Identity Access Management Jobs in Guildford

2 of 2 Identity Access Management Jobs in Guildford

EUC Service Delivery Manager

guildford, south east england, united kingdom
Hybrid / WFH Options
Bytes Software Services
and mobile devices, including procurement, deployment, lifecycle management, and asset tracking. Define and enforce device standards, configurations, and security controls using tools such as MDM and endpoint management platforms. Drive continual service improvements through automation, self-service solutions, knowledge base development, and performance reporting. Collaborate with IT and business stakeholders, acting as the point of escalation … relationships where third-party support services are involved. Identity & Access Management (IAM) Oversee user lifecycle management (joiners, movers, leavers) and enforce access control policies. Ensure compliance with security standards, governance, and audit requirements. Implement and maintain IAM processes to support role-based access and least privilege principles. Collaborate … the procurement, provisioning, deployment, and lifecycle of laptops and mobile devices. Define and enforce device standards, configurations, and security controls (e.g., MDM, encryption). Maintain accurate inventory and asset management records. Ensure timely delivery of hardware to new hires and replacement devices to existing staff. Collaborate with vendors and suppliers to manage stock, warranties, and support contracts. Leadership More ❯
Posted:

Cyber Security Administrator

guildford, south east england, united kingdom
ESP Utilities Group Ltd
for the day-to-day operation, monitoring, and improvement of the organization’s cybersecurity posture. This role ensures that systems and data remain secure and available through proactive management, incident response, and collaboration with SOC and SIEM teams. The successful candidate will have hands-on experience in Microsoft 365 and Azure environments, as well as familiarity with MDR … configurations, firewall rules, and endpoint protection settings. Identify, assess, and remediate manual configuration vulnerabilities in systems and applications. Maintain and review user access controls, MFA enforcement, and identity protection settings. Review, audit, and remediate Identity and Access Management (IAM) credentials and permissions to ensure least privilege access, reduce … risk of credential misuse, and maintain compliance with security policies. Review, monitor, and manage Data Loss Prevention (DLP) policies and technologies to prevent unauthorized data access, transmission, or exfiltration across endpoints, email, and cloud services. Assist in the implementation and upkeep of MDR (Managed Detection and Response) solutions. Administer and optimise email security controls (e.g., Microsoft Defender for More ❯
Posted: