Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) and Identity Accessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate will have extensive experience … with SAP Security architecture and implementation, SAP GRC solutions (Access Control, Identity Access Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks associated. Access the security requirements and risks … policies, and procedure aligned with Organisational goals and industry best practice. Oversee SAP Security during implementations, ensuring compliance with regulatory requirements and internal security standards. Establish and maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC and Identity access management. Work effectively More ❯
IAM SME | Financial/Commodities Sector | London | Hybrid | Permanent - market rate This is an exciting opportunity for a senior IAM focused professional to shape the future of identity and accessmanagement for a large dynamic organisation within the commodities sector. You’ll work at the forefront of IAM technologies, ensuring secure access to critical systems and applications … days on-site per week Office Location : Mayfair, London Responsibilities Design, implement, and manage IAM solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC). Configure and maintain IAM tools, with a focus on Entra ID (Azure AD) and on-premises Active Directory. Collaborate with IT and security teams to enforce security … security policies, particularly in financial services or commodities. Troubleshoot and resolve IAM-related issues, including authentication and access failures. Implement and manage PrivilegedAccessManagement (PAM) solutions to protect sensitive systems. Stay current with IAM technologies, trends, and vulnerabilities, and maintain comprehensive documentation. Required Experience Minimum of 5 years experience in identity and accessmanagementMore ❯
About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical … IGA based in the London or Amsterdam area. The Senior Solution Sales Specialist - Modern IGA will complement our Solution Sales overlay team specialized in selling CyberArk's Identity and AccessManagement (IAM), Identity Governance and Administration (IGA), Cloud Security and Endpoint Security solutions. Furthermore, the Senior Solution Sales Specialist - Modern IGA will be responsible for driving the sales … The strong international aspect of this role requires fluent English and the ability to work together with CyberArk's regional teams. Responsibilities: Work closely with CyberArk's Solutions, Product Management and R&D teams in charge of the Modern IGA solution. Work with the regional sales teams specialized in selling CyberArk's IAM and IGA solutions to establish and More ❯
SailPoint IDAM Solution Architect - Outside IR35 - 12 Months Role Overview The SailPoint Solution Architect will provide strategic leadership, enterprise architecture, and security governance for the organisation's Identity and AccessManagement (IdAM) transformation, with SailPoint IdentityNow as the central platform. This role combines solution architecture and security architecture responsibilities - ensuring that SailPoint deployments are secure, compliant, scalable, and … MFA) Design ARM module configurations to enforce Segregation of Duties (SoD) policies and deliver comprehensive reporting. Integrate SailPoint with security solutions such as PrivilegedAccessManagement (PAM) for enhanced access control. Define RBAC models, identity life cycle processes, and access governance standards. 3. Security Architecture & Compliance Lead security-by-design for all SailPoint deployments. Conduct … a SailPoint Solution/Security Architect (IdentityNow, ARM module) covering strategy, architecture, security, and implementation . Proven track record in identity life cycle management, RBAC, SoD controls, and PAM integration. Experience integrating SailPoint with Oracle Fusion and PeopleSoft/Campus Solutions . Deep knowledge of SSO protocols (SAML2, OIDC) and integration with Azure AD and MFA tools (eg, DUO More ❯
is the perfect time to join us on this high-speed journey. Introducing the Trainline Security Team As part of Trainline's Information Security (InfoSec) team, the Identity and AccessManagement (IAM) Engineer is responsible for designing, implementing, and managing robust IAM solutions that protect our systems, users, and data. This role plays a key part in reducing … security risk by ensuring that access to infrastructure, applications, and data is governed by principle-of-least-privilege, role-based access, and strong authentication controls. The IAM Engineer works closely with security, infrastructure, and engineering teams to enforce security policies, enable operational efficiency, and maintain compliance with regulatory and industry standards. Operating in a fast-paced digital environment … on IAM activities, investigating incidents and escalating risks as needed. Ensure regulatory compliance and support audits, certifications, and governance efforts. Implement and manage PrivilegedAccessManagement (PAM) for elevated account protection. Stay current on IAM trends and incorporate improvements into the identity security roadmap. Maintain clear documentation of IAM policies, configurations, workflows, and runbooks. We'd love More ❯
the bar for quality, drive collaboration, and mentor others to reach their full potential? If so, you might be in the right place! Are you passionate about Identity and AccessManagement (IAM) and eager to contribute to a secure and efficient technology environment? Lightspeed is seeking a skilled and motivated IAM System Integrator to join our IAM team … . In this role, you will be a key player in ensuring seamless and secure access to our applications and systems. You will be responsible for onboarding and offboarding applications within our IGA tool (Saviynt) and IdP, supporting end-users, contributing to certification audits, and promoting IAM best practices throughout the organization. If you have a strong understanding of … with the ability to create and maintain clear and concise run books and user guides. Experience with ticketing systems (Jira, ServiceNow) Experience with PrivilegedAccessManagement (PAM) tools Experience with Java programming is a plus. Experience with SOX compliance is a plus Excellent communication and interpersonal skills, with the ability to support end-users and collaborate effectively More ❯
