SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint … and cloud compliance . Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements, including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register, prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management, endpoint … XDR), and cloud compliance. Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint … and cloud compliance . Good understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: 5+ years in More ❯
SWIFT CSP into technical security controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements , including due diligence, contract oversight … Audit & Assurance: Participate in internal/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise on vulnerability management , endpoint … and cloud compliance . Good understanding of IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are looking for: Experience: 5+ years More ❯
right hand to the Head of IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents, including forensics when necessary. Security … Services: Drive the delivery of services including Threat & Vulnerability Management, PrivilegedAccessManagement, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security policies and frameworks like ISO 27001/NIST. Security Controls: Operate and manage More ❯
Business Analyst (PAM/CyberArk/IAM/Migration Project) - Banking - London , Paris, Amsterdam and Brussels Rate: 500 - 700 Duration: 1 year Hybrid - 2 days onsite per week Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of Identity and Access Management. Collect requirements and transform them into a structured … sources of information to determine scope of activities and determine approach. Closely collaborate with key Project stakeholders in identifying, analysing and liaising with technical team the appropriate approach for Privileged Account onboarding to IAM tools. Lead analysis and onboarding activities together with Project Lead. Responsibilities: Working closely with Business and IT stakeholders to gather requirements (functional and non-functional … clear presentations to present the outcome of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key contributors during the project delivery More ❯
Business Analyst (PAM/CyberArk/IAM/Migration Project) – Banking – London , Paris, Amsterdam and Brussels Rate: 500 – 700 Duration: 1 year Hybrid – 2 days onsite per week Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of Identity and Access Management. Collect requirements and transform them into a structured … sources of information to determine scope of activities and determine approach. Closely collaborate with key Project stakeholders in identifying, analysing and liaising with technical team the appropriate approach for Privileged Account onboarding to IAM tools. Lead analysis and onboarding activities together with Project Lead. Responsibilities: Working closely with Business and IT stakeholders to gather requirements (functional and non-functional … clear presentations to present the outcome of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key contributors during the project delivery More ❯
Business Analyst (PAM/CyberArk/IAM/Migration Project) – Banking – London , Paris, Amsterdam and Brussels Rate: 500 – 700 Duration: 1 year Hybrid – 2 days onsite per week Objectives: Support the Project Lead in scope definition by understanding the overall objective and constraints in the field of Identity and Access Management. Collect requirements and transform them into a structured … sources of information to determine scope of activities and determine approach. Closely collaborate with key Project stakeholders in identifying, analysing and liaising with technical team the appropriate approach for Privileged Account onboarding to IAM tools. Lead analysis and onboarding activities together with Project Lead. Responsibilities: Working closely with Business and IT stakeholders to gather requirements (functional and non-functional … clear presentations to present the outcome of analysis to senior stakeholders. Contribute to solution integration and implementation or migration strategy, identifying new scope and requirements. Collaborate with the change management to ensure that new deliverables are adopted for the benefit of the organisation. Facilitate communication between the business, the IT teams, and the key contributors during the project delivery More ❯
Cyber Security Specialist (PAM/IAM Solutions/Application Control - whitelisting/blacklisting) Location: Dartford Salary: Competitive base, car/travel allowance + benefits Job Type: Permanent Be part of transforming the construction industry, be part of our Cyber Security team. Are you able to support comprehensive Cyber Security programs whilst optimising the operational performance and reliability of Infrastructure technologies … Focusedon day-to-day operational tasks and maintenanceof core Cyber Security infrastructure service platforms, including but not limited to: Manage and administer the PrivilegedAccessManagement (PAM) platform, including user access, permissions, audits and configurations. Collaborate with IT and business teams to integrate and expand PAM controls into existing systems and applications. Manage and administer the … enterprise systems and cloud solutions? The join our Cyber Security team and showcase your knowledge of regulation standards, compliance and governance. Essential experience includes: Experience in configuring and managing PAM solutions in enterprise environments. Familiarity with identity and accessmanagement (IAM) principles , including role-based access control (RBAC) and least privilege. Strong understanding of Application Control concepts More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Lorien
