london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
Identity & AccessManagement (IAM) Manager Location: Hybrid/London Salary: Up to £80k + Discretionary Bonus + Additional corporate benefits package The Client: A leading global consultancy firm requires an IAM Manager About the Role: We are seeking a highly skilled Identity & AccessManagement (IAM) Manager … delivery. Technical Expertise & Skills Required: Strong subject matter expertise across IAM domains, including Identity Governance Administration (IGA) and PrivilegedAccessManagement (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends … delivery and business development activities effectively. Desirable Experience: Proven background in corporate, utilities, or financial sectors. Hands-on expertise in enterprise identity, customer IAM, accessmanagement, and privilegedaccess management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
date: 23/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccessManagement (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. … You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do … Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/ More ❯
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), PrivilegedAccessManagement (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled. Location - UK or Europe PAM Conjur Consultant will provide PAM solutions that are commensurate with the delivery needs within the ambit of the given customer environment to achieve desired business … continuous improvement of the implemented tool and associated services as per best practices and industry standards to help our customers mitigate risks associated with privileged accounts. Education Qualification & Experience: Bachelor’s Degree in Computer Science, Cybersecurity, Information Security, Engineering, Information Technology, or related discipline. Overall 12+ years … and at least 8 to 10 years of experience in architecture, design, deployment & implementation of PrivilegedAccessManagement using multi-vendor PAM solutions (preferably CyberArk , Hashicorp) that are deployed globally for large scale customers across various industry verticals Mandatory Certifications: Conjur Certified Delivery Engineer (CDE-CPC Conjur More ❯
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