s Global Technology approaches Providing subject matter expertise and acting as incident lead in support of cyber security incidents Provide regular cadence of management reporting that identifies trends, priorities and opportunities for improvements which demonstrates a practice of continuous improvement and aligns to segment KPIs for the function … CISSP. Strong experience in technical cyber security role such as security analysis or engineering Excellent knowledge in key cyber security domains such as identityandaccessmanagement, risk management, network security and security operations Experience providing cyber subject-matter expertise for transformational … engaging and influencing stakeholders across departmental and organisational and global/segment stakeholders An excellent understanding of best practice within cyber security and risk management including standards such as ISO/IEC 27001, Cyber Essentials and NIST CSF Demonstrable creativity and a commitment to future-proofing processes andMore ❯
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation andManagement Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and Vulnerability Management, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. Enforce … the organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures andidentityaccessmanagement (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar More ❯
for security breaches, and responding to incidents. They also work to educate employees on best practices for information security. Main Responsibilities Security Implementation andManagement Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and … effective action. Develop comprehensive incident response plans to maintain organisational resilience against threats. Oversee operational security processes with tools like SIEM, EDR, and Vulnerability Management, continuously enhancing capabilities. Network and System Security Manage advanced security tools such as firewalls and IDS/IPS to protect network integrity. Enforce … the organisation. Cloud and Application Security Enhance the security of cloud services (SaaS, PaaS, IaaS) and enterprise applications through advanced security measures andidentityaccessmanagement (IAM). Education & Competencies University Degree or equivalent preferred A minimum of 3 years' experience in a similar More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Skye Business Solutions
logs from various sources including cloud platforms services, firewalls, intrusion detection systems, VPN, web application firewalls, web and email filtering, identityandaccessmanagement systems, endpoint protection and EDR, and other security tools. Qualifications and Experience: Minimum of 5 years of experience in cybersecurity. … of Sentinel design and implementation experience, including Linux deployment and administration. Solid experience working with security logs across multiple domains - identityandaccess, network, system, data, application, cloud - and multiple product types, e.g. firewalls, intrusion detection systems, VPN, web application firewalls, web and email filtering, identityMore ❯
Sales Development Representative - Italy and Spain Marketing London, United Kingdom Full-time Description Silverfort is a cyber-security startup that develops a revolutionary identity protection platform. Our mission is to provide industry-leading unified identity protection solutions for hybrid and multi-cloud environments. Using patented technology … innovator, being named "Best of MFA award" from Expert Insights, Microsoft Security 20/20 partner award, and Homeland Security Award for Best IdentityAccessManagement platform for its agentless secure authentication and zero trust platform by Astors. We are looking for a motivated More ❯
Sales Development Representative - Benelux and Nordics London, United Kingdom About The Position Silverfort is a cyber-security startup that develops a revolutionary identity protection platform. Our mission is to provide industry-leading unified identity protection solutions for hybrid and multi-cloud environments. Using patented technology, Silverfort … innovator, being named "Best of MFA award" from Expert Insights, Microsoft Security 20/20 partner award, and Homeland Security Award for Best IdentityAccessManagement platform for its agentless secure authentication and zero trust platform by Astors. We are looking for a motivated More ❯
Development Representative - Italy and Spain London, United Kingdom Full-time About The Position Silverfort is a cyber-security startup that develops a revolutionary identity protection platform. Our mission is to provide industry-leading unified identity protection solutions for hybrid and multi-cloud environments. Using patented technology … innovator, being named "Best of MFA award" from Expert Insights, Microsoft Security 20/20 partner award, and Homeland Security Award for Best IdentityAccessManagement platform for its agentless secure authentication and zero trust platform by Astors. We are looking for a motivated More ❯
Senior Cyber Security Engineer – Investment Management 💰 £££ Competitive Day Rate | Contract with Perm Option 📍 Central London | Hybrid Working ✅ Senior-level Cyber Security Engineer ✅ Core security disciplines – infrastructure, cloud, identity, threat, risk ✅ Initial contract with an option to convert to permanent employment You'll be working for a … well-established investment management firm as a Senior Cyber Security Engineer , helping to shape and secure their growing tech environment. This is a hands-on, high-trust role where your broad security knowledge will directly impact infrastructure, cloud, data, and application integrity. The Role: Deliver security engineering across … network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & accessmanagement controls Lead on vulnerability remediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security engineering More ❯
london, south east england, united kingdom Hybrid / WFH Options
Harrington Starr
Senior Cyber Security Engineer – Investment Management 💰 £££ Competitive Day Rate | Contract with Perm Option 📍 Central London | Hybrid Working ✅ Senior-level Cyber Security Engineer ✅ Core security disciplines – infrastructure, cloud, identity, threat, risk ✅ Initial contract with an option to convert to permanent employment You'll be working for a … well-established investment management firm as a Senior Cyber Security Engineer , helping to shape and secure their growing tech environment. This is a hands-on, high-trust role where your broad security knowledge will directly impact infrastructure, cloud, data, and application integrity. The Role: Deliver security engineering across … network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & accessmanagement controls Lead on vulnerability remediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security engineering More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerability management Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & accessmanagementMore ❯
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. · Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). · Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bevendean, Sussex, United Kingdom Hybrid / WFH Options
University of Brighton