contract role - Hybrid working - Reading Our client is looking for an experienced and security-focused Product Owner across Identity and PrivilegedAccessManagement workstreams (IAM/PAM). In this role, you will be responsible for defining and managing the roadmap and backlog for key IAM/PAM capabilities, ensuring that systems are secure, compliant, and aligned … to deliver scalable and user-centric access solutions that reduce risk and enhance operational efficiency. Key Responsibilities: • Define and own the product vision and strategy for IAM and PAM capabilities, including identity lifecycle management, authentication, authorization, privilegedaccess controls, and role-based access. • Prioritise and manage a well-groomed product backlog that reflects risk mitigation, compliance … performance, and user satisfaction. Identity experience: • Tangible experience as a Product Owner or similar role in cybersecurity, identity management, or access governance. • Strong knowledge of IAM/PAM concepts, technologies, and tools (e.g., Okta, SailPoint, CyberArk, EntraID, LDAP, SSO, MFA). • Understanding of compliance and regulatory frameworks (e.g., SOX, GDPR, HIPAA). • Experience working in Agile environments and More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
million customers. In this role, you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. You will be tasked with … ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do as an OT Senior Cyber Security Analyst Contextualise OT Specific Threats: • Understand the Operational Technology … user computing. • Proficiency in writing Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/VPN, IDS/IPS, etc. More ❯
solutions, including NSX, to enhance both performance and security. You will also be responsible for implementing and managing Single Sign-On (SSO) and PrivilegedAccessManagement (PAM) solutions to strengthen authentication and security. Collaboration with cross-functional teams will be vital to define technical roadmaps and drive innovation. In this role, you will: • Develop and implement scalable … Design and integrate cross-domain solutions to enable secure data exchange across environments. • Architect and optimise network solutions to enhance both performance and security. • Implement and manage SSO and PAM solutions to strengthen authentication security. • Collaborate with engineering and security teams to ensure best practices and compliance standards are met. Required qualifications to be successful in this role To succeed … VMware Cloud Foundation, NSX, and VxRail to develop and manage virtualised environments. • In-depth knowledge of networking principles and security best practices. • Experience with implementing and managing SSO and PAM solutions for enhanced security. • Strong problem-solving, communication, and stakeholder management skills to work effectively across teams. #LI-JW1 Together, as owners, let's turn meaningful insights into action. More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
designing and implementing identity solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No one day is the same … non-technical audiences. Desirable Experience of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC … using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and More ❯
designing and implementing identity solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No one day is the same … non-technical audiences. Desirable Experience of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC … using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know us, as much as we are getting to know you! Our interviews are conversational and More ❯
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯
as quickly as possible and to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to company growth and the dynamic … Experience with physical, virtual, and cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE are advantageous. Strong analytical mindset More ❯
Information Security Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to More ❯
Manager, Renewal Management - EMEA (12 month FTC) About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations … highly impactful renewals with an advanced proficiency to think bigger picture and not only close negotiations, but also expand account opportunities via cross selling and up selling Pivotal in management of EMEA Renewals team's pipeline forecasting exercises and metrics Drive the team process and operational rigor to support the growing Saas/Subscription renewal organization and transformation Identify … a playbook for renewal engagement, maximizing revenue retention and minimizing friction/risk within customer journey Qualifications Experience in growing and managing a renewals team Renewals and customer success management experience in a security or enterprise solution environment - SaaS experience preferred Experience owning pipeline forecasting in Renewals, or Customer Success, or Sales - grasp of the complexity of forecasting in More ❯
