application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
day - Outside IR35 My high profile large-scale IT Consultancy is looking for SC Cleared Cloud Engineer, with experience of IdentityandAccessManagement, to join the clients journey of the modernisa... more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Can you integrate SailPoint into Legacy Systems? My client are the UKs largest mutual life, pensions and investment company and have been on a continuous improvement journey and are looking to expand their team with a new IAM engineer. This more »
ISC2 CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, andIDAM systems Understanding of technology risks, threat actors, and mitigation strategies, with a commitment to continuous learning Experience leading the design and architecture of cloud capabilities more »
internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
technical challenges. Compliance and Security: Ensure designs adhere to data practices, regulatory standards, and security frameworks relevant to highly secure government systems. Requirements Management: Identify and capture non-functional requirements and integrate them into technical designs. Standards Development: Shape and evolve technical standards and principles related to cloud … highly secure on-premise IT infrastructure. Technical Expertise: Experience with technologies such as VMware, VxRail, Networks, SIEM, AntiVirus, PKI/HSM, Cross Domain Gateways, IDAM/RBAC/ABAC/MFA, Windows Technologies, High Grade Crypto. Design Principles: Knowledge of Secure by Design and Zero Trust Principles is beneficial. Defence more »
Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our London based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: • Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes • Work as a key point of more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
have lots happening in tech. The main responsibility of the Senior DevOps Engineers will be to manage the creation, enhancement, deployment, continuous upkeep, andmanagement of our clients AWS framework and related systems. In addition, they will provide technical guidance to junior team members, serve as the team … DevSecOps and collaboration with Information Security (InfoSec) teams to deploy secure solutions, utilizing Role-Based Access Control (RBAC), IdentityandAccessManagement (IAM), Cloud Security protocols, and third-party security tools like AquaSec. Ability to self-manage development projects, tasks, and time more »
Unix – Linux support and engineering experience Experience of an enterprise Linux, preferably Red Hat Enterprise Linux, CentOS or Oracle Linux. Recent involvement in implementing IDAM, PAM or SIEM tooling. Experience with monitoring and reporting software – Prometheus, Nagios or similar. Solid scripting experience with one of the following: Python, Shell, Bash more »
day - Outside IR35 My high profile large-scale IT Consultancy is looking for SC Cleared Cloud Engineer, with experience of IdentityandAccessManagement, to join the clients journey of the modernisation of IT services, through leveraging the public cloud, Microsoft Azure, M365 and … IT Services. Essential skills and qualifications: In-depth knowledge of Microsoft Entra ID (Azure Active Directory), O365 and Amazon AWS IdentityandAccessManagement services. Proficiency in PowerShell scripting and automation tools Experience with IAM solutions and tools, including role-based access control (RBAC), multi-factor authentication (MFA), and conditional access policies. Expertise in Azure AD Privileged IdentityManagement (PIM) and privileged access control. Strong customer relationship skills, including negotiating complex and sensitive situations . Full proficiency in the English language, French more »
closure of all service requests, problems and incidents that relate to IT services. This includes: End-User Computing (EUC) Application Support Email File ManagementIdentityAccessManagement Managed Print Services The primary objective of the IT Service Desk is to ensure the … Working within a matrixed team Proactive problem solver and independent thinker Can prioritise and manage a demanding and agile workload. Excellent communication and stakeholder management capability Attention to detail Ability to think laterally Resilient and positive Structured and organised Collaborative team player Proactive quick learner Flexibility to travel … puts people at the heart of their organisation, then we would love to hear from you. PIB operates a flexible working policy, and our management teams will talk to you about how that would meet both your flexible working needs and those of the business and role you more »
streams necessary for the successful delivery of new cloud, web, and mobile projects or changes * Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access * Playing a key role in IT strategy and planning, focusing on maximizing more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
streams necessary for the successful delivery of new cloud, web, and mobile projects or changes * Proficiency in single sign-on, identityandaccessmanagement (IAM), and application role-based access * Playing a key role in IT strategy and planning, focusing on maximizing more »
Role: Cloud Engineer ( IdentityandAccessManagement ) Location: Remote, UK, Europe Contract initially until the end of Dec 2024 but could roll on Must have security clearance to SC/DV or NATO levels Role scope Under the direction/guidance of the local … NCIA Point of Contact or the Cloud Ops Operations Manager, the Cloud Engineer (Remote), IdentityandAccessManagement will be supporting the following activities: 1) Design and Implement IAM Solutions: a) Design, implement, and manage identityandaccessmanagement … monitor, and audit privileged access to resources. b) Configure PIM to enforce just‐in‐time (JIT) access, approval workflows, andaccess reviews for privileged roles. 5) Security and Compliance: a) Implement security best practices and ensure compliance with relevant standards and regulations. b) Conduct more »