the bar for quality, drive collaboration, and mentor others to reach their full potential? If so, you might be in the right place! Are you passionate about Identity and AccessManagement (IAM) and eager to contribute to a secure and efficient technology environment? Lightspeed is seeking a skilled and motivated IAM System Integrator to join our IAM team … . In this role, you will be a key player in ensuring seamless and secure access to our applications and systems. You will be responsible for onboarding and offboarding applications within our IGA tool (Saviynt) and IdP, supporting end-users, contributing to certification audits, and promoting IAM best practices throughout the organization. If you have a strong understanding of … with the ability to create and maintain clear and concise run books and user guides. Experience with ticketing systems (Jira, ServiceNow) Experience with PrivilegedAccessManagement (PAM) tools Experience with Java programming is a plus. Experience with SOX compliance is a plus Excellent communication and interpersonal skills, with the ability to support end-users and collaborate effectively More ❯
months with the potential of extension Location - Hertforshire - 4-5 days a week onsite Responsibilities Lead the end-to-end delivery of multiple IAM-related projects (e.g., role-based access control, identity lifecycle management, privilegedaccessmanagement, SSO/MFA implementations). Define and manage project scopes, goals, milestones, deliverables, and timelines in collaboration with … and consistency with organisational standards Oversee deployment and configuration activities, ensuring security and compliance are built into IAM implementations Key Skills Proven experience as Technical Project Manager within Identity AccessManagement Strong knowledge of IAM principles, technologies and frameworks IAM deployment experience Strong technical acumen with the ability to engage confidently with engineers, architects and cybersecurity professionals Aerospace More ❯
we are looking for a IAM Solutions Architect for a 12 Month contract based in Derby or Bristol . The Role & Responsibilities: We are seeking an experienced Identity and AccessManagement (IAM) Solution Architect to support a series of critical projects and service improvements within Rolls Royce over the next three years. This role will work closely with … and implement IAM solutions. Lead solution architecture for Active Directory, joiner/mover/leaver processes, and related identity lifecycle management. Architect solutions utilising SailPoint IdentityNow (cloud) and CyberArk PrivilegedAccessManagement tools. Document technical and business requirements, ensuring alignment with project goals. Produce Architecture and Design documents, including high-level and low-level designs. Oversee the … similar role. Strong expertise in Active Directory and identity lifecycle (joiner, mover, leaver). Hands-on experience with SailPoint IdentityNow (cloud) for identity governance. Experience implementing and managing CyberArk privilegedaccess solutions. Strong documentation skills, including producing architecture diagrams, design specifications, and test plans. Ability to liaise effectively with both technical teams and business stakeholders. Understanding of IAM More ❯
projects and may stand in as subject matter experts and consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within the following domains identity & accessmanagement, cryptography, privilegedaccessmanagement, SSH key management. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … CISM certification or other broad cybersecurity industry-recognised certificate Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs Working proficiency in Jira for project & tasks management Working proficiency in Confluence for documentation Principal Accountabilities and Responsibilities Architecture, Technical & Design: Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical risks More ❯
Engineering, or related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: Identity and AccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) PrivilegedAccessManagement principles knowledge and experience Multi Factor More ❯
with technical and business teams to address security flaws and implement remediation plans. • Oversee application security tasks, ensuring alignment with audit requirements and internal policies. • Support change and incident management processes, with a focus on high-priority incidents (P1 & P2). • Provide guidance to development and support teams on security-related ticket requirements and process expectations, ensuring SLA compliance. … functions, including audit preparation and policy development. • Compile and deliver regular reports, including weekly, monthly, and OSM-specific security metrics. Required Key Skills (Functional/Technical) Application Security & Vulnerability Management • Familiarity with Common Vulnerability Scoring System (CVSS) • Experience with tools like OWASP ZAP, Veracode, Rapid7 (on-prem), and Wiz.IO (cloud vulnerability management and CSPM) • Track and assist in … secure data transmission • Knowledge of network security principles and firewall configurations • Familiarity with SSO and MFA using OKTA, and directory services such as MS Active Directory • Experience with CyberArk PAM for privilegedaccessmanagement Security Information and Event Management (SIEM) • Use of Splunk SIEM for real-time threat detection and log analysis • Review and optimise SIEM More ❯
Cyprus, Greece, Hong Kong, Japan, and Singapore. Overall Job Purpose : The Junior Information Security Officer (JISO) will assist the Information Security team in implementing and maintaining the information security management system with the objective of managing risks to information assets to an acceptable level. The JISO will develop a good understanding of the information security policies, standards and procedures … organisation's technology landscape to help identify potential threats and vulnerabilities. Key Responsibilities: Assist in maintaining the information security standards, procedures and guidelines. Participate in the information security risk management process to identify, assess, treat and monitor risks. Manage information security incidents and events to protect information assets. Help develop and implement incident response plans and procedures to ensure … industry standards. Assist with the quarterly cybersecurity ITSC and Board updates and key risk indicator reporting. Maintain the information security awareness training program and conduct phishing tests. Maintain the PrivilegedAccessManagement, Security and Event Management and Vulnerability Management systems. Assist in identifying security solutions that will be effective in mitigating risks to information assets. More ❯
