Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
you will be responsible for maintaining SecOps solutions, controls, and processes across the organisation, while mentoring and leading the SOC team to ensure effective management of OT alerts and incidents. This position requires a deep understanding of SecOps concepts, technologies, and best practices, specifically across IT and OT environments. … You will be tasked with ensuring robust incident management, proactive threat detection, and continuous improvement of our security posture. Strong communication and collaboration skills are essential as you will work closely with cross-functional teams to mitigate risks and protect Thames Water's essential services. What you'll do … Kusto Query Language (KQL) for creating and tuning SIEM queries and alerts. • Experience in configuring and troubleshooting MFA, PrivilegedAccessManagement (PAM), and Security Information & Event Management (SIEM) systems, particularly Microsoft Sentinel. Desirable Experience: • Familiarity with managing network security capabilities such as NAC, Firewalls, Proxies/ More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Security Manager - Identity & Access Engineering Date: 2 May 2025 Company: Royal London Group Job Title: Security Manager - Identity Engineering Contract Type: Permanent Location: Edinburgh or Alderley Edge Working style: Hybrid … an exciting role within our Security & Resilience function. This is an operationally focused role involving maintaining a high standard to ensure colleagues have appropriate access for their roles, thereby minimizing potential damage from cybersecurity incidents. The successful candidate will be able to work with minimal guidance in the Identity … AccessManagement field and will take accountability for the day-to-day support of Identity tooling. The role includes direct people management responsibilities for a small team of Identity Engineers and will oversee their daily tasks. The role will also involve developing the skills within the team More ❯
Delivering an improved experience for students in the PC cluster environments and a more robust service for colleagues. Expanding services offering increased flexibility & remote access to Teaching & Learning software Documented designs & processes for new & existing services within Colleague & Student computing Stronger links between IT Services and the Teaching and … our core systems. Improved release management & data obfuscation technologies & processes. Robust guidelines, standards and governance Delivering a PrivilegedAccessManagement (PAM) solution to secure and manage privileged accounts, reducing attack surface, preventing unauthorized access, aligned to industry best practice. More ❯
both performance and security. You will also be responsible for implementing and managing Single Sign-On (SSO) and PrivilegedAccessManagement (PAM) solutions to strengthen authentication and security. Collaboration with cross-functional teams will be vital to define technical roadmaps and drive innovation. In this role, you … solutions to enable secure data exchange across environments. • Architect and optimise network solutions to enhance both performance and security. • Implement and manage SSO and PAM solutions to strengthen authentication security. • Collaborate with engineering and security teams to ensure best practices and compliance standards are met. Required qualifications to be successful … VxRail to develop and manage virtualised environments. • In-depth knowledge of networking principles and security best practices. • Experience with implementing and managing SSO and PAM solutions for enhanced security. • Strong problem-solving, communication, and stakeholder management skills to work effectively across teams. #LI-JW1 Together, as owners, let's More ❯
We are the UK’s leading identity security services provider, specialising in Identity Governance and Administration (IGA) and PrivilegedAccessManagement (PAM) with leading providers like BeyondTrust, CyberArk, Ping, SailPoint, and Saviynt. We’re looking for a driven Account Manager with a hunter mentality to join our … you’ll win new business while growing and nurturing key enterprise accounts . You’ll collaborate with cybersecurity stakeholders to deliver tailored IAM and PAM solutions that drive long-term client success . What’s in it for you? 🚀 Career Growth: Structured training & industry certifications. 🏖️ Time Off: 33 days holiday … in enterprise services or software sales with a focus on new business Strong account management and client relationship skills Experience selling IAM/PAM solutions like CyberArk, SailPoint, or BeyondTrust Confidence engaging with C-level executives Strategic thinking, commercial awareness, and a results-driven mindset Familiarity with HubSpot , LinkedIn More ❯
administration, including Group Policy, user group management, and incident resolution. Support Active Directory security measures such as PrivilegedAccessManagement (PAM), SSO, and MFA. Assist in infrastructure-related design and architecture work, particularly around AD and platform services. Collaborate with service teams locally and globally to … backup and restore processes and overall platform integrity. Tech Environment: Primary Focus: Active Directory (Admin & Security) Other Tech: Windows Server, VMware, Citrix Security Tools: PAM, MFA, SSO Bonus Exposure: Networking (light), OT systems, pharmaceutical environments More ❯
Billingham, Stockton-on-Tees, County Durham, United Kingdom
Oxford Global Resources
