an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the business. The client are … a multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous experience in this will … be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure but others more »
an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the business. The client are … a multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous experience in this will … be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure but others more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM Programme … Manager Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to more »
Our client is seeking a dedicated and knowledgeable Security identity access Manager to join their dynamic team. This role sits within the Cyber Security product group, focusing on Identity & Access platforms for PrivilegedAccessManagement and Identity Governance and Administration. The successful candidate will have … the opportunity to deliver enterprise security services to the organisation, acting as a subject matter expert in identity and access technologies. This role offers an exciting opportunity to drive forward the Digital Identity function within Cyber Security, creating a community of inter-departmental identity and access teams. Opportunity … to be a subject matter expert in identity and access technologies Drive forward the Digital Identity function within Cyber Security Create a community of inter-departmental identity and access teams What you'll do: As a Security identity acess Manager, you will play a pivotal role in shaping more »
into the UK Market as an integrator of third-party Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions for businesses across various sectors. Their expertise lies in seamlessly integrating third-party IAM and … PAM solutions into complex IT environments, ensuring enhanced security, compliance, and operational efficiency for their clients. Job Description: As a IAM/PAM Security Consultant you will play a crucial role in delivering bespoke IAM and PAM integration solutions to clients across various sectors. You will be responsible for the … design, configuration, testing, deployment, and post-implementation support. This role requires a deep understanding of both the technical and strategic aspects of IAM and PAM technologies, as well as the ability to design and implement solutions that integrate smoothly with clients' existing IT infrastructure. The successful candidate will act as more »
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
and excellence, we continuously strive to stay ahead of emerging threats and deliver robust security frameworks. Role Overview: We are seeking an experienced Identity & Access Specialist to join our Cyber Security team. In this role, you will be responsible for driving the development and enhancement of identity governance and … privilegedaccess processes. As a subject matter expert in identity and access technologies, you will ensure alignment with business priorities and policies. Responsibilities: Serve as a subject matter expert for identity and access technologies, driving continuous improvement in identity governance and privilegedaccess processes. … with peers, Product Owners, and Product Architects to advance the Digital Identity function within Cyber Security. Establish a community among inter-departmental identity and access teams. Support the design and implementation of new enterprise security products, services, policies, and procedures. Coach and guide Digital Technology & Innovation (DTI) Product Groups more »
and excellence, we continuously strive to stay ahead of emerging threats and deliver robust security frameworks. Role Overview: We are seeking an experienced Identity & Access Specialist to join our Cyber Security team. In this role, you will be responsible for driving the development and enhancement of identity governance and … privilegedaccess processes. As a subject matter expert in identity and access technologies, you will ensure alignment with business priorities and policies. Responsibilities: Serve as a subject matter expert for identity and access technologies, driving continuous improvement in identity governance and privilegedaccess processes. … with peers, Product Owners, and Product Architects to advance the Digital Identity function within Cyber Security. Establish a community among inter-departmental identity and access teams. Support the design and implementation of new enterprise security products, services, policies, and procedures. Coach and guide Digital Technology & Innovation (DTI) Product Groups more »
Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
Incident Specialist Join our Cyber Security product group as a Security Incident Specialist, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privilegedaccessmanagement processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
Incident Specialist Join our Cyber Security product group as a Security Incident Specialist, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privilegedaccessmanagement processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat management and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … the lead in the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetration testing and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present … standard accreditations and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privilegedaccessmanagement, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Some duties include: This role will be required to research, implement, and more »
month contract Inside IR35 We're seeking a skilled individual to join our clients CyberArk delivery team, deploying the cutting-edge CyberArk core PrivilegedAccess Security (PAS) solution to their esteemed clients. Responsibilities: Lead the deployment, configuration, and testing of CyberArk PAS, ensuring seamless integration across platforms like … support and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of PrivilegedAccessManagement processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, Identity Management policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an more »
london, south east england, United Kingdom Hybrid / WFH Options
Experis
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »