a Security Design An understanding of cyber security design principles to ensure solutions meet industry standards An understanding of frameworks and compliance The ability to work with risk management processes and articulate the risks and benefits An understanding of networks and cloud environments is advantageous Comfortable creating design documentation and presenting to clients Requirements Key Responsibilities: Specialised technical … GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & AccessManagement Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident Response team is advantageous Benefits These ongoing contract engagements will attract a day rate commensurate with the depth of skills and experience required. You'll join a team of experienced engineers working with cutting edge tech across a range of More ❯
NHS Spine-enabled Electronic Patient Records (EPR), as well as key components of the Electronic Staff Record (ESR). Our work is essential in managing user identities and ensuring secure access to both trust and national resources, alongside the ongoing maintenance and configuration of NHS Spine applications. We are seeking two team-oriented individuals with a strong desire … Customer Care/Service Desk Service to users. Knowledge Essential Working knowledge of Microsoft Office applications. Awareness of Data Protection and Confidentiality legislation. Awareness of IdentityandAccess Management. Awareness of Digital Service Management processes/procedures/methodologies. Desirable An understanding of NHS Information Governance standards. An understanding of NHS Cyber Security principles. … Awareness of IdentityandAccessManagement within the NHS. Awareness of Project Management principles. Skills Essential Confidence to challenge inappropriate practices or breaches of policy/procedure with integrity, tact and sensitivity. Ability to plan, prioritise and re-organise conflicting workload whilst helping to support the rest of the team, during times More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom
Michael Page
Experience in a manufacturing or industrial environment, Operational Technologies Knowledge with security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR) Experience with SIEM solutions, endpoint security, andidentity & accessmanagement Ability to conduct risk assessments and develop mitigation strategies. Job Offer 10% on call allowance Opportunity to work as a critical security role More ❯
party brands, for you and a household member. Holidays : Generous holiday entitlement with options to purchase extra days. Pension : Defined Contribution Pension Scheme and Life Assurance. Wellbeing Support : Access to a 24/7 Virtual GP and various wellbeing resources. Professional Development : Tailored induction and training programs to develop your skills. Parental Support : Industry-leading parental, adoption, and … Azure Databricks. Strong understanding of DevOps practices, using tools like Azure DevOps, Jenkins, or GitHub Actions. Solid knowledge of security best practices on Azure, including identityandaccessmanagement, network security, and encryption. Ability to manage and optimise platform performance and costs effectively. If you would like to be considered for the role andMore ❯
systems. Proficient in implementing CI/CD pipelines and managing complex integration scenarios. Identity & AccessManagement: Understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Ability to effectively implement and troubleshoot SSO and SCIM integrations. High-Quality Code: A proven … feel truly valued. We appreciate and respect individual differences and are committed to ensuring that all applications are treated fairly and equally, regardless of ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability, or age. More ❯
a new chapter of bold, strategic growth. With deep expertise across Financial Services, Insurance, and Utilities, this business is investing heavily in its Cyber Resilience practice—focusing on Identity & AccessManagement, Cloud Enablement, DORA readiness, and network security at the edge. The Role As Cybersecurity Director, you’ll play a pivotal role in scaling More ❯
certification activities related to ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification andmanagement with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure organizational compliance. Orchestrate continual improvement … deficiencies or opportunities for improvement and facilitate development of pragmatic solutions. Work with the DPO to ensure appropriate security is applied to data and provide reports/subject access requests. Design and deliver continual education and training to our colleagues to support them in identifying risks in their day-to-day operations, using Phishing Simulations and awareness campaigns. … promote security best practices across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Managementand IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of Three Lines of Defence Model More ❯
them. AWS Security is on the cutting edge of security for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identityandaccessmanagement, mobile devices, virtualization, and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each team member's growth as … Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identitymanagementand authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
services. Ensure project designs comply with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of security standards and future strategy … deliver a wide range of IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to person for any project issues More ❯
