Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: IdentityAccessManagement (IAM) User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
strong technical background, with direct experience implementing, integrating and planning people facing systems similar to ours: this includes our HRIS , identityandaccessmanagement systems (we use Okta), service platforms (we use ServiceNow), workplace communication and office platforms (we use Slack and GSuite) and … for investment, and connect our workplace technology strategy to our overall business strategy; Proven experience in a leadership role overseeing workplace technology and service management teams, having worked in organisations of a similar size or scale with a track record of changing, building and developing high-performing teams … a long term strategy and roadmap for our HRIS and all the systems that depend on it - from our financial systems to payroll andidentitymanagement systems, learning and development systems and communication platforms; Build a strong understanding of how our systems work together and are more »
team to focus on learning; partner and collaborate with other teams. Qualifications Required Qualifications (RQs) 7+ years of technology-related sales or account management experience AND leading sales organization OR Bachelors Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years of technology-related … sales or account management experience OR equivalent experience Preferred Qualifications 9+ years of technology-related sales or account management experience OR Bachelors Degree in IT, or related field AND 8+ years of technology-related sales or account management experience OR Masters Degree in Business … security technologies - Threat protection (Endpoint security, E-mail security, Incident Response , etc.), Kill Chain, CNAPP, SIEM ., Multi-Cloud Security, IdentityandAccessmanagement, Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
Great Yarmouth, Norfolk, East Anglia, United Kingdom
Johnson Controls
management process by ensuring replacement machines are ready for users and retiring machines are processed to completion Support IdentityandAccessManagement requests (e.g., provisioning, de-provisioning, access validation, authentication, network share, and troubleshooting) Handle UK Deskside Service Now Ticket … Handling Queues to resolve end-user issues and requests Support local IT security compliance (e.g., comms room set-up, maintenance, andaccess) as needed Maintains end-user system security by prioritizing vulnerability incidents/requests Proactively communicate and provide updates to users Support & delivery of Enterprise and Business … to foster professional growth Preferred Relevant qualification in Computer Science, Engineering, Microsoft certification or related discipline Overview of Windows subsystems such as Certificate management, Device management, regionalisation, Registry editor etc. Experience in using Service Now for IT requests/incidents Knowledge of the following technologies: iOS more »
DAY INSIDE IR35 LENGTH: 6 MONTHS Key skills/knowledge/experience: (Up to 10, Avoid repetition) Strongknowledge of cryptographic concepts, HSMs, key management Hands-on experience in implementing and operating Thales Safenet HSMs Hands-on experience in designing and implementing key management solutions for enterprises. … and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmanagement Experience working on PKI/key management solutions for connected vehicle systems If you are interested more »
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
requirements (NFRs) environment (including Security best practises), but also up to the application level, as well as operating and service concepts in system managementand IT automation. Create technical documents like Architecture viewpoints, Technology Architecture blueprint and solution design specification. Be a Cloud SME within the architecture chapter … Service Models (Infrastructure, Container, Platform, Function & SaaS). Cloud integration and transformation (eg to Azure, AWS or GCP, DevOps frameworks). Cloud Security (IdentityAccessManagement, PKI, Encryption, Network Security, etc.), Deep knowledge in IaaS, PaaS, SaaS cloud scenarios and knowledge in the area … of cross-platform monitoring, managementand orchestration tools. High-level design of cloud solutions. What's in it for you? Hybrid working 24 days holiday (+ 8 bank holidays) with the option to buy an additional 10 days Annual bonus scheme Enhanced maternity and adoption leave Accessmore »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Proficiency in scripting and automation using PowerShell … to multitask and manage a large and varied workload and demonstrate high levels of self-organisation. In-Depth knowledge of escalation procedures, Incident Managementand other disciplines related to Service Delivery Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders, up to more »
Cloud DaaS, Azure Cloud - (Must) Terraform, Azure ADO (Must) Microsoft Windows 10 and Windows Servers VMWare FSLogix Zscaler AppSense/Ivanti Modern Endpoint Management … MS InTune MDM & MAM, SCCM) DNS/DHCP/GPO PowerShell Windows 10 life cycle Management including Autopilot IdentityandAccessManagement including AD, AAD, AAD Connect, SSO, MFA,Conditional Access, ADFS Exchange Online, Teams, or Mimecast, would be an more »
