where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
support flexible working - click here for more information on flexible working options Flexible Working Options Hybrid Working, Job Share Job Description Summary Job Description JOB TITLE: Head of Identity & AccessManagement Operations SALARY: From £125,000 dependent on experience and location LOCATION(S): This position is based in Edinburgh, Leeds, Manchester, Bristol or London … involves spending at least two days per week currently, or 40% of our time, at our office location. About this opportunity As the Head of IdentityandAccessManagement Operations, you'll have overall ownership for the identityandaccessmanagement (IAM) strategy and its implementation. You'll … ever-changing needs of our 26 million customers. We're growing with purpose. Join us on our journey and you will too! What you'll need IAM Operations Management: Leading improvements in IAM processes and delivery using new methodologies, techniques, and tools. Shaping the direction for cross-functional teams to deliver secure IAM solutions. Customer Centricity: Promoting the More ❯
a Technical Solution Design and Delivery Engineer to work with one of our financial services clients. This is to work on high profile project regarding SSH keys discovery, managementand remediation across on-prem … and the Cloud.We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the IdentityandAccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management … access reconfiguration and operational handover. Deep expertise in Identityandaccessmanagement, Privileged accessmanagementand secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key More ❯
Hungary, we support 20+ country units and 24000+ employees in the world. Our support consists of a wide range of centralised global IT services such as programming, database management, project management, agile/dev/ops, and more. We continue to maximise the value from having a clear digital and data technology platform strategy that extends … digital, and competitive, efficient, and effective, and to provide the best solutions and customer experience for our customers and shareholders. As a Lead CIAM (Customer IdentityandAccessManagement) Engineer, you'll play a pivotal role in shaping and delivering secure, scalable identity solutions across a global enterprise. Leveraging platforms such as … multiple time zones. We'd love to hear from you if you have: Experience with IBM Security Access Manager and Okta Auth0. Strong troubleshooting, communication, and project management skills. Knowledge of DNS, networking, Java/.NET, cloud, and scripting (JSON, PowerShell, Ansible, Java, Terraform). Understanding of accessmanagement, PKI, and security More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privileged accessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with … certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privileged accessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with … certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privileged accessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with … certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privileged accessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with … certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privileged accessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with … certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
of SAP, Oracle, or Workday and their role in best-in-class operating models across industries. Complementary Technologies: Experience with associated technologies, including: Major cloud platforms (IaaS & PaaS) Identity & AccessManagement Data platforms Service management & automation IoT & Operational Technology API management (For Workday specialists) Strong understanding of HR and Finance … Enterprise solutions. Stakeholder Engagement: Build strong relationships with internal teams, senior leadership, and strategic alliance partners. Mentorship & Development: Support and mentor junior digital architects, fostering growth through formal managementand informal coaching. As part of your role you will also have the opportunity to contribute to the business and your own personal growth, through activities that form part … you should have expertise in architecting solutions for key operating model domains. Experience in at least two of the following areas, including their integration, is essential: Supply Chain Management Resource & Material Planning Product Lifecycle Management Inventory & Warehouse Management Manufacturing Execution Service Operations Customer Engagement, Experience & Relationship Management Field Service Finance Human Capital More ❯