Winchester, Hampshire, South East, United Kingdom Hybrid / WFH Options
Premier Foods
architecture, although not essential Experience in Cloud FinOps, although not essential Experience in Public Cloud, hyperconverged infrastructure (e.g Nutanix), and Virtual Desktop Infrastructure. Expertise in IdentityandAccessManagement, although not essential Proven strategic leadership, setting technology standards and roadmaps for large organizations. Demonstratable ability to mentor and develop technical team members, fostering a More ❯
, the Head of Privileged and Infrastructure AccessManagement, MD will lead the strategic direction, development, and implementation of the bank's Privileged and Infrastructure Access program. This role is critical in ensuring the secure management of privileged and machine identities, authentication, and authorization across all infrastructure platforms channels. The successful candidate … security functions in complex, regulated environments. Demonstrated success leading PAM in a multinational financial institution or critical infrastructure context. Deep knowledge of PAM technologies, zero trust principles, andidentity governance integration. Skills: Strong understanding of regulatory expectations in financial services related to identityand access. Ability to influence across technical and executive audiences globally. Exceptional … around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs andaccess to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. More ❯
Type: Contract 6 Months Company Introduction We’re seeking a Data Product Owner – Metrics and Reporting to take the lead in shaping and delivering data-driven solutions for Identity & AccessManagement (IAM). This role will spearhead the development of automated Continuous Controls Monitoring and Business Intelligence dashboards, working closely with cross-functional teams … capabilities and dashboarding tools The ideal candidate will have the following: Proven experience as a Product Owner or Product Manager in data-driven environments Strong background in data management, dashboards, and business intelligence Solid understanding of IAM or other control environments Expert in Agile frameworks and product lifecycle management Excellent stakeholder managementand communication More ❯
customer-focused sales, orientation, and launch engagement process. Develop excellent relationship up to customer's C-level executives. Develop a deep understanding of customer's identityandaccess governance landscape and business challenges and advise on possible solutions delivered by the Saviynt product. Develop trusting relationship with customers and executive sponsors to drive product adoption and … as the voice of the customer and collect feedback to drive continuous improvement across all areas including product. WHAT YOU BRING Knowledge and experience in IdentityandAccessManagement (IAM) required; cybersecurity and/or compliance background also very valuable. Must be fluent in English and French Identity Security practitioner preferred Have … do attitude. Previous experience within a customer success OR application portfolio management role within a SaaS organization. Hands - on knowledge and experience in IdentityandAccessManagement (IAM) and Security space. Strong knowledge of cloud architecture as well as on - premise IT landscape. Extensive experience in consulting and implementation of IT systems More ❯
workstreams. Working closely with project managers and IT leadership, you’ll help deliver technical solutions in a fast-paced, collaborative setting. Key Experience Required Windows device rollout, endpoint management, and software deployments experience Strong skills with Intune and/or Jamf for device configuration and control Solid working knowledge of both Windows … and macOS environments Proficiency with PowerShell for scripting and automation Able to troubleshoot and resolve complex technical issues (networking, access, systems) Experience supporting identityandaccessmanagement systems Excellent communication skills Bonus Points ITIL Foundation or familiarity with ITIL processes Experience using ITSM tools such as ServiceNow IT Support Engineer (Contract) Contract More ❯
to support comprehensive Cyber Security programs whilst optimising the operational performance and reliability of Infrastructure technologies? Then we need your expertise in controls and activities for the effective management of critical cyber security platforms. Are you skilled with Privilege Accessmanagement, Application Control and Data Loss Prevention solutions? The we need you to help … and showcase your knowledge of regulation standards, compliance and governance. Essential experience includes: Experience in configuring and managing PAM solutions in enterprise environments. Familiarity with identityandaccessmanagement (IAM) principles , including role-based access control (RBAC) and least privilege. Strong understanding of Application Control concepts, tools, and technologies (e.g., whitelisting, blacklisting … years+ experience in IT including circa 3 years in an operational environment Knowledge of best practices of IT security hardware and software, security suites, identityandaccessmanagement, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM More ❯
lead with empathy, and deliver results Public Sector Experience: Ideally with secure government projects and familiarity with compliance/assurance processes IAM Knowledge: Exposure to IdentityandAccessManagement within secure data environments If interested, please share your CV at chaya@mastek.com Regards Chaya Bahl More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
