Transition Partners are excited to be working with a growing global cyber security consultancy to recruit a Business Analyst IAM (IdentityandAccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … Do you dare to disrupt the status quo? This is the role for you! Skills and Experience: Strong experience with Identityandaccessmanagement (IAM) experience Excellent communication skills as will be working collaboratively with clients Familiar with technologies such as Sailpoint, CyberArk andmore »
solutions and solving complex IT technical problems, with the strong knowledge and proven experience over a long period in: * Enterprise Identityandaccessmanagement with a focus on Identity governance * Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Accessmanagement module. * Software deployment and change management process. * Hands on agile software development and deployment delivery model Due to the nature and urgency of this post, candidates holding or who more »
well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat managementand will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … an outstanding benefits package, which includes pension schemes, discounted gym memberships, a cycle-to-work scheme, access to home furnishings and electronics, access to Employee Assistance Program (EAP), discounts at various high street retailers, eligibility for the Blue Light Card, the opportunity to apply for low … anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identityandaccessmanagement) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
current systems System integration with the Cloud andand using your experience with Active Directory to build scalable/reliable and secure systems Identity issues and liaise with development andmanagement teams to collaboratively overcome both workflow and security issues Perform integration, configuration, and customization of …/implementation and support (IGA/PAM etc) will be a key aspect of the role Troubleshoot and resolve technical issues related to identitymanagement systems. Provide technical expertise and guidance to support ongoing projects and initiatives. Be the champion for company wide access … need for this position: CISSP certification is a must have for this role Proven experience as a Systems Engineer, with a focus on identityandaccess management. Hands-on experience with SailPoint IdentityNow, including implementation and administration. If you have a background of working Linux systems more »
Contract Type: Initial 6-month Rate: Inside IR35 We are seeking a strong Cybersecurity Architect with a robust understanding of IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM), experienced in threat modeling, and implementing/enforcing security controls … compliance with internal standards and use of approved patterns. Conduct fit/gap analysis to identify security gaps and recommend improvements. Understand critical access restrictions and audit compliance requirements for reports. Key Skills/Knowledge/Experience: Relevant professional qualifications such as Security+, Network+, CISM, CISSP, or working more »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation andidentityandaccessmanagement (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive managementand/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/… mentoring teams in “secure by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: IdentityAccessManagement (IAM) User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
infrastructure, utilising appropriate tools for identifying and correcting complex issues. Planning and scheduling of appropriate cloud infrastructure releases in line with release and change management procedures. Develop and maintain the necessary pipelines and tooling to support the DevSecOps cloud practices. Maintaining knowledge of this area of the ICT … to stay informed of developments in other areas of technology which have a bearing on the provision of services for the client Development andmanagement of security tooling and services including, but not limited to, KMS, PKI, Encryption, secrets management, native cloud security tooling, Software composition … create improvement and development plans for existing infrastructure and providing roadmaps for future development work Essential Skills & Experience: Strong AWS Terraform Hashicorp Jenkins IdentityAccessManagement secrets management - Certificates Desirable Skills: Ansible Python KMS GPG PGP This role has been deemed Inside more »
days a week Contract Inside IR35 Job Description: Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP, cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
site 4-5 days a week Job Description: "Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP,cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
Cloud Identity Engineer- Hybrid/London- 6 months initially - £400-£500 P/D Outside IR35 Stott & May are currently looking for a Cloud Identity Engineer - IAM (Azure AD) to work for a large international Banking & Finance giant on an initial 6 month contract. IAM experience … or Kotlin plus Azure AD will be favoured. You will work closely with the security and cloud teams to ensure the secure provisioning andmanagement of identities across different systems, including Active Directory, Entra ID, and GCP. Key Responsibilities: * Design, develop, and maintain automation scripts and tools using … Go or Kotlin for IAM tasks * Implement and manage SCIM provisioning for automated user life cycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Automate infrastructure provisioning and configuration using more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
london, south east england, United Kingdom Hybrid / WFH Options
Catch Resource Management
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »