Identity Access Management Jobs in Warwickshire

4 of 4 Identity Access Management Jobs in Warwickshire

IAM Technical Business Analyst

Warwickshire, England, United Kingdom
Pontoon
IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+ In short: We're implementing new and heavily regulated controls across our Identity and Access Management solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of Identity and Access Management (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identity and access management processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Employment Type: Contractor
Rate: £550 - £600 per day
Posted:

IAM Technical Analyst / BA (IGA)

Warwick, England, United Kingdom
Hybrid/Remote Options
Pontoon Solutions
Analyst/BA (IGA) Utilities Predominantly remote: Occasional travel to Warwick 6 months+ In short: We’re implementing new and heavily regulated controls across our Identity and Access Management solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across …/IGA skills. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of Identity and Access Management (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identity and access management processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Posted:

Lead PAM Business Analyst

Warwickshire, England, United Kingdom
Hybrid/Remote Options
Pontoon Solutions
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead Identity and Access Management (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user access and identity within … Governance & Administration (IGA) and Privileged Access Management (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered. Please be More ❯
Posted:

CyberArk Engineer

Warwick, Warwickshire, England, United Kingdom
KBC Technologies UK LTD
managing CyberArk core components ( PVWA,CPM,PSM vault ),EPM and SCA solutions. Strong understanding of cybersecurity principles, privileged access management, and Identity and Access Management (IAM) Proficient in configuring and managing CyberArk components. Experience with integrating CyberArk solution with other IAM tools and Infrastructure. Strong knowledge of cloud platforms such … any programming languages . Professional certifications in CyberArk and/or information security (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) Must have CyberArk Implementation hands on experience. Privileged Access Management tool technical certification More ❯
Employment Type: Contractor
Rate: Salary negotiable
Posted: