and Project Managers to ensure proposed solutions align with customer needs and approved designs. Championing sustainable design, incorporating energy-efficient hardware, virtualisation, efficient data management, and green software engineering principles. Providing technical leadership during the presales cycle. About You: We are looking for an experienced architect with a strong … AWS, Azure, VMWare usage and general knowledge. Data & Integration: Data Pipeline Orchestration (Airflow, Spark, NiFi etc.), Message Brokers (Kafka), Object Storage (S3, MinIO), API Management, Python Scripting. Automation & Low-Code: Low-code Platforms (Power Platform, Appian, UiPath etc.), RPA solutions, Business Process Analysis. DevSecOps & Security: CI/CD Pipelines … Azure DevOps preferred), IaC (Terraform, Ansible), SCA/IAST/DAST tooling (Black Duck, Snyk etc.), Automated Testing (Selenium, Robot Framework), Secure SecretsManagement (Vault). Methodologies: Experience with SAFe (Scaled Agile Framework) processes is beneficial. Don't meet every single requirement? Our client is passionate about investing More ❯
Employment Type: Permanent
Salary: £68000 - £75000/annum Car Allowance + Bonus
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯
watford, hertfordshire, east anglia, United Kingdom
Wipro
Guardian Certified CyberArk PAM Security Architect to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's … CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components … Access Security) EPV (Enterprise Password Vault) CPM (Central Policy Manager) PVWA (Password Vault Web Access) PSM (Privileged Session Manager) AAM (Application Access Manager) Conjur (SecretsManagement) Integrate CyberArk with other security tools and platforms (e.g., SIEM, IAM, ITSM). Configure and manage safes, platforms, and policies within CyberArk. More ❯