of SAP, Oracle, or Workday and their role in best-in-class operating models across industries. Complementary Technologies: Experience with associated technologies, including: Major cloud platforms (IaaS & PaaS) Identity & AccessManagement Data platforms Service management & automation IoT & Operational Technology API management (For Workday specialists) Strong understanding of HR and Finance … Enterprise solutions. Stakeholder Engagement: Build strong relationships with internal teams, senior leadership, and strategic alliance partners. Mentorship & Development: Support and mentor junior digital architects, fostering growth through formal managementand informal coaching. As part of your role you will also have the opportunity to contribute to the business and your own personal growth, through activities that form part … you should have expertise in architecting solutions for key operating model domains. Experience in at least two of the following areas, including their integration, is essential: Supply Chain Management Resource & Material Planning Product Lifecycle Management Inventory & Warehouse Management Manufacturing Execution Service Operations Customer Engagement, Experience & Relationship Management Field Service Finance Human Capital More ❯
Excellent stakeholder engagement, collaboration, and communication skills Additional experience in one or more of the following areas would be advantageous: Identity & AccessManagement (IDAM) and SIEM Security controls and compliance with NIS regulations Remote access, software-defined networking, and hyper-converged infrastructure Public sector or utilities industry knowledge At Sword, our core … to discuss your individual preferences to make it work where we can. A Fantastic Benefits Package: This includes generous annual leave allowance, enhanced family friendly benefits, pension scheme, access to private health, well-being, and insurance schemes, an employee assistance programme, discounted cash plan and more At Sword we are dedicated to fostering a diverse and inclusive workplace … re looking for, please do consider applying and highlight your transferable skills and experience. We embrace diversity in all its forms, valuing individuals regardless of age, disability, gender identity or reassignment, marital or civil partner status, pregnancy or maternity status, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation. Your perspective and potential More ❯
expanding its global footprint with around 2,500 colleagues in 12 countries, and more than 170 clients in 35 countries. We are an industry-leading provider of wealth management technology and services for financial institutions around the world, including private banks and wealth managers, investment managers, as well as retail and neo banks. Our research led approach and … powered by the passion and creativity of our colleagues. We are always looking for talented people to join us on our mission to orchestrate the financial ecosystem and democratize access to wealth management. Avaloq offers the opportunity to work closely with some of the worlds leading financial institutions as we jointly develop and shape careers. Championing a collaborative … issue Maintain the great team spirit and excellent collaboration, despite the distributed nature of the team Required profile: What you need In-depth knowledge of IdentityandAccessManagement tools (such as Ping Identity) Strong software engineering background and knowledge of Spring Boot, Angular, SQL, JPA, JMS and JAX-RS, with eagerness More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
TEKsystems
applications and systems into SailPoint IIQ. Automate manual tasks and improve data quality through regular analysis and validation. Design and maintain reports, dashboards, and KPIs/KRIs for identity governance performance. Key Skills Extensive experience in IdentityAccessManagement with SailPoint IdentityIQ. Proficiency in Java, BeanShell, XML, and SQL. Experience with application … connectors for systems such as Active Directory, Azure AD, and Oracle. Experience customizing workflows, forms, rules, roles, policies, reports, and certifications within IdentityIQ. Implementation experience with Role-Based Access Control (RBAC) and Segregation of Duties (SOD) policies. Strong understanding of security protocols and strategies. Excellent technical and non-technical communication skills. Ability to translate requirements into business-relevant … Group are Allegis Group brands. If you apply, your personal data will be processed as described in the Allegis Group Online Privacy Notice available at our website. To access our Online Privacy Notice, which explains what information we may collect, use, share, and store about you, and describes your rights and choices about this, please go our website. More ❯
Responsibilities Assist in the design and implementation of technical solutions and security toolsets to address security vulnerabilities, mitigate cyber threats, and automate tasks. Contribute to the planning, implementation, andmanagement of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cyber security infrastructure and technologies. Create and maintain detection rules … and protocols. Collaborate closely with the Cyber Defence team to uphold enterprise defence practices, guidelines, and procedures. Provide support for incident response efforts as needed. Assist with operational andmanagement reporting produced by the team. Skills/Qualifications A highly self-motivated individual with positive mindset & can-do attitude, and a strong believer of "Security as an enabler … including multinational connectivity; Experience with various security technologies such as NDR/content filtering/FW/IPS/IDS/DDOS, EDR/MDR, DAST/SAST, IdentityAccessManagement, SIEM & SOAR, log management. Preferable experience in Azure, AWS, Defender, Darktrace. Experience and technical knowledge in multiple areas of cyber defence operations. Experience More ❯
