based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Identity & AccessManagement (IAM) Manager Location: Hybrid/London Salary: Up to £80k + Discretionary Bonus + Additional corporate benefits package The Client: A leading global consultancy firm requires an IAM Manager About the Role: We are seeking a highly skilled Identity & AccessManagement (IAM) Manager … delivery. Technical Expertise & Skills Required: Strong subject matter expertise across IAM domains, including Identity Governance Administration (IGA) and PrivilegedAccessManagement (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends … delivery and business development activities effectively. Desirable Experience: Proven background in corporate, utilities, or financial sectors. Hands-on expertise in enterprise identity, customer IAM, accessmanagement, and privilegedaccess management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
Identity & AccessManagement (IAM) Manager Location: Hybrid/London Salary: Up to £80k + Discretionary Bonus + Additional corporate benefits package The Client: A leading global consultancy firm requires an IAM Manager About the Role: We are seeking a highly skilled Identity & AccessManagement (IAM) Manager … delivery. Technical Expertise & Skills Required: Strong subject matter expertise across IAM domains, including Identity Governance Administration (IGA) and PrivilegedAccessManagement (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends … delivery and business development activities effectively. Desirable Experience: Proven background in corporate, utilities, or financial sectors. Hands-on expertise in enterprise identity, customer IAM, accessmanagement, and privilegedaccess management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to … apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: Identity and AccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the … many other memberships and perks designed to enhance the workplace experience, your health, and wellbeing. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams … and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance PrivilegedAccessManagement (PAM) AccessManagement Customer Identity and AccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently … people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to More ❯
The team you'll be working with: We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of … competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low … Level). User Profiles, Use Cases & IDAM/PAM processes. Work with other teams to agree Implementation plans and effort. Appropriate metrics, and processes to achieve client objectives and targets. Enact: The setup of test, development and production IDAM & PAM environments. IDAM & PAM technology implementation & configurations. Robust practices for the More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Security Architect who will provide expert advice and guidance on Identity and AccessManagement (IDAM) and PrivilegedAccessManagement (PAM) solutions. This is a hybrid role - 2 days in London, 3 days remote. The role falls inside IR35 so you will need to work through … experience in a Cyber/Information Security Role. You must hold a relevant Security Certifications (e.g., CISSP, CISM). Extensive experience in IDAM/PAM consulting, with a proven track record of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra, AWS IAM … best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience in developing and presenting IDAM/PAM roadmaps and strategic recommendations is also required. You must be eligible for SC Clearance if not already cleared. Please apply ASAP to discuss further. More ❯
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The … users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential … policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯
East London, London, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
view to extend We are seeking an experienced Performance Tester to join our team on a high-profile PrivilegedAccessManagement (PAM) project. The successful candidate will be responsible for designing, executing, and analyzing performance testing scenarios to validate the scalability, stability, and responsiveness of PAM tools. … Key Responsibilities: Collaborate with business analysts, solution architects, and system engineers to understand performance requirements and use cases related to the PAM platform. Design, script, and execute performance, load, stress, and scalability tests using tools such as LoadRunner, LRE, JMeter, Gatling , or similar Designed and implemented workload models based on … to LG agents to ensure reliable test execution. Validate key non-functional requirements (NFRs) including response time, throughput, concurrent sessions, and transaction volumes across PAM components (e.g., vault, session management, API gateways). Simulate high-load scenarios involving account onboarding, password rotation, session recording, and audit logging. Monitor system More ❯
of IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents … including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, PrivilegedAccessManagement, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance More ❯
Security London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services … agency and execution, market making, and hedging and investment solutions. It has a leading franchise in many major metals, energy and agricultural products, with access to 60 exchanges. The group provides access to the world's major commodity markets, covering a broad range of clients that include some … security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privilegedaccess monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and More ❯
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
London, East London, United Kingdom Hybrid / WFH Options
Reed Technology
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled. Location - UK or Europe PAM Conjur Consultant will provide PAM solutions that are commensurate with the delivery needs within the ambit of the given customer environment to achieve desired business … continuous improvement of the implemented tool and associated services as per best practices and industry standards to help our customers mitigate risks associated with privileged accounts. Education Qualification & Experience: Bachelor’s Degree in Computer Science, Cybersecurity, Information Security, Engineering, Information Technology, or related discipline. Overall 12+ years … and at least 8 to 10 years of experience in architecture, design, deployment & implementation of PrivilegedAccessManagement using multi-vendor PAM solutions (preferably CyberArk , Hashicorp) that are deployed globally for large scale customers across various industry verticals Mandatory Certifications: Conjur Certified Delivery Engineer (CDE-CPC Conjur More ❯
to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled. Location - UK or Europe PAM Conjur Consultant will provide PAM solutions that are commensurate with the delivery needs within the ambit of the given customer environment to achieve desired business … continuous improvement of the implemented tool and associated services as per best practices and industry standards to help our customers mitigate risks associated with privileged accounts. Education Qualification & Experience: Bachelor’s Degree in Computer Science, Cybersecurity, Information Security, Engineering, Information Technology, or related discipline. Overall 12+ years … and at least 8 to 10 years of experience in architecture, design, deployment & implementation of PrivilegedAccessManagement using multi-vendor PAM solutions (preferably CyberArk , Hashicorp) that are deployed globally for large scale customers across various industry verticals Mandatory Certifications: Conjur Certified Delivery Engineer (CDE-CPC Conjur More ❯
Coaching auditors and supporting them to realise their potential on the engagement The skills youll need Were looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. Youll also need: In depth understanding of Infrastructure and Cyber Security …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to … assess and prioritise data effectively, quickly establishing whats important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way More ❯