Impellam Group IT is on the hunt for a technical virtuoso who can lead the charge in revolutionising our end-user device andidentityaccessmanagement systems. You will strengthen our modern-managed desktop solutions and guide our team through new technical solutions. You … knowledge in Azure, Intune, and Microsoft 365 suites Expertise in managing and configuring MECM for endpoint supervision Mastery in Autopilot deployment and Co-Management with Intune Working knowledge with Qualys and Ivanti Desktop Now If MECM, SCCM, and AVD are more than buzzwords to you, join our ensemble more »
Marlow, High Wycombe, Buckinghamshire, United Kingdom
Entech Technical Solutions Limited
successful post-holder will act as a senior technical resource within our IT team and play a senior role in implementing optimised processes andmanagement practices that result in infrastructure, systems and services that are reliable, scalable, secure, efficient, well controlled and documented, adhering to ITIL best practices. … and hardware issues. Essential Skills Previous knowledge and experience working with Azure Cloud and Microsoft 365 services. Azure AD, Microsoft IdentityandAccessManagementand Conditional Access policies. Knowledge of PowerShell. Server virtualisation (VMWare/Hyper-V) or VDI. Strong understanding of more »
Job Description We are looking for a Senior Oracle Identity Engineer for one of our public sector clients . Rate: up to £700 per day Duration: 12 months Inside … IR35 Location: National, hybrid working, mostly remote As an Oracle Identity Engineer you will have experience with: Oracle IdentityandAccessManagement 11 Oracle Fusion Middleware Oracle EBS (E-business Suite) SSO (single sign on) Oracle Access Gate and Web … Gate Oracle DB 12, 19c Installation, migration, patching, upgrading, integration, and federation with other ID providers Life Cycle Management (LCM) tools for automation and installation If you are interested regarding this Senior Oracle Identity Engineer role please apply here for the full details. Senior Oracle Identitymore »
stakeholders worldwide. About the Role Based within the Information Security andIdentityandAccessManagement (IS andIDAM) division, the Security Improvement Coordinator will play a pivotal role in the successful delivery of ongoing assurance and maintenance of security projects. The post holder will … security change, ensuring that team members are motivated and possess the necessary skills and knowledge to deliver the desired outcomes. Actively represents the IS andIDAM colleagues, ensuring that effective relationships are built and maintained with key stakeholders throughout the University. Supports the development of business case justifications and cost … the successful delivery of security projects to agreed terms of reference. Makes clear, pragmatic and manageable plans for security change using programme and project management methodologies, learning and iterating frequently. This includes directing research and innovation on potential information security solutions and, where applicable, implementation. Takes responsibility for more »
stakeholders worldwide. About the Role Based within the Information Security andIdentityandAccessManagement (IS andIDAM) division, the Security Improvement Coordinator will play a pivotal role in the successful delivery of ongoing assurance and maintenance of security projects. The post holder will … security change, ensuring that team members are motivated and possess the necessary skills and knowledge to deliver the desired outcomes. Actively represents the IS andIDAM colleagues, ensuring that effective relationships are built and maintained with key stakeholders throughout the University. Supports the development of business case justifications and cost … the successful delivery of security projects to agreed terms of reference. Makes clear, pragmatic and manageable plans for security change using programme and project management methodologies, learning and iterating frequently. This includes directing research and innovation on potential information security solutions and where applicable, implementation. Takes responsibility for more »
building an outstanding alternative to university and corporate training via professional apprenticeships View company page We re on a mission to provide equitable access to economic opportunity, for everyone. We close critical skill gaps in the workforce through a new kind of apprenticeship that combines work and learning. … Knowledge of Infrastructure as Code Knowledge of Azure, Google, AWS, and Kubernetes cloud native services Securing GitOps and Continuous Deployment IdentityandAccessManagement, including securing privileged access Relevant certifications such as SABSA, CISSP, CCSK, AZ 500, GIAC, CISM, ISO Lead Auditor … company-wide wellbeing days Health & Wellness - private medical Insurance with Bupa, a medical cashback scheme, life insurance, gym membership & wellness resources through Gympass andaccess to Spill - all-in-one mental health support Hybrid & remote work offering - with weekly or monthly visits to the London office and the more »
