site 4-5 days a week Job Description: "Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP,cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
DV Cleared NetiQ Engineer - Farnborough - ASAP Start - 6 months Rolling Contract iO Associates are currently looking for a DV Cleared IdAM/NetiQ Senior Engineer for a 6 month rolling contract based in Farnborough offering £775 a day (inside IR35). You must hold active DV Clearance and be a … join this programme of work - unfortunately, you can't be a dual national. We're looking for candidates with the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged AccessManagement (PAM) Identitymore »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
practices for cloud-based applications. Monitor cloud infrastructure and services, proactively identifying and resolving issues to ensure optimal performance. Manage identityandaccessmanagement in Azure, including Azure Active Directory and role-based access control (RBAC). Implement security policies, firewalls, andmore »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
technical challenges. Compliance and Security: Ensure designs adhere to data practices, regulatory standards, and security frameworks relevant to highly secure government systems. Requirements Management: Identify and capture non-functional requirements and integrate them into technical designs. Standards Development: Shape and evolve technical standards and principles related to cloud … highly secure on-premise IT infrastructure. Technical Expertise: Experience with technologies such as VMware, VxRail, Networks, SIEM, AntiVirus, PKI/HSM, Cross Domain Gateways, IDAM/RBAC/ABAC/MFA, Windows Technologies, High Grade Crypto. Design Principles: Knowledge of Secure by Design and Zero Trust Principles is beneficial. Defence more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
IAM Systems Security Engineer (digital) ABJ6891 South East c £49 to £61K + Bonus As an IdentityandAccessManagement (IAM) engineer working a with a global digital technology you will support the planning, design, development, and deployment of centralized IAM solutions for the … principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, andidentity governance. Working with stakeholders within the business to understand business and technical requirements, define the scope and approach to Identity-related … implementation is a success across the business Generate solutions and policies in support of the Privileged AccessManagement (PAM) andIdentity Governance for the company and consumers. Provide support for policies, baselines, and operational procedures around PAM. Design and implement IAM solutions that ensure more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identityandaccessmanagement, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM … solutions and the delivery of the enterprise-level Privileged AccessManagement program. The role will also support the implementation andmanagement of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identityaccessmanagement … principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, andidentity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM threats more »
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Met Office
ll do our best to agree a working pattern that works for everyone. World changing work From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries … teams focus on their business problems without having to worry about common problems like cloud environments, logging, monitoring and alerting, data transfer or identityandaccess management. As IT Service owner you will be responsible for the successful operation and continuous improvement of our central Logging … Monitoring and Alerting solution as well as our customer facing IdentityandAccess Management. You may also be required to help develop and deliver new services that fit our mission. Your key duties include All aspects of IT Service management Managing finances including budgeting more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Great Yarmouth, Norfolk, East Anglia, United Kingdom
Johnson Controls
management process by ensuring replacement machines are ready for users and retiring machines are processed to completion Support IdentityandAccessManagement requests (e.g., provisioning, de-provisioning, access validation, authentication, network share, and troubleshooting) Handle UK Deskside Service Now Ticket … Handling Queues to resolve end-user issues and requests Support local IT security compliance (e.g., comms room set-up, maintenance, andaccess) as needed Maintains end-user system security by prioritizing vulnerability incidents/requests Proactively communicate and provide updates to users Support & delivery of Enterprise and Business … to foster professional growth Preferred Relevant qualification in Computer Science, Engineering, Microsoft certification or related discipline Overview of Windows subsystems such as Certificate management, Device management, regionalisation, Registry editor etc. Experience in using Service Now for IT requests/incidents Knowledge of the following technologies: iOS more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM IdentityAccessManagement SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss prevention PKI Public key infrastructure Ability to … server architecture awareness Previous hands-on experience in network/server and security operational roles IT Security pre-sales experience; previous information security management experience Benefits: 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system exciting opportunity to choose more »
IN OFFICE) RATE: £500 PER DAY INSIDE IR35 LENGTH: 6 MONTHS Key skills/knowledge/experience: Strongknowledge of cryptographic concepts, HSMs, key management Hands-on experience in implementing and operating Thales Safenet HSMs Hands-on experience in designing and implementing key management solutions for enterprises. … and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmanagement Experience working on PKI/key management solutions for connected vehicle systems If you are interested more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
PowerShell. Understanding of the tactics, techniques and procedures (TTP) used by attackers. Understanding and experience of implementing and managing security controls on network access control … systems such as Firewall, IDS, WAF and network segmentation technology. Understanding and experience of technologies and concepts including Windows, Networking, IdentityandAccessManagement, Event Logging and Monitoring, Anti-virus and Zero-Touch Architecture. Life at Littlefish: Our company values shape who we are more »
closure of all service requests, problems and incidents that relate to IT services. This includes: End-User Computing (EUC) Application Support Email File ManagementIdentityAccessManagement Managed Print Services The primary objective of the IT Service Desk is to ensure the … Working within a matrixed team Proactive problem solver and independent thinker Can prioritise and manage a demanding and agile workload. Excellent communication and stakeholder management capability Attention to detail Ability to think laterally Resilient and positive Structured and organised Collaborative team player Proactive quick learner Flexibility to travel … puts people at the heart of their organisation, then we would love to hear from you. PIB operates a flexible working policy, and our management teams will talk to you about how that would meet both your flexible working needs and those of the business and role you more »
initiatives programme. Will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
Manchester, North West, United Kingdom Hybrid / WFH Options
N Brown Group
requirements (NFRs) environment (including Security best practises), but also up to the application level, as well as operating and service concepts in system managementand IT automation. Create technical documents like Architecture viewpoints, Technology Architecture blueprint and solution design specification. Be a Cloud SME within the architecture chapter … Service Models (Infrastructure, Container, Platform, Function & SaaS). Cloud integration and transformation (eg to Azure, AWS or GCP, DevOps frameworks). Cloud Security (IdentityAccessManagement, PKI, Encryption, Network Security, etc.), Deep knowledge in IaaS, PaaS, SaaS cloud scenarios and knowledge in the area … of cross-platform monitoring, managementand orchestration tools. High-level design of cloud solutions. What's in it for you? Hybrid working 24 days holiday (+ 8 bank holidays) with the option to buy an additional 10 days Annual bonus scheme Enhanced maternity and adoption leave Accessmore »
/li li Hands-on experience in implementing and operating Thales Safenet HSMs/li li Hands-on experience in designing and implementingkey management solutions for enterprises./li li Hands-on experience in HSM, Cryptography related fields/li li Knowledge of Networking and Network Security … applications./li li Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmanagement/li li Experience working on PKI/key management solutions for connected vehicle systems/ more »
have lots happening in tech. The main responsibility of the Senior DevOps Engineers will be to manage the creation, enhancement, deployment, continuous upkeep, andmanagement of our clients AWS framework and related systems. In addition, they will provide technical guidance to junior team members, serve as the team … DevSecOps and collaboration with Information Security (InfoSec) teams to deploy secure solutions, utilizing Role-Based Access Control (RBAC), IdentityandAccessManagement (IAM), Cloud Security protocols, and third-party security tools like AquaSec. Ability to self-manage development projects, tasks, and time more »