COBIT, ITIL, etc.). Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure Active Directory), SailPoint, or similar. Experience with CyberArk for user and service account privileged access management. Excellent analytical, problem-solving, presentation, and communication skills. Ability to work collaboratively with cross-functional teams More ❯
lifecycle. In-depth knowledge of Identity Governance solutions (IGA), configuration, security, integration, reporting, and testing methodologies. Experience with IGA solutions (e.g., SailPoint, Okta, PingIdentity, CyberArk) and on-prem/SaaS implementations. Strong understanding of business processes, identity-first security, IT controls, risk management, and compliance standards. Experience with authentication More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge of network More ❯
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Hays
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
team and align security measures with enterprise IT security frameworks. Understanding of Security Solutions: MS Sentinel/Defender/Entra, Zscaler ZPA ZTMA, CrowdStrike, CyberArk, SailPoint, Ping, and ability to design and build a controls dashboard from evidence outputs from MS solutions, using ISO27K, NIST, NIS 2, DORA, TISAX More ❯
and capabilities (e.g., Sailpoint , Saviynt), joiner/mover/leaver processes and identity proofing. Experience with credential vaulting and rotation tools and capabilities (e.g., CyberArk, Thycotic) Expertise in Active Directory security monitoring and configuration in a large enterprise Solid understanding of common identity security threats (e.g., credential harvesting, credential More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and Privileged Access Management (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. If you're a driven sales professional who thrives in a high-energy environment and enjoys engaging with C-suite More ❯
UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and Privileged Access Management (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. If you're a driven sales professional who thrives in a high-energy environment and enjoys engaging with C-suite More ❯
london, south east england, united kingdom Hybrid / WFH Options
Lorien
IGA) and Privileged Access Management (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends and the evolution of IAM technologies. Experience managing stakeholder relationships, both internally and externally. Ability to balance delivery More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Leadership: Over 5 years of experience in IAM, IGA, and PAM, including leadership roles. Technical Skills: Hands-on experience with tools like SailPoint, Saviynt, CyberArk, Okta, Azure AD, and BeyondTrust. Cloud Expertise: Proficient in cloud IAM/PAM practices (AWS, Azure, GCP). Reward & Benefits A fair and competitive More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
development. Proven experience of managing and delivering aspects of IAM projects. Proven experience of implementing one or more of the following IAM solutions: Sailpoint, CyberArk, OneIdentity, Okta, BeyondTust and Microsoft Entra ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from More ❯
High Wycombe, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Dreams Ltd
day: - Daily BAU checks and triage plus proactive maintenance for: o Firewall/web filter errors and threats o Security emails - Validate contents o Cyberark dashboard - Application inbox o Mimecast errors and threats o Web filter Unblock requests o MS Defender analysis - Assist service desk users with triage of More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request”. Role: CyberArk SME Job Type: Permanent Location: Coventry Ready to utilise your skills in Cybersecurity? Are you looking for an exciting opportunity as a CyberArk SME? Make a meaningful impact as a CyberArk SME Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities … customers and identify opportunities to support their strategy and improve their processes across functions. Gain access to endless learning opportunities. The Role As a CyberArk SME you will implement different CyberArk Solutions, perform automation and integrate with different products. Key responsibilities: Responsible for implementing, maintaining, upgrading CyberArkMore ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request”. Role: CyberArk SME Job Type: Permanent Location: Coventry Ready to utilise your skills in Cybersecurity? Are you looking for an exciting opportunity as a CyberArk SME? Make a meaningful impact as a CyberArk SME Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities … customers and identify opportunities to support their strategy and improve their processes across functions. Gain access to endless learning opportunities. The Role As a CyberArk SME you will implement different CyberArk Solutions, perform automation and integrate with different products. Key responsibilities: Responsible for implementing, maintaining, upgrading CyberArkMore ❯
audience you are engaging with in this role. Experience of Information Security, and a solid IT background. Excellent presentation and documentation skills. Knowledge of CyberArk PAM capabilities including Hybrid Environments (On-Prem, AWS, Azure). Our customer first behaviours put customers and members at the heart of how we More ❯
to collaborate with talented professionals, gain exposure to cutting-edge technology, and access continuous learning and development opportunities. What You'll Do As a CyberArk Consultant , you will play a key role in advising and implementing CyberArk solutions for clients, helping them optimize their security posture through the … use of best-in-class privileged access management. Your responsibilities will include: Consultation & Implementation : Advise and implement CyberArk solutions, ensuring successful deployment and integration with client environments Security Patch Management : Apply necessary security patches to CyberArk systems to ensure continued compliance and protection Client Roadmap Input : Provide valuable … Product Owner/Engineering Manager for defining and evolving the product roadmap based on client needs Feature Deployment : Implement and customize new features of CyberArk products, including Vault, CPM, PVWA, PSM, PSMP, CP, CCP, EPM, and Alero Process Automation : Design and implement automation for routine tasks, streamlining client processes More ❯
to collaborate with talented professionals, gain exposure to cutting-edge technology, and access continuous learning and development opportunities. What You'll Do As a CyberArk Consultant , you will play a key role in advising and implementing CyberArk solutions for clients, helping them optimize their security posture through the … use of best-in-class privileged access management. Your responsibilities will include: Consultation & Implementation : Advise and implement CyberArk solutions, ensuring successful deployment and integration with client environments Security Patch Management : Apply necessary security patches to CyberArk systems to ensure continued compliance and protection Client Roadmap Input : Provide valuable … Product Owner/Engineering Manager for defining and evolving the product roadmap based on client needs Feature Deployment : Implement and customize new features of CyberArk products, including Vault, CPM, PVWA, PSM, PSMP, CP, CCP, EPM, and Alero Process Automation : Design and implement automation for routine tasks, streamlining client processes More ❯
using InsightCloudSec and Microsoft Defender for Cloud Patch management via TrueSight Identity protection and corporate tools including AAIP, MDI, and MCAS PUAM systems, especially CyberArk Security logging and monitoring, preferably with PRISM or similar SIEM solutions Solid understanding of security frameworks (e.g., NIST, ISO 27001) and compliance requirements. Proven More ❯