with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS SQL or PostgreSQL More ❯
COBIT, ITIL, etc.). Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure Active Directory), SailPoint, or similar. Experience with CyberArk for user and service account privileged access management. Excellent analytical, problem-solving, presentation, and communication skills. Ability to work collaboratively with cross-functional teams More ❯
lifecycle. In-depth knowledge of Identity Governance solutions (IGA), configuration, security, integration, reporting, and testing methodologies. Experience with IGA solutions (e.g., SailPoint, Okta, PingIdentity, CyberArk) and on-prem/SaaS implementations. Strong understanding of business processes, identity-first security, IT controls, risk management, and compliance standards. Experience with authentication More ❯
cycle. In-depth knowledge of Identity Governance solutions (IGA), configuration, security, integration, reporting, and testing methodologies. Experience with IGA solutions (e.g., SailPoint, Okta, PingIdentity, CyberArk) and on-prem/SaaS implementations. Strong understanding of business processes, identity-first security, IT controls, risk management, and compliance standards. Experience with authentication More ❯
CIS, and SOC 2. Requirements Requirements Good hands-on experience with IAM tools such as Entra ID (Azure AD), Okta, AWS IAM, GCP IAM, CyberArk, and SailPoint. In-depth understanding of identity and access management concepts, including authentication, authorization, provisioning, de-provisioning, and lifecycle management. Strong expertise with authentication More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge of network More ❯
of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra, AWS IAM, Google Cloud Identify, Okta, SailPoint, CyberArk, AuthO, and Ping Identity), standards, and best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience More ❯
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Hays
controls and contemporary IAM risks Experience utilising/implementing one or more of the following, the more the better: Okta, Entra ID, BeyondTrust, Oneidentity, CyberArk, Sailpoint Eligibility for SC clearance Demonstrable internal and external stakeholder engagement and management ability Good time management A resilient personality able to deal with More ❯
team and align security measures with enterprise IT security frameworks. Understanding of Security Solutions: MS Sentinel/Defender/Entra, Zscaler ZPA ZTMA, CrowdStrike, CyberArk, SailPoint, Ping, and ability to design and build a controls dashboard from evidence outputs from MS solutions, using ISO27K, NIST, NIS 2, DORA, TISAX More ❯
and capabilities (e.g., Sailpoint , Saviynt), joiner/mover/leaver processes and identity proofing. Experience with credential vaulting and rotation tools and capabilities (e.g., CyberArk, Thycotic) Expertise in Active Directory security monitoring and configuration in a large enterprise Solid understanding of common identity security threats (e.g., credential harvesting, credential More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
for a variety of engagements Desired experience Operating Systems (Linux, Windows) Knowledge of IBM tools (ISIM, ISDS, QRadar, Bigfix) and other IAM Solutions (e.g. CyberArk, SailPoint, Ping etc.) Understanding of RDBMS, LDAP, HTTP Server & Application Server Concepts Understanding of system integration techniques, e.g. Web Services, APIs, etc. Understanding of More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Leadership: Over 5 years of experience in IAM, IGA, and PAM, including leadership roles. Technical Skills: Hands-on experience with tools like SailPoint, Saviynt, CyberArk, Okta, Azure AD, and BeyondTrust. Cloud Expertise: Proficient in cloud IAM/PAM practices (AWS, Azure, GCP). Reward & Benefits A fair and competitive More ❯
Leadership: Over 5 years of experience in IAM, IGA, and PAM, including leadership roles. Technical Skills: Hands-on experience with tools like SailPoint, Saviynt, CyberArk, Okta, Azure AD, and BeyondTrust. Cloud Expertise: Proficient in cloud IAM/PAM practices (AWS, Azure, GCP).Reward & Benefits - A fair and competitive salary More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
development. Proven experience of managing and delivering aspects of IAM projects. Proven experience of implementing one or more of the following IAM solutions: Sailpoint, CyberArk, OneIdentity, Okta, BeyondTust and Microsoft Entra ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from More ❯
UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and Privileged Access Management (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. If you're a driven sales professional who thrives in a high-energy environment and enjoys engaging with C-suite More ❯
IGA) and Privileged Access Management (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends and the evolution of IAM technologies. Experience managing stakeholder relationships, both internally and externally. Ability to balance delivery More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
IGA) and Privileged Access Management (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends and the evolution of IAM technologies. Experience managing stakeholder relationships, both internally and externally. Ability to balance delivery More ❯
of services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM Security Architect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM Security Architect to join our … Privileged Access Management (PAM) solutions using CyberArk. This role requires a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible for ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities … 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment More ❯
working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerability management and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud environments using InsightCloudSec. Apply More ❯
working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerability management and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud environments using InsightCloudSec. Apply More ❯
working with a Telecoms end client across various projects. Key Responsibilities: Lead integration of security tools such as Qualys (UK) for vulnerability management and CyberArk for privileged access security. Implement and support TrueSight for infrastructure and security monitoring. Ensure compliance and governance across multi-cloud environments using InsightCloudSec. Apply More ❯