and applications. Key Responsibilities: Security Strategy and Architecture: Develop and implement security strategies aligned with industry standards and best practices, ensuring all systems are secure by design. Risk Management: Assess risks, identify vulnerabilities, and create threat models for new and existing systems to prioritize security controls. Compliance and Governance: Ensure … solutions comply with regulatory and organizational security standards (e.g., NIST, ISO 27001, GDPR). Solution Design: Lead the design and architecture of security solutions, including identityandaccessmanagement, data protection, network security, and application security. Technical Leadership: Collaborate with cross-functional teams (developers, DevOps, infrastructure) to integrate security into all stages of the … and vulnerability scans, and work with teams to remediate findings. Incident Response: Develop incident response plans, coordinate responses to security incidents, and drive improvements from lessons learned. Stakeholder Management: Communicate security requirements and risks to both technical and non-technical stakeholders, ensuring alignment with business goals. Essential Skills and Qualifications: Security Clearance: Active SC Security Clearance (required) Experience More ❯
measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity … implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively … resolved within assigned SLA's. Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training in Cybersecurity, Information Systems, Computer More ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
are mostly Mac users with a handful of Windows machines. Ensure a smooth onboarding/offboarding process and resolving technical issues efficiently. Implement and maintain identityandaccessmanagement (IAM) systems, including SSO and MFA. Evaluate and recommend new technology solutions to support company growth and enhance operational efficiency. Partner with the CTO to … of experience in IT management or system administration 2+ years in an InfoSec-related role Technical Skills: Proficiency in managing SaaS platforms like Microsoft 365, and endpoint management tools (e.g., Jumpcloud). Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) and … architectures and security-first IT practices. Soft Skills: Excellent problem-solving and communication skills. Ability to collaborate effectively with external partners, such as an MSP. Strong organisational and project management skills. A proactive, growth-oriented mindset with the ability to scale IT processes for a rapidly growing company. Preferred Qualifications Certifications: CompTIA Security+, CISSP, CISM, or equivalent. Experience More ❯
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating … environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security … PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning and budgeting. Follow change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable … corrective actions, and training users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM … to users on IAM policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. Manage multi-factor authentication (MFA More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
IdentityandAccessManagement Senior Manager page is loaded IdentityandAccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to apply) Job … requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: IdentityandAccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the norm paid vacation, contributions to retirement investment plans … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning More ❯
with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
threats across hybrid environments. Managing and enhancing security configurations for Windows VMs, SQL databases, and PaaS solutions like Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. … Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identityandaccessmanagement (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and existing solutions. Managing third parties delivering … IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with IdentityandAccessManagement (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems to adhere to security guidelines proactively and reactively. What More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Description Allica's security team plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with various teams, such as Engineering … mitigation of potential intrusions in real-time, collaborating with cross-functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities aimed at gaining unauthorized access … security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. NOTE: Applicants must … per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
and Landing zone In addition, any experience of these would be useful: FinOps mentality and "right-sizing" cloud solutions Security and governance conscious engineering (e.g. IdentityandaccessManagement implementation principles) Experience in cloud native governance and policy tooling (e.g. Azure Policy, Google Customer Org Policy). Experience in platform automation to support asset … management tracking and FinOps scenarios. Implementation of governance frameworks to enforce cloud usage policies, tagging standards, and security baselines across multi-project/multi-subscription environments. Collaborate with compliance, risk and audit teams to team to translate regulatory requirements (e.g. SOC2, ISO 27001, HIPPA, GDPR, PCI DSS) into technical controls in the cloud. Adherence and experience of compliance More ❯
Job grade B Closing date 25/06/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This … in ensuring that our systems remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead … the delivery of value. Collaborate with internal teams (IT, security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and Privileged AccessMore ❯
in Active Directory, Entra ID, and Microsoft technical administration. The successful candidate will have extensive experience with Intune and Entra ID and will be responsible for supporting and securing our identity infrastructure across several high-profile, time-sensitive projects. This role requires close collaboration with internal teams and third-party partners to ensure seamless integration and operation of … Proficient in Active Directory and Entra ID administration. Solid experience with Microsoft Intune configuration and management. Experience in Microsoft technical administration and troubleshooting. Familiarity with identityandaccessmanagement (IAM) principles and best practices. Exposure to Privileged AccessManagement (PAM) tools such as CyberArk and/or IGA platforms like … SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred) Microsoft Certified: IdentityandAccess Administrator Associate Microsoft Certified: Azure Administrator Associate Other relevant Microsoft or security certifications Soft Skills Strong problem-solving and analytical abilities. Excellent communication and interpersonal skills. Ability to work independently and collaboratively within a team. Detail More ❯
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer - Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … PTA) vs Federated Hybrid Identity Solutions Windows Active Directory Services (ADDS, FSMO, GPOs, Replication) Windows Networking (TCP/IP, DNS, DHCP) Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: AAD Connect, DirSync, MIM/FIM Active Directory Federation Services (ADFS) or third More ❯