Shoreham-by-sea, Sussex, United Kingdom Hybrid / WFH Options
Ricardo
, ensuring swift resolution. Oversee change management processes. Manage vulnerability and patch updates to maintain security. Implement PrivilegedAccessManagement (PAM) protocols. Conduct cost analysis for cloud services and plan for obsolescence. Resolve 2nd and 3rd line support tickets efficiently. Participate in after-hours upgrades, troubleshooting … implement necessary improvements. Support other technology objectives as required. Key Competencies and Experience Extensive experience in an IT or technology department, including: Administration and management of Linux/UNIX servers. Monitoring system performance and ensuring security. Performing routine system administration tasks and maintaining logs. Providing technical support, troubleshooting, and … user assistance. Installing and optimising Linux-based applications. Managing system access, data integrity, and security protocols. Upgrading systems in line with business needs and coordinating downtime. Developing and maintaining system recovery procedures. Creating and maintaining comprehensive documentation. Technical Skills: Linux Servers: RedHat (ALMA, CentOS, Ubuntu) High-Performance Computing (HPC More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The … users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential … policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯
of IT Security, ensuring robust security services across the organization. Key Responsibilities: Security Operations: Oversee and improve IT Security operations, ensuring efficient and compliant management of security services. Vendor Management: Manage outsourced security providers, ensuring performance meets established SLA standards. Incident Response: Lead and manage IT security incidents … including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, PrivilegedAccessManagement, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance More ❯
both performance and security. You will also be responsible for implementing and managing Single Sign-On (SSO) and PrivilegedAccessManagement (PAM) solutions to strengthen authentication and security. Collaboration with cross-functional teams will be vital to define technical roadmaps and drive innovation. In this role, you … solutions to enable secure data exchange across environments. • Architect and optimise network solutions to enhance both performance and security. • Implement and manage SSO and PAM solutions to strengthen authentication security. • Collaborate with engineering and security teams to ensure best practices and compliance standards are met. Required qualifications to be successful … VxRail to develop and manage virtualised environments. • In-depth knowledge of networking principles and security best practices. • Experience with implementing and managing SSO and PAM solutions for enhanced security. • Strong problem-solving, communication, and stakeholder management skills to work effectively across teams. #LI-JW1 Together, as owners, let's More ❯
We are the UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and PrivilegedAccessManagement (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. We’re looking for a driven Account Manager with a hunter mentality to join our … you’ll win new business while growing and nurturing key enterprise accounts . You’ll collaborate with cybersecurity stakeholders to deliver tailored IAM and PAM solutions that drive long-term client success . What’s in it for you? 🚀 Career Growth: Structured training & industry certifications. 🏖️ Time Off: 33 days holiday … in enterprise services or software sales with a focus on new business Strong account management and client relationship skills Experience selling IAM/PAM solutions like CyberArk, SailPoint, or BeyondTrust Confidence engaging with C-level executives Strategic thinking, commercial awareness, and a results-driven mindset Familiarity with HubSpot , LinkedIn More ❯
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, PrivilegedAccessManagement (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
With a focus on Azure cloud environments, this role will drive key initiatives such as Zero Trust Architecture, PrivilegedAccessManagement (PAM), and third-party cyber due diligence. This is an exciting opportunity to shape our security strategy, integrate advanced frameworks, and work collaboratively with global IT … critical infrastructure. What We’re Looking For: Strong expertise in Azure cloud security tools and frameworks. Hands-on experience with SIEM tools, EDR solutions, PAM, and Zero Trust Architecture. Proven ability to conduct security audits and manage compliance with industry standards. Experience of automated vulnerability testing tools such as AppCheck. … DORA). Responsibilities: Monitor and respond to security incidents using tools like Azure Sentinel and Microsoft Defender. Design and implement Azure security controls, including PAM and Zero Trust principles. Conduct third-party cyber audits and ensure compliance with frameworks like ISO 27001 and NIST CSF. Lead vulnerability assessments and incident More ❯
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), PrivilegedAccessManagement (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and … OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege AccessManagement (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. … Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
Delinea
SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and … OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege AccessManagement (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. … Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS More ❯
Security London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services … agency and execution, market making, and hedging and investment solutions. It has a leading franchise in many major metals, energy and agricultural products, with access to 60 exchanges. The group provides access to the world's major commodity markets, covering a broad range of clients that include some … security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privilegedaccess monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and More ❯
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. "Hands on" technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
East London, London, United Kingdom Hybrid / WFH Options
Reed Technology
the role is a hands-on manager role, so we are looking for candidates who are technically strong and who have some leadership/management experience. Core competencies: Must have some experience in team management. Must have proven knowledge of Microsoft Identity Management systems (Active Directory, ADFS, Entra … but are not limited to: Implement, manage and enhance a range of complex services and projects in areas such as cloud, authentication, identity and privilegedaccessmanagement, roles and access controls, single sign-on, collaboration, mail, and Office365 related technologies. Aligned with IT Services strategies and … standards. 'Hands on' technical leadership. Management and development of infrastructure team members. Provide support, guidance and create development plans to ensure team members are successful in delivering high quality, customer focused services. Collaborate, guide and consult with Stakeholders and Leadership teams on projects and initiatives. Establish and develop monitoring More ❯
leading IT service provider. Working at Computacenter, you'll have the chance to collaborate with talented professionals, gain exposure to cutting-edge technology, and access continuous learning and development opportunities. What You'll Do As a CyberArk Consultant , you will play a key role in advising and implementing CyberArk … solutions for clients, helping them optimize their security posture through the use of best-in-class privilegedaccess management. Your responsibilities will include: Consultation & Implementation : Advise and implement CyberArk solutions, ensuring successful deployment and integration with client environments Security Patch Management : Apply necessary security patches to CyberArk … environments What You'll Need To excel in this role, you’ll need the following skills and experience: CyberArk Expertise : Strong experience with CyberArk PAM solutions, including but not limited to Vault, CPM, PVWA, PSM, PSMP, CP, CCP, Alero, and EPM. Technical Knowledge : Experience working with Windows, Active Directory, Unix More ❯
support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot key management systems like HashiCorp Vault and Thales HSM. -Support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational More ❯
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. -Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to … cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE More ❯
to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to … cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE More ❯
end-to-end Security Solution Architecture, from working with both InfoSec and business teams Key projects on current roadmap include, Internet Proxy Services replacement, privilegedaccessmanagement migration on-prem > cloud. Defender review, Secure Cloud DNS implementation Key skills/experience: Demonstrable experience building fit-for-purpose More ❯