optimisation of the SharePoint environment. Essential Skills & Experience: Proven experience delivering multiple end-to-end SharePoint Online implementations. Strong hands-on knowledge of SharePoint Online, including site collections, permissions management, content types, metadata, and Power Platform integrations. Experience designing solutions that cater to varied organisational structures and workflows. Excellent interpersonal and stakeholder engagement skills, with the ability to explain … Experience working in cross-functional project teams and managing change in complex environments. Desirable Skills: Knowledge of Entra ID (formerly Azure AD) and PrivilegedAccessManagement (PAM) principles. Awareness of AI and Microsoft Copilot and how they can be leveraged to enhance SharePoint capabilities. Experience with Microsoft Teams and broader Microsoft 365 ecosystem. Familiarity with governance, compliance … and lifecycle management within Microsoft 365 environments. More ❯
optimisation of the SharePoint environment. Essential Skills & Experience: Proven experience delivering multiple end-to-end SharePoint Online implementations. Strong hands-on knowledge of SharePoint Online, including site collections, permissions management, content types, metadata, and Power Platform integrations. Experience designing solutions that cater to varied organisational structures and workflows. Excellent interpersonal and stakeholder engagement skills, with the ability to explain … Experience working in cross-functional project teams and managing change in complex environments. Desirable Skills: Knowledge of Entra ID (formerly Azure AD) and PrivilegedAccessManagement (PAM) principles. Awareness of AI and Microsoft Copilot and how they can be leveraged to enhance SharePoint capabilities. Experience with Microsoft Teams and broader Microsoft 365 ecosystem. Familiarity with governance, compliance … and lifecycle management within Microsoft 365 environments. More ❯
optimisation of the SharePoint environment. Essential Skills & Experience: Proven experience delivering multiple end-to-end SharePoint Online implementations. Strong hands-on knowledge of SharePoint Online, including site collections, permissions management, content types, metadata, and Power Platform integrations. Experience designing solutions that cater to varied organisational structures and workflows. Excellent interpersonal and stakeholder engagement skills, with the ability to explain … Experience working in cross-functional project teams and managing change in complex environments. Desirable Skills: Knowledge of Entra ID (formerly Azure AD) and PrivilegedAccessManagement (PAM) principles. Awareness of AI and Microsoft Copilot and how they can be leveraged to enhance SharePoint capabilities. Experience with Microsoft Teams and broader Microsoft 365 ecosystem. Familiarity with governance, compliance … and lifecycle management within Microsoft 365 environments. More ❯
Why Join CyberIAM? We are the UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and PrivilegedAccessManagement (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. We’re looking for a Partnerships Manager to join our growing team in Chester or London . If you’re a natural … Financial Perks: Up to 6% pension contribution (10% total). ⚖️ Work-Life Balance: Flexible working & a dedicated social fund. 💵 Competitive Salary + Commission What You’ll Do 🤝 Partner Relationship Management Identify, recruit, and onboard new partners (VARs, SIs, tech providers). Strengthen relationships with existing partners to drive satisfaction and retention. Develop joint business plans and growth strategies with More ❯
/Qualifications: Knowledge of MOD ICT and network standards. Familiarity with MOD documentation standards. Technical expertise in: VMware. Linux. Microsoft Windows (including Active Directory, RDS, and Group Policy). PrivilegedAccess Management. Auditing, and Logging policies. Backup and storage systems. IP networking. IR35 Determination: Outside IR35 Duration: Contract-only 6 months Location: Min 4 days per week at More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
team on a 6 month initial contract working hybrid, based out of their site in Warwickshire. This role requires candidates to hold an active security clearance. Experience: Implementation and Management: Oversee … the implementation and management of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and resolve issues related to CyberArk … implementation and management. Certifications: Relevant certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various teams and stakeholders. Due to More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
VANLOQ LIMITED
connectivity. Excellent stakeholder engagement and communication skills. Ability to work independently and take full ownership of delivery. Proficient in MS Project and resource planning tools. Strong risk and issue management capabilities. Effective leadership, conflict resolution, and problem-solving skills. Highly organized with excellent time management abilities. Team-oriented mindset with a positive and proactive … approach. Desirable Skills Experience working in global teams or within large organizations. Familiarity with tools such as JIRA and JIRA Plans. Background in Architecture or Design teams. Understanding of PAM (PrivilegedAccessManagement) tools. Previous experience working within financial services. Seniority Level Mid-Senior level Industry IT Services and IT Consulting Employment Type Contract Job Functions Project … Management Skills J More ❯