per annum Closing Date: Sunday 04 May 2025 This is an exciting opportunity to join our friendly and growing IdentityandAccess team, and to help construct and manage our next generation IdentityandAccessManagement platform. You will liaise … The University is committed to creating and maintaining an inclusive environment for all staff regardless of age, disability, family or caring responsibilities, gender identity, marital status, pregnancy or maternity, race, religion or belief (including non-belief), sex and sexual orientation. We embrace equality and diversity in our working More ❯
BN2, Bevendean, Brighton and Hove, East Sussex, United Kingdom Hybrid / WFH Options
University of Brighton
per annum Closing Date: Sunday 04 May 2025 This is an exciting opportunity to join our friendly and growing IdentityandAccess team, and to help construct and manage our next generation IdentityandAccessManagement platform. You will liaise … The University is committed to creating and maintaining an inclusive environment for all staff regardless of age, disability, family or caring responsibilities, gender identity, marital status, pregnancy or maternity, race, religion or belief (including non-belief), sex and sexual orientation. We embrace equality and diversity in our working More ❯
tech teams to senior business stakeholders. Information Security Guru: You've got a comprehensive understanding across a range of Information Security domains, including Identity & AccessManagement, Network Security, Cryptography and Public Key Infrastructure, Mobile & API security, and more. Analytical Ace: Your strong analytical skills … in scoping penetration tests, conducting risk assessments, and overseeing remediation plans. Influential Communicator: You're skilled at influencing, communicating, and collaborating with senior managementand stakeholders. Cloud Connoisseur: You're well-versed in Cloud Service models like IaaS, PaaS, and SaaS and the security context when deploying solutions More ❯
of cyber security design principles to ensure solutions meet industry standards An understanding of frameworks and compliance The ability to work with risk management processes and articulate the risks and benefits An understanding of networks and cloud environments is advantageous Comfortable creating design documentation and presenting to clients … in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis andmanagement of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. Understanding of Infrastructure, Networking, and Cloud environments Knowledge in … Identity & AccessManagement Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident Response team is advantageous These ongoing contract engagements will attract a day rate commensurate with the depth of skills and experience required. You'll join a More ❯
into a senior role for an exciting financial services business! Must have a software development background be confident with the engineering side of Identity Management. You will be working daily on Python/Java and so proven, professional experience in a software developer role is an essential requirement … focused attitude to solving the problems of this global organisation. Essential Requirements: Proven experience in a Software Developer Position Knowledge & experience in the Identity & AccessManagement Space Collaborative & teamwork mindset Apply here or get in touch at ngoren@mcgregor-boyall.com More ❯
into a senior role for an exciting financial services business! Must have a software development background be confident with the engineering side of Identity Management. You will be working daily on Python/Java and so proven, professional experience in a software developer role is an essential requirement … focused attitude to solving the problems of this global organisation. Essential Requirements: Proven experience in a Software Developer Position Knowledge & experience in the Identity & AccessManagement Space Collaborative & teamwork mindset Apply here or get in touch at ngoren@mcgregor-boyall.com More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
TieTalent
skill set. Role Requirements Experience in cybersecurity matters (e.g., threat detection, malware intelligence, cloud security posture management, or identityandaccessmanagement systems). Understanding of the following functions: TCP/IP stack, OSI Model, DHCP, DNS, Subnets, VLANs, Routers, Firewalls (essential More ❯
identity. Job Summary As a Lead Software Engineer, you will be responsible for driving a mission to simplify and streamline services throughout the Identity organization. You will be empowered to make technical and architectural decisions, and to influence the roadmap for your squad and the wider team, working … in partnership with your peers across Product, Program Managementand Engineering. You will contribute to and be part of an engaging, dynamic and inclusive engineering organization, grounded in scrum and agile practices, CI/CD, great collaboration, delivering … solutions grounded in quality and motivated by a commitment to continuous learning and improvement. Identity Engineering delivers Consumer IdentityandAccessManagement (CIAM) capabilities across The Walt Disney Company (TWDC) including but not limited to: D+, Hulu, ESPN+, and Parks. IdentityMore ❯
World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity … for lifelong learners and people who can make us better with their unique experiences. Join our team! We're building a world where Identity belongs to you. The Global Presales team The Global Presales organization at Okta brings together a diverse group of experts, including Solutions Engineers, the … with key Partners, Global System Integrators, Distributors and Technology Vendors supporting EMEA. You will become their trusted advisor for anything IdentityandAccessManagement related and will help them understand how Okta can best fit in their Go-To-Market (GTM) Strategy, integrate with More ❯
in banking environments to join a high-impact team driving resilience and security across mission-critical systems. You’ll bring deep expertise across Identity & AccessManagement (IAM) , penetration testing , and 3rd party risk , with strong familiarity with DORA compliance and payments/settlement systems … . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party security risks Safeguard complex payments and settlement infrastructure Operate in fast More ❯
in banking environments to join a high-impact team driving resilience and security across mission-critical systems. You’ll bring deep expertise across Identity & AccessManagement (IAM) , penetration testing , and 3rd party risk , with strong familiarity with DORA compliance and payments/settlement systems … . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party security risks Safeguard complex payments and settlement infrastructure Operate in fast More ❯
We are currently seeking an experienced SailPoint Identity IAM Engineer to join our team in London. In this role, you will be responsible for onboarding applications, configuration of the platform, recertifications, workflows and connectors associated into Identity Security Cloud, ensuring seamless integration and functionality. As the … as Java is also essential. This is an exciting opportunity for someone looking to leverage their skills and expertise in identityandaccessmanagement, while being part of a huge transformation within the company, driving business growth and success. Responsibilities: IAM System Implementation: Participate … in the planning, design, and implementation of IAM systems Issue Resolution: Analyse and resolve IAM related issues and challenges Access Monitoring and Auditing: Regularly monitor and audit access rights to identify unauthorized access attempts and potential security breaches Strategy Development: Contribute to the development More ❯