Job Title: PAM Governance Analyst, VP About Opportunity: Global Cybersecurity (GCS) protects State Street and its clients from the impact of cyber-attacks against systems by understanding the risks these attacks present and mitigating them through a robust, continuously evolving, cybersecurity program and control environment. Cyber Architecture & Engineering (Cyber A … E designs, architects, deploys, and continually enhances security measures for the protection of State Street's information related to its assets and customers. This PAM Governance Analyst will sit in the PAM Governance sub-function in Cyber A&E. This role is responsible for designing and maintaining automated and manual … Our work requires us to think in terms of risk and design automation and procedures that will mitigate risks and maintain compliance for all PAM standards. . Other responsibility areas are listed below. Responsibilities: Take a lead role in designing our new Compliance Platform. Write requirements, including UI requirements, test More ❯
Role: We are looking for an experienced Identity Architect to lead and manage an Active Directory (AD) migration project and optimise our identity and accessmanagement (IAM) solution. The ideal candidate will have extensive experience with Active Directory Domain Services, Active Directory Certificate Services, Entra ID, Conditional AccessManagement, Multi-Factor Authentication (MFA), Single Sign-On (SSO), and PrivilegedAccess Management. Experience with Azure is highly desired. Key Responsibilities Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and AccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and accessmanagement, including hybrid identity scenarios. Conditional AccessManagementMore ❯
Managing Consultant - IAM/PAM Managing Consultant - IAM/PAM Location: Global role - UK based - Manchester, London Or Cheltenham Role Purpose: NCC Group are investing in expanding our digital identity service line, to grow and expand capabilities, offerings and propositions. This new global practice will focus on three key core … competencies - Identity, Governance and Administration (IGA), PrivilegedAccessManagement (PAM), AccessManagement (AM) and Customer Identity (CIAM). The opportunity is for an IAM technical consultant with hands-on technical experience, performing as an engineer/developer to support large-scale IAM deployments, supporting the … service line leader. Summary: This is a fantastic new opportunity to join our Global IAM team. The ideal candidate will have previous IAM/PAM engineering and development experience and exposure gained from delivering complex IAM engagements, ideally across a broad client base. In addition to your technical skills, you More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to … apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: Identity and AccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the … many other memberships and perks designed to enhance the workplace experience, your health, and wellbeing. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
date: 23/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccessManagement (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams … and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance PrivilegedAccessManagement (PAM) AccessManagement Customer Identity and AccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently … people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to More ❯
The team you'll be working with: We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of … competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low … Level). User Profiles, Use Cases & IDAM/PAM processes. Work with other teams to agree Implementation plans and effort. Appropriate metrics, and processes to achieve client objectives and targets. Enact: The setup of test, development and production IDAM & PAM environments. IDAM & PAM technology implementation & configurations. Robust practices for the More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Description The Identity & AccessManagement (IAM) team, sitting within the Cyber Security function, ensures that access for all Motability Operations (MO) employees and customers is correct, appropriate, and secure. Within the IAM function: The IDaaS team is responsible for customer identities, SSO, and MFA. The IGA team … manages internal employee accessmanagement and governance. This role leads the IGA team and reports into the Cyber Security Technical Manager. As IGA Team Lead, you will manage the identity governance function, ensuring robust access governance, compliance, and security policies across the organisation. You will work closely … and key business stakeholders. Knowledge of industry frameworks such as ISO 27001, NIST, or other security governance models. PrivilegedAccessManagement (PAM) experience. Benefits Motability Operations is a unique organisation, virtually one of a kind. We combine a strong sense of purpose with a real commercial edge More ❯
Employment Type: Permanent, Part Time, Work From Home
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
to £51,000 We are looking for an IDAM Analyst to play a crucial role in building and operating a new centralised Identity and AccessManagement (IDAM) solution. While architects and engineers will handle the technical aspects, this role requires a strong technical understanding of IDAM and the … business needs. Oversee identity governance , including Joiners, Movers, Leavers (JML) processes , role-based access control (RBAC) , and privilegedaccessmanagement (PAM) . Ensure authentication methods such as SSO, MFA, and identity federation are properly integrated and managed. Work with architects and engineers to support the implementation … Strong technical knowledge of IDAM , including identity governance, access control, and security policies . Experience with IAM frameworks such as RBAC, SSO, MFA, PAM, and identity lifecycle management . Ability to act as the ‘customer’ for an IDAM solution , influencing technical teams and ensuring the platform meets business More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing privileged accounts. … You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Heres a taste of what you will be doing as an Identity Governance Access Analyst … at Nottingham Building Society: Daily Operations: Collaborate with the IGA Manager to ensure smooth daily operations of our identity governance platform, adhering to user access policies. Process Management: Coordinate with HR and IT to manage joiner, mover, and leaver processes across systems. Access Certification: Assist in accessMore ❯
Security Architect who will provide expert advice and guidance on Identity and AccessManagement (IDAM) and PrivilegedAccessManagement (PAM) solutions. This is a hybrid role - 2 days in London, 3 days remote. The role falls inside IR35 so you will need to work through … experience in a Cyber/Information Security Role. You must hold a relevant Security Certifications (e.g., CISSP, CISM). Extensive experience in IDAM/PAM consulting, with a proven track record of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra, AWS IAM … best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience in developing and presenting IDAM/PAM roadmaps and strategic recommendations is also required. You must be eligible for SC Clearance if not already cleared. Please apply ASAP to discuss further. More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Eteam Workforce Limited
Title: CyberArk Engineer(Need Active SC Clearance) Location: Remote with some travel to Warwick Duration: 31/10/25 Role Description: Implementation and Management: Oversee the implementation and management … of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and … certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
CyberArk Engineer Remote Working £500-£550p/d via Umbrella ASAP Starter until October 2025 Role Brief: Implementation and Management: Oversee the implementation and management … of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and … certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN … Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and … Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), and security automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. … You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do … Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/ More ❯
Delivering an improved experience for students in the PC cluster environments and a more robust service for colleagues. Expanding services offering increased flexibility & remote access to Teaching & Learning software Documented designs & processes for new & existing services within Colleague & Student computing Stronger links between IT Services and the Teaching and … our core systems. Improved release management & data obfuscation technologies & processes. Robust guidelines, standards and governance Delivering a PrivilegedAccessManagement (PAM) solution to secure and manage privileged accounts, reducing attack surface, preventing unauthorized access, aligned to industry best practice. More ❯