organisation Taking ownership of vulnerability remediation and security investigations Working across identity and access management, endpoint protection, monitoring and reporting Contributing to risk assessments and application security reviews Supporting the implementation of new security tooling ...

Enterprise Cyber Security Architect

Hiring Organisation
IBEX RECRUITMENT LTD
Location
Warrington, Cheshire, North West, United Kingdom
Employment Type
Permanent
Salary
£75,000
risk mitigation from the outset. This is not an enterprise architecture role it is centred on enterprise networks, cloud/hybrid infrastructures, and identity/access management. What youll do Define and implement security architecture principles across enterprise IT environments. Embed secure-by-design controls into … NIST CSF, ISO 27001, and zero-trust principles. Experience designing secure segmentation models (zero-trust, micro-segmentation), next-gen firewalls, and secure remote access solutions. Familiarity with enterprise protocols and technologies such as SAML/OAuth, API security, and associated risks in cloud-native environments. Experience operating ...