Senior Project Manager – Digital Identity Edinburgh (hybrid flexibility) Our client delivers bespoke Identity & AccessManagement (IAM) solutions worldwide to simplify onboarding, enhance security, and improve operational efficiency Your Role: Senior Project Manager As a pivotal member of the delivery team, you will: Lead full lifecycle software projects – delivering on time, within budget More ❯
a Security Design An understanding of cyber security design principles to ensure solutions meet industry standards An understanding of frameworks and compliance The Ability to work with risk management processes and articulate the risks and benefits An understanding of networks and cloud environments is advantageous Comfortable creating design documentation and presenting to clients Key Responsibilities: Specialised technical knowledge … GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & AccessManagement Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident Response team is advantageous These ongoing contract engagements will attract a day rate commensurate with the depth of skills and experience required. You'll join a team of experienced engineers working with cutting edge tech across a range of interesting More ❯
a Security Design An understanding of cyber security design principles to ensure solutions meet industry standards An understanding of frameworks and compliance The ability to work with risk management processes and articulate the risks and benefits An understanding of networks and cloud environments is advantageous Comfortable creating design documentation and presenting to clients Requirements Key Responsibilities: Specialised technical … GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & AccessManagement Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident Response team is advantageous Benefits These ongoing contract engagements will attract a day rate commensurate with the depth of skills and experience required. You'll join a team of experienced engineers working with cutting edge tech across a range of More ❯
re not your average IT consultancy—we’re employee-owned, award-winning, and proud holders of 5 out of 6 Microsoft Designations and 3 Specialisations in Cloud Security, Identity & AccessManagement, and Microsoft Teams Calling. Now, we’re growing our Managed Security Services team and looking for a Senior Security Engineer with a passion … Provider Deep experience with Microsoft Defender suite (MDE, MDO, MDCA, MDI) and Microsoft Sentinel Strong knowledge of KQL, Logic Apps, and automation/orchestration tools Skilled in endpoint, identity, and cloud security Familiar with Microsoft 365 and Azure security best practices Excellent communicator—comfortable explaining complex security risks to both tech teams and business leaders Passion for learning More ❯
re not your average IT consultancy—we're employee-owned, award-winning, and proud holders of 5 out of 6 Microsoft Designations and 3 Specialisations in Cloud Security, Identity & AccessManagement, and Microsoft Teams Calling. Now, we're growing our Managed Security Services team and looking for a Senior Security Engineer with a passion … Provider Deep experience with Microsoft Defender suite (MDE, MDO, MDCA, MDI) and Microsoft Sentinel Strong knowledge of KQL, Logic Apps, and automation/orchestration tools Skilled in endpoint, identity, and cloud security Familiar with Microsoft 365 and Azure security best practices Excellent communicator—comfortable explaining complex security risks to both tech teams and business leaders Passion for learning More ❯
My1Login is the UK's leading, multi-award-winning IdentityandAccessManagement service that enables seamless user access to web, mobile and Windows desktop applications delivering operational savings and protecting businesses against the financial and reputational damage of a data breach. We are looking for aCloud Engineer to work onthe My1Login More ❯
My1Login is the UK's leading, multi-award-winning IdentityandAccessManagement service that enables seamless user access to web, mobile and Windows desktop applications delivering operational savings and protecting businesses against the financial and reputational damage of a data breach. QA Automation Engineer working on the My1Login products and services. More ❯
difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses: interactive investor (ii)- the UK's … of DevOps practices and tools (Azure DevOps, GitHub, CI/CD). Strong knowledge of networking concepts (DNS, VPN, firewalls, load balancers). Experience with identityandaccessmanagement in Azure. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of … annual leave, a 16% employer pension contribution, a discretionary performance-based bonus (where applicable), private healthcare and a range of flexible benefits - including gym discounts, season ticket loans andaccess to an employee discount portal. You can read more about our benefitshere. Our business Enabling our clients to be better investors drives everything we do. Our business is More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