CIS, and SOC 2. Requirements Requirements Good hands-on experience with IAM tools such as Entra ID (Azure AD), Okta, AWS IAM, GCP IAM, CyberArk, and SailPoint. In-depth understanding of identity and access management concepts, including authentication, authorization, provisioning, de-provisioning, and lifecycle management. Strong expertise with authentication More ❯
with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS SQL or PostgreSQL More ❯
COBIT, ITIL, etc.). Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure Active Directory), SailPoint, or similar. Experience with CyberArk for user and service account privileged access management. Excellent analytical, problem-solving, presentation, and communication skills. Ability to work collaboratively with cross-functional teams More ❯
lifecycle. In-depth knowledge of Identity Governance solutions (IGA), configuration, security, integration, reporting, and testing methodologies. Experience with IGA solutions (e.g., SailPoint, Okta, PingIdentity, CyberArk) and on-prem/SaaS implementations. Strong understanding of business processes, identity-first security, IT controls, risk management, and compliance standards. Experience with authentication More ❯
cycle. In-depth knowledge of Identity Governance solutions (IGA), configuration, security, integration, reporting, and testing methodologies. Experience with IGA solutions (e.g., SailPoint, Okta, PingIdentity, CyberArk) and on-prem/SaaS implementations. Strong understanding of business processes, identity-first security, IT controls, risk management, and compliance standards. Experience with authentication More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge of network More ❯
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Hays
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
team and align security measures with enterprise IT security frameworks. Understanding of Security Solutions: MS Sentinel/Defender/Entra, Zscaler ZPA ZTMA, CrowdStrike, CyberArk, SailPoint, Ping, and ability to design and build a controls dashboard from evidence outputs from MS solutions, using ISO27K, NIST, NIS 2, DORA, TISAX More ❯
and capabilities (e.g., Sailpoint , Saviynt), joiner/mover/leaver processes and identity proofing. Experience with credential vaulting and rotation tools and capabilities (e.g., CyberArk, Thycotic) Expertise in Active Directory security monitoring and configuration in a large enterprise Solid understanding of common identity security threats (e.g., credential harvesting, credential More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
Leadership: Over 5 years of experience in IAM, IGA, and PAM, including leadership roles. Technical Skills: Hands-on experience with tools like SailPoint, Saviynt, CyberArk, Okta, Azure AD, and BeyondTrust. Cloud Expertise: Proficient in cloud IAM/PAM practices (AWS, Azure, GCP).Reward & Benefits - A fair and competitive salary More ❯
of services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our … Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible for ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities … 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment More ❯
IGA) and Privileged Access Management (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends and the evolution of IAM technologies. Experience managing stakeholder relationships, both internally and externally. Ability to balance delivery More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Leadership: Over 5 years of experience in IAM, IGA, and PAM, including leadership roles. Technical Skills: Hands-on experience with tools like SailPoint, Saviynt, CyberArk, Okta, Azure AD, and BeyondTrust. Cloud Expertise: Proficient in cloud IAM/PAM practices (AWS, Azure, GCP). Reward & Benefits A fair and competitive More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
development. Proven experience of managing and delivering aspects of IAM projects. Proven experience of implementing one or more of the following IAM solutions: Sailpoint, CyberArk, OneIdentity, Okta, BeyondTust and Microsoft Entra ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from More ❯
High Wycombe, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Dreams Ltd
day: - Daily BAU checks and triage plus proactive maintenance for: o Firewall/web filter errors and threats o Security emails - Validate contents o Cyberark dashboard - Application inbox o Mimecast errors and threats o Web filter Unblock requests o MS Defender analysis - Assist service desk users with triage of More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request”. Role: CyberArk SME Job Type: Permanent Location: Coventry Ready to utilise your skills in Cybersecurity? Are you looking for an exciting opportunity as a CyberArk SME? Make a meaningful impact as a CyberArk SME Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities … customers and identify opportunities to support their strategy and improve their processes across functions. Gain access to endless learning opportunities. The Role As a CyberArk SME you will implement different CyberArk Solutions, perform automation and integrate with different products. Key responsibilities: Responsible for implementing, maintaining, upgrading CyberArkMore ❯
audience you are engaging with in this role. Experience of Information Security, and a solid IT background. Excellent presentation and documentation skills. Knowledge of CyberArk PAM capabilities including Hybrid Environments (On-Prem, AWS, Azure). Our customer first behaviours put customers and members at the heart of how we More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Morson Talent
ongoing Identity & Access Management projects; the focus being working with project teams to complete technical onboarding ,testing and production deployment. Ongoing projects include both CyberArk and SailPoint with the role requiring engineering experience in either one however preferably both. The role reports directly to the project manager. The role … and drive action from key decision makers Key Skills/Experience: • Experience in security or Cyber Security Degree • IT Security/Information Security knowledge • CyberArk PAM • SailPoint IdentityIIQ • Hands-on experience with Windows/Linux , scripting (Bash, PowerShell, Perl) , SQL , APIs , and connectors (JDBC, API). • Experience with relevant More ❯
to collaborate with talented professionals, gain exposure to cutting-edge technology, and access continuous learning and development opportunities. What You'll Do As a CyberArk Consultant , you will play a key role in advising and implementing CyberArk solutions for clients, helping them optimize their security posture through the … use of best-in-class privileged access management. Your responsibilities will include: Consultation & Implementation : Advise and implement CyberArk solutions, ensuring successful deployment and integration with client environments Security Patch Management : Apply necessary security patches to CyberArk systems to ensure continued compliance and protection Client Roadmap Input : Provide valuable … Product Owner/Engineering Manager for defining and evolving the product roadmap based on client needs Feature Deployment : Implement and customize new features of CyberArk products, including Vault, CPM, PVWA, PSM, PSMP, CP, CCP, EPM, and Alero Process Automation : Design and implement automation for routine tasks, streamlining client processes More ❯