|
3 of 3 Remote Privileged Access Management Jobs in Slough
slough, south east england, United Kingdom Hybrid / WFH Options Intec Select
all applications across all areas of the business. You will lead and be collectively responsible for ensuring IT Security is managed through Identity and Access Management and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and Access Management, especially through … technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and Access Management platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. Proactively initiate investigations for improvements for standard operating processes and procedures, utilising the … current owned/licensed tools available, to evidence and escalate issues to the management team. Play a leading role in documenting, presenting and using direct communication to map software lifecycle, create work breakdown structures (WBS) and the appropriate supporting documentation Lead technical delivery, supporting the programme and project managers More ❯
slough, south east england, United Kingdom Hybrid / WFH Options Siena Partnership
work, with a slight bias towards project work. Key current and upcoming projects are in the following areas: * Privileged Access Management ( PAM) * Data Loss Prevention (with an element of AI) * Managed Services Security Providers (MSSP) * Network segmentation This role would suit someone with a security engineering background … environment. I have a full JD I can share once we've spoken, but these are the key requirements: * Endpoint Detection and Response, WAF, Privileged Access Management, Cloud Security, CASB, Firewalls, SIEM platforms * Microsoft tech stack - Azure, M365, Windows Server 201202022, OnPrem EntraID * Security framework knowledge across More ❯
slough, south east england, United Kingdom Hybrid / WFH Options Ultima
design and implementation, across several of the skills and technologies below: Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Sentinel Tenable Vulnerability Management (Or similar technology) Azure Security understanding Azure update Manager/Other Patching technologies Qualifications: Microsoft Security Certifications (eg SC200) Pen Testing/Related Certifications … Microsoft Intune (Focused on Security, not the full suite) Microsoft Defender for Cloud Apps, Identity Cloud CSPM Suites Privileged Access Management ( PAM) Tooling Cloud Email Security Solutions Certs CSTM, Cyber Essentials Assessor KEY COMPETENCIES REQUIRED FOR ROLE In line with our company values every employee must be … being attentive to detail and willing to try to improve one’s own performance. Understanding and adherence to quality procedures. Decision Taking and Risk Management – Willingness to take difficult decisions and have confidence in your decision making and attitude to risk and impact. Respect Communication – Clarity and confidence in More ❯
|
|