Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
and identity management needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factorauthentication (MFA), and Privileged Access Management. (PAM) Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with … and principles. Technical expertise in identity and access management systems and solutions. Essential Technical Skills & Qualifications Strong understanding of IAM principles and technologies. Authentication protocols (e.g., Kerberos, LDAP, OAuth, SAML) Managing Active Directory and Azure AD in enterprise environments. Familiarity with Zero Trust and modern security principles. Desirable More ❯
culture is implemented and embedded throughout the institute. Identity & Access Management (IAM) Design and implement robust IAM frameworks, ensuring least-privilege access, Multi-FactorAuthentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve Privileged Access Management (PAM) solutions to safeguard More ❯
problems or issues in a structured and disciplined manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factorauthentication (MFA), Privileged Access Management (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Bright Purple
services that optimize cloud solutions, including resource tuning and scalability. Ensure security is integrated into all architecture aspects, including network security, encryption, multi-factorauthentication, authorization, identity management, and intrusion detection/prevention. About You: Proven experience in the secure design of cloud platform More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
that optimise cloud solutions, including cloud resources, tuning and potential growth. Ensure security is integrated into all architecture including network security, encryption, multi-factorauthentication, authorisation, identity management, intrusion detection/prevention. About You: Proven experience in the secure design of cloud platform environments More ❯