managing and organising the portfolio of initiatives that support the Infrastructure Operations unit. This unit delivers essential services across server and virtualisation, storage, business continuity, identityandaccessmanagement, automation, system monitoring, and IT operations platforms including messaging and collaboration systems. Are you ready to make your mark as part of the Portfolio Management … managing and organising the portfolio of initiatives that support the Infrastructure Operations unit. This unit delivers essential services across server and virtualisation, storage, business continuity, identityandaccessmanagement, automation, system monitoring, and IT operations platforms including messaging and collaboration systems. The Portfolio Manager leads the planning and execution of a dynamic mix of … operations environments Proven experience in managing infrastructure-focused portfolios, including virtualisation, storage, identity & accessmanagement, and operations platforms Strong portfolio, programme, and project management capabilities with the ability to manage across strategic, operational, and BAU streams Experience in portfolio financial planning, reporting, and resource capacity management Strong leadership, organisational, andMore ❯
South East London, England, United Kingdom Hybrid / WFH Options
Computappoint
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
the backend engineering for secure, distributed real-time systems Design and deliver rock-solid APIs in collaboration with frontend and AI colleagues Seamlessly integrate with identityandaccessmanagement tools (like Keycloak) Champion observability best practices through effective logging, metrics, and tracing Pitch in on architecture decisions and mentor your peers to keep code … mission-driven product that makes a real-world impact Work in a high-trust, supportive engineering culture Enjoy flexibility and autonomy – your work, your way Competitive salary and equity Direct access to decision-makers and a say in shaping the future of the platform Ready to build something that matters? Please apply At Pixelated People, we don’t … life better for all the people who live in it. So we want you to know that the things that make you, you — like your age, ability, background andidentity — are things that we celebrate and support. More ❯
the backend engineering for secure, distributed real-time systems Design and deliver rock-solid APIs in collaboration with frontend and AI colleagues Seamlessly integrate with identityandaccessmanagement tools (like Keycloak) Champion observability best practices through effective logging, metrics, and tracing Pitch in on architecture decisions and mentor your peers to keep code … mission-driven product that makes a real-world impact Work in a high-trust, supportive engineering culture Enjoy flexibility and autonomy – your work, your way Competitive salary and equity Direct access to decision-makers and a say in shaping the future of the platform Ready to build something that matters? Please apply 🚀 At Pixelated People, we don’t … life better for all the people who live in it. So we want you to know that the things that make you, you — like your age, ability, background andidentity — are things that we celebrate and support. More ❯
the backend engineering for secure, distributed real-time systems Design and deliver rock-solid APIs in collaboration with frontend and AI colleagues Seamlessly integrate with identityandaccessmanagement tools (like Keycloak) Champion observability best practices through effective logging, metrics, and tracing Pitch in on architecture decisions and mentor your peers to keep code … mission-driven product that makes a real-world impact Work in a high-trust, supportive engineering culture Enjoy flexibility and autonomy – your work, your way Competitive salary and equity Direct access to decision-makers and a say in shaping the future of the platform Ready to build something that matters? Please apply 🚀 At Pixelated People, we don’t … life better for all the people who live in it. So we want you to know that the things that make you, you — like your age, ability, background andidentity — are things that we celebrate and support. More ❯
the backend engineering for secure, distributed real-time systems Design and deliver rock-solid APIs in collaboration with frontend and AI colleagues Seamlessly integrate with identityandaccessmanagement tools (like Keycloak) Champion observability best practices through effective logging, metrics, and tracing Pitch in on architecture decisions and mentor your peers to keep code … mission-driven product that makes a real-world impact Work in a high-trust, supportive engineering culture Enjoy flexibility and autonomy – your work, your way Competitive salary and equity Direct access to decision-makers and a say in shaping the future of the platform Ready to build something that matters? Please apply 🚀 At Pixelated People, we don’t … life better for all the people who live in it. So we want you to know that the things that make you, you — like your age, ability, background andidentity — are things that we celebrate and support. More ❯
in cloud native environments (Azure preferred) Natural leadership style – empathetic, delivery focused, and team first Experience working within secure or highly regulated environments Familiarity with IdentityandAccessManagement (IAM) in secure data contexts You’ll be stepping into a fast moving programme that values clarity, pragmatism, and delivery excellence. 🔐 Must have active SC More ❯