and strategy (private, public and hybrid) Experience with infrastructure configuration and automation processes and tools: puppet, ansible, chef, Terraform Good understanding of Cloud Identity Security, AccessManagement Implementations, Cloud monitoring solutions and networking Drive effectiveness, efficiency and continuous improvement using automation. Collaborate with Architecture … and mitigate from happening again had too better improve service(s) we deliver. Understand and work towards a strategy set out by senior management ensuring we adhere to direction and execute tasks based on priority to meet strategy deadlines. Have the drive to constantly improve and try out … compute all the way to scalable automated deployments. A good understanding of Linux OS (Ubuntu/RHEL). A good understanding of configuration managementand automation with Ansible, Puppet, Jenkins. Experience in migrating services from on-prem to GCP Cloud and from other Cloud providers to GCP. A more »
controls, and privilege management. * Managing and maintaining endpoint security solutions, including endpoint protection platforms (EPP), endpoint detection and response (EDR), and mobile device management (MDM) using Microsoft Intune. * Developing and enforcing Data security/Application security policies, standards, and procedures across the organisation. Ensure compliance with … Microsoft Intune, Azure Active Directory, Azure Security Centre, and other Microsoft security solutions. * Strong understanding of network security, endpoint security, identityandaccessmanagement, and data protection concepts. * Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). * Excellent analytical and problem-solving … skills. * Effective communication and interpersonal skills. * Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance, Identity Fundamentals and Cybersecurity (SC-100) are a plus. * Hybrid and multi-cloud infrastructures * Security Cleared or able to attend Security Clearance. Apply now for full details @mecscomms: uniting opportunity more »
investment banks & hedge funds, aerospace and defense, life and health sciences, semiconductor, telecommunications, and advanced manufacturing companies. Time series and vector data analytics andmanagement are at the heart of our products, independently benchmarked as the fastest on the market. They help our customers process data at unmatched … Terraform, Ansible, or CloudFormation. Familiarity with containerization technologies such as Docker and Kubernetes. Strong understanding of cloud security principles including identityandaccessmanagement, data encryption, network security, and applicable compliance frameworks. Knowledge of security assessment tools and techniques such as vulnerability scanning and … and the labour market. Individually tailored training and skills development. Private healthcare package including coverage for partners and children. Employee Assistance Programme providing access to mental health support. Generous maternity and paternity package. "KX For Good" Program: we offer our team members Volunteer Days to actively participate in more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
streams necessary for the successful delivery of new cloud, web, and mobile projects or changes * Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access * Playing a key role in IT strategy and planning, focusing on maximizing more »
passionate about helping our clients succeed in an ever-changing industry. We are/have: Experts in Banking & Payments, Capital Markets, Insurance and Wealth & Asset Management Deep knowledge in financial services offering, including eg Finance, Risk and Compliance, Financial Crime, Core Banking etc. Committed to growing our business … expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identityandaccessmanagement, or offensive security engineering An understanding of the end to end technology delivery life cycle, with exposure to working in more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
risk assessments and vulnerability scans to identify and mitigate potential security threats and vulnerabilities. Implement and manage security controls to protect against unauthorized access, data breaches, and other security incidents. Monitor security logs and alerts to detect and respond to security incidents in a timely manner. Provide guidance … Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent certification preferred. Minimum of [X] years of experience in information security management roles. Strong knowledge of information security principles, standards, and best practices. Experience with ITIL (Information Technology Infrastructure Library) and COBIT (Control Objectives for Information … and Related Technologies) frameworks. Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems, encryption, andidentity/accessmanagement solutions. Excellent communication and interpersonal skills, with the ability to effectively communicate complex security concepts to technical and non-technical more »