for a Technical Solution Design and Delivery Engineer to work with one of our financial services clients. This is to work on high profile project regarding SSH keys discovery, management and remediation across on-prem and the Cloud.We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the … Identity and AccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management, including assessing the potential impact of security weaknesses and determining mitigations. Experience leading remediation efforts, including planning, automation, access reconfiguration and operational handover. Deep expertise in Identity and … accessmanagement, Privilegedaccessmanagement and secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key generation and usage. Familiarity with NIST's Post-Quantum Cryptography (PQC) standardization efforts and practical approaches for transitioning More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Accessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privilegedaccessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