Delivering an improved experience for students in the PC cluster environments and a more robust service for colleagues. Expanding services offering increased flexibility & remote access to Teaching & Learning software Documented designs & processes for new & existing services within Colleague & Student computing Stronger links between IT Services and the Teaching and … our core systems. Improved release management & data obfuscation technologies & processes. Robust guidelines, standards and governance Delivering a PrivilegedAccessManagement (PAM) solution to secure and manage privileged accounts, reducing attack surface, preventing unauthorized access, aligned to industry best practice. More ❯
Shoreham-by-sea, Sussex, United Kingdom Hybrid / WFH Options
Ricardo
, ensuring swift resolution. Oversee change management processes. Manage vulnerability and patch updates to maintain security. Implement PrivilegedAccessManagement (PAM) protocols. Conduct cost analysis for cloud services and plan for obsolescence. Resolve 2nd and 3rd line support tickets efficiently. Participate in after-hours upgrades, troubleshooting … implement necessary improvements. Support other technology objectives as required. Key Competencies and Experience Extensive experience in an IT or technology department, including: Administration and management of Linux/UNIX servers. Monitoring system performance and ensuring security. Performing routine system administration tasks and maintaining logs. Providing technical support, troubleshooting, and … user assistance. Installing and optimising Linux-based applications. Managing system access, data integrity, and security protocols. Upgrading systems in line with business needs and coordinating downtime. Developing and maintaining system recovery procedures. Creating and maintaining comprehensive documentation. Technical Skills: Linux Servers: RedHat (ALMA, CentOS, Ubuntu) High-Performance Computing (HPC More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The … users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential … policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯
of IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents … including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, PrivilegedAccessManagement, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance More ❯
both performance and security. You will also be responsible for implementing and managing Single Sign-On (SSO) and PrivilegedAccessManagement (PAM) solutions to strengthen authentication and security. Collaboration with cross-functional teams will be vital to define technical roadmaps and drive innovation. In this role, you … solutions to enable secure data exchange across environments. • Architect and optimise network solutions to enhance both performance and security. • Implement and manage SSO and PAM solutions to strengthen authentication security. • Collaborate with engineering and security teams to ensure best practices and compliance standards are met. Required qualifications to be successful … VxRail to develop and manage virtualised environments. • In-depth knowledge of networking principles and security best practices. • Experience with implementing and managing SSO and PAM solutions for enhanced security. • Strong problem-solving, communication, and stakeholder management skills to work effectively across teams. #LI-JW1 Together, as owners, let's More ❯
We are the UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and PrivilegedAccessManagement (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. We’re looking for a driven Account Manager with a hunter mentality to join our … you’ll win new business while growing and nurturing key enterprise accounts . You’ll collaborate with cybersecurity stakeholders to deliver tailored IAM and PAM solutions that drive long-term client success . What’s in it for you? 🚀 Career Growth: Structured training & industry certifications. 🏖️ Time Off: 33 days holiday … in enterprise services or software sales with a focus on new business Strong account management and client relationship skills Experience selling IAM/PAM solutions like CyberArk, SailPoint, or BeyondTrust Confidence engaging with C-level executives Strategic thinking, commercial awareness, and a results-driven mindset Familiarity with HubSpot , LinkedIn More ❯
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), PrivilegedAccessManagement (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
Delinea
SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and … OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege AccessManagement (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. … Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS More ❯
Security London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services … agency and execution, market making, and hedging and investment solutions. It has a leading franchise in many major metals, energy and agricultural products, with access to 60 exchanges. The group provides access to the world's major commodity markets, covering a broad range of clients that include some … security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privilegedaccess monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and More ❯
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
East London, London, United Kingdom Hybrid / WFH Options
Reed Technology
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. 'Hands on' technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot key management systems like HashiCorp Vault and Thales HSM. -Support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational More ❯
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. -Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to … cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE More ❯
to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to … cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE More ❯