future of IAM capabilities, our next IAM Director will establish the foundation for which the company will operate from for IdentityandAccessManagement in the future! * Flexible location * Position Purpose Responsible for the planning, building, delivery, and support of the IdentityandAccessManagement (IAM) program for both Brambles enterprise users and customer facing services. This encompasses a wide range of current systems and solutions managed by disparate teams, against various standards and approaches in which this leader will work to consolidate, update, and ensure … CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, andaccess provisioning life cycle. Solid understanding of the foundation and trends in Information Technology, Information Security, Risk Management, Governance, and Compliance. Demonstrated more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged accessmanagement tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create … documentation that enables the business to use the cloud securely Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & AccessManagement, Privileged AccessManagement (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into the Lead Cyber Security Engineer, you will have plenty of opportunity to learn and test and advance your skills across a range of projects. To be considered you must have a cyber more »
an experience Identity & AccessManagement Manager is required within a global Insurance brand as part of their further expansion of their Cyber & IT Security functions. The role is newly created, in a greenfield environment, and will report into the Head of Security within the … multi-national insurer and as such the candidate will have an opportunity to manage globally distributed teams in a matrix organisation. Requirements: Strong Access Rights & AccessManagement fundamentals, in this role you will create an AccessManagement function so previous … will be beneficial SME level knowledge within I&AM Ability to define and execute multi-year projects and road maps, ideally within client access & reporting projects Expert knowledge in NIST, ISO270001, ITIL, GDPR, CIFIUS and other relevant Data Protection policies is a must Strong Cloud experience (ideally Azure more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … controls from conception to realization (e.g. MoP, MSP, PRINCE2, MoR etc.) and in-house/local tailoring (Required) Experience of IdentityandAccessManagement governance environments, challenges, and best practices Implemented large scale Identity Governance and Administration (IGA), IdentityAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to all audiences up to C-Level leaders. At Cognizant, taking more »
role. To qualify for the role, you must have: Experience in architecting, configuring, migrating, implementing, and administering cloud-based Azure IdentityandAccess Services for large organizations preferably public sector. The ideal candidate should’ve delivered an Azure AD Cloud based IAM solution and bring forward … on zero-trust principles. Proven experience configuring and rolling out the following services on the Azure Active Directory (AAD) Multi-factor authentication and Conditional Access SSO – Single sign on using SAML, Azure PRT SSPR – Self Service Password Reset RBAC – Role Based Access Control Continuously improve Azure … methods, such as SAML, OAuth and OpenID Connect Multi-factor authentication Experience in large scale integration projects involving identityandaccessmanagement, web-services and distributed systems Experience of designing solutions to operate on Cloud infrastructure such as AWS and Azure Agile more »
business processes supported in ServiceNow from an Identity & AccessManagement perspective Reporting into the IdentityandAccessManagement function, you’ll be delivering automated access provisioning and integrating with other core IAM products such as IdentityNow … Sailpoint experience would be great, but training will be given Understanding of ITIL and the assorted business processes supported in ServiceNow from an Identity & Accessmanagement perspective Additional Information When you commit to Legal & General, we’ll commit to you too. That means we … ll recognise and reward your hard work, your performance and your contribution. If you join us, you’ll get access to some great benefits, including private medical insurance, at least 25 days holiday (excluding bank holidays), a generous pension scheme, life assurance, and Income Protection. You can participate more »
London We have an excellent opportunity for a highly motivated and skilled Infrastructure Engineer with expertise in Domain Services andIdentityandAccessManagement to join our dynamic team onsite in London . The ideal candidate will also have experience in Domain Controllers, Multi … to hear from you. What you’ll do Work with the Domain Services Lead to manage the Domain Services andIdentityandAccessManagement environment (DMS) Responsible for the build, support, andmanagement of all aspects of domain services, including lifecycle support … technical planning and implementation activities for domain services, such as: Active Directory/Azure Active Directory Domain controllers Multi-factor authentication/Conditional Access/PAM/PIM/IGA Group Policies PKI DNS DHCP IAM Acts as technical guidance on DMS elements of IT projects, and supports more »