million employees across more than 6,500 companies create a better world of work. Culture Amp empowers companies of all sizes and industries to transform employee engagement, drive performance management, and develop high-performing teams. Powered by people science and the most comprehensive employee dataset in the world, the most innovative companies including Canva, On, Asana, Dolby, McDonalds and … or Terraform. Design and implement secure, scalable cloud architectures aligned with business needs. Maintain and support corporate and remote office networking infrastructure, using Cisco Meraki. Support the implementation and management of identity and access using Okta, including SSO integrations (SAML, OIDC), SCIM provisioning, and Okta Workflow automation. Support end-user service escalations with a focus on root cause … resolution and user satisfaction. Oversee Windows Server infrastructure and Active Directory, ensuring reliability and proper access controls. Collaborate with the team to proactively ensure infrastructure and systems are highly available, resilient, and monitored. Develop and execute backup and disaster recovery plans, including documentation and testing. Plan and perform scheduled maintenance and infrastructure upgrades with minimal disruption. Develop scripts and More ❯
would be a bonus if you had: Experience managing third-party security service providers Familiarity with security tools and controls such as Endpoint Protection, DLP, Cloud Security, Threat & Vulnerability Management, and PrivilegedAccessManagement A background in developing and implementing operational security strategies and roadmaps This is a fantastic opportunity to join a progressive organisation with More ❯
Technology Graduate Trainee, Information Security London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services: clearing, agency and execution, market making … and hedging and investment solutions. It has a leading franchise in many major metals, energy and agricultural products, with access to 60 exchanges. The group provides access to the world's major commodity markets, covering a broad range of clients that include some of the largest commodity producers, consumers and traders, banks, hedge funds and asset managers. With … Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privilegedaccess monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and services Maintenance and development of More ❯
Manager, Renewal Management - EMEA (12 month FTC) About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations … highly impactful renewals with an advanced proficiency to think bigger picture and not only close negotiations, but also expand account opportunities via cross selling and up selling Pivotal in management of EMEA Renewals team's pipeline forecasting exercises and metrics Drive the team process and operational rigor to support the growing Saas/Subscription renewal organization and transformation Identify … a playbook for renewal engagement, maximizing revenue retention and minimizing friction/risk within customer journey Qualifications Experience in growing and managing a renewals team Renewals and customer success management experience in a security or enterprise solution environment - SaaS experience preferred Experience owning pipeline forecasting in Renewals, or Customer Success, or Sales - grasp of the complexity of forecasting in More ❯
About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical … Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity with DevOps practices and toolsets; hands-on experience with CI/CD tools (e.g., Jenkins), Configuration Management/Orchestration tools (e.g., Terraform, Chef, Ansible), and container technologies (e.g., Docker, Kubernetes) is highly desirable. Strong communication and organizational skills to drive complex technical discussions and manage customer … practices. Proven ability to document technical solutions, meeting notes, and recommendations clearly and concisely. Good understanding of OICD and SAML . Ability to provide detailed feedback to the Product Management team based on customer interactions and market trends. What Sets You Apart: Experience designing and deploying enterprise security solutions at scale. Understanding of regulatory and compliance frameworks such as More ❯
Information Security Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to More ❯
About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical … leadership, providing strategic financial insights and data-driven analysis that will directly impact our growth trajectory. You'll have the chance to build and enhance financial models, develop performance management frameworks, and drive accountability across the organization - all while helping to scale a global SaaS business. If you're passionate about using data to influence business decisions, possess a … and dashboards to improve reporting efficiency and scalability Qualifications 8+ years of related experience, including 4+ years in a GTM business partner role Strong understanding of SaaS KPIs, performance management metrics, and revenue recognition Experience working at a SaaS company - required Experience partnering with Sales, Marketing, and Customer Success teams Advanced Excel and financial modeling skills Proficient with common More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
and embed Security Architecture Principles to guide all programmes, projects, and changes Develop and maintain ISO27001-compliant security policies and an ISMS framework Create reference architectures for Identity and PrivilegedAccessManagement Provide architecture reviews for all new systems and major changes to existing ones Support the redevelopment and testing of the organisation's Security Incident Response More ❯
Senior Software Engineer - Workload Identity About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to More ❯
About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privilegedaccessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical … change management. Support the operating rhythm including annual planning, forecasting, pipeline reviews and business reviews. Work cross-functionally to design and implement new processes related to account segmentation, data management, productivity enhancements, etc. Support strategic growth initiatives and projects globally and in the EMEA region. Partner with other functions such as HR, Finance, Legal and various other teams at More ❯