administration, including Group Policy, user group management, and incident resolution. Support Active Directory security measures such as PrivilegedAccessManagement (PAM), SSO, and MFA. Assist in infrastructure-related design and architecture work, particularly around AD and platform services. Collaborate with service teams locally and globally to … backup and restore processes and overall platform integrity. ________________________________________ Tech Environment: Primary Focus: Active Directory (Admin & Security) Other Tech: Windows Server, VMware, Citrix Security Tools: PAM, MFA, SSO Bonus Exposure: Networking (light), OT systems, pharmaceutical environments More ❯
manner. Experience in remediating cyber risks in ever-changing digital environments. Strong knowledge of Multi-factor authentication (MFA), PrivilegedAccessManagement (PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing Kusto Query Language (KQL) for Sentinel queries and … alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/IPS, etc. Degree in Cyber Security, Computer Science, Information Technology, Engineering, or related field. Microsoft SecOps specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) Hands-on More ❯
to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled. Location - UK or Europe PAM Conjur Consultant will provide PAM solutions that are commensurate with the delivery needs within the ambit of the given customer environment to achieve desired business … continuous improvement of the implemented tool and associated services as per best practices and industry standards to help our customers mitigate risks associated with privileged accounts. Education Qualification & Experience: Bachelor’s Degree in Computer Science, Cybersecurity, Information Security, Engineering, Information Technology, or related discipline. Overall 12+ years … and at least 8 to 10 years of experience in architecture, design, deployment & implementation of PrivilegedAccessManagement using multi-vendor PAM solutions (preferably CyberArk , Hashicorp) that are deployed globally for large scale customers across various industry verticals Mandatory Certifications: Conjur Certified Delivery Engineer (CDE-CPC Conjur More ❯
Coaching auditors and supporting them to realise their potential on the engagement The skills youll need Were looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. Youll also need: In depth understanding of Infrastructure and Cyber Security …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to … assess and prioritise data effectively, quickly establishing whats important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way JBRP1_UKTJ More ❯
london (city of london), south east england, united kingdom
Natwest
Coaching auditors and supporting them to realise their potential on the engagement The skills youll need Were looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. Youll also need: In depth understanding of Infrastructure and Cyber Security …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to … assess and prioritise data effectively, quickly establishing whats important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way JBRP1_UKTJ More ❯
and supporting them to realise their potential on the engagement The skills you’ll need We’re looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. You’ll also need: In depth understanding of Infrastructure and Cyber …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to … assess and prioritise data effectively, quickly establishing what’s important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way More ❯
and supporting them to realise their potential on the engagement The skills you’ll need We’re looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. You’ll also need: In depth understanding of Infrastructure and Cyber …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts including defence in depth, cryptography, privilegedaccessmanagement, DevOps, Continuous Integration and Continuous Deployment Networking (Device configuration management) and Security Excellent analytical skills and the ability to … assess and prioritise data effectively, quickly establishing what’s important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way More ❯
support business-critical systems 24/7. Key Responsibilities: -Provide technical support for VMware platform, Tanzu, Dell VxRail, and Dell Data Domain. -Troubleshoot key management systems like HashiCorp Vault and Thales HSM. -Support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak). -Have a foundational More ❯
Troubleshooting: Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
Troubleshooting: -Provide expert-level support for VMware Cloud Foundation, Tanzu, Dell VxRail, and Dell Data Domain solutions. -Troubleshoot and resolve issues related to key management systems, including HashiCorp Vault and Thales Hardware Security Module. -Manage and support privilegedaccessmanagement solutions (BeyondTrust) and SSO systems (KeyCloak More ❯
to prevent any downtime or impact to business operations. CyberClan investigates and assists clients with all types of security breaches, including insider threats, unauthorized access, and malicious code. Some breaches are publicly known, but many remain hidden. We analyze client data in a secure forensic lab environment. Due to … cloud environments. Experience with imaging workstations and servers. Experience supporting hybrid cloud setups. Knowledge of backup solutions and security/remediation tools. Familiarity with privilegedaccessmanagement solutions. Linux troubleshooting skills are a plus. Experience supporting Windows, Mac, and ChromeOS. Certifications such as MCP, ITIL, CompTIA, CDRE More ❯