solutions (e.g., CyberArk, BeyondTrust, Delinea) Implement least privilege access models and enforce secure credential management Monitor and audit privileged access activities across systems and applications Integrate PAM tools with SIEM, IAM, and other security platforms Develop and maintain policies, procedures, and documentation for PAM operations Conduct regular access reviews, privilege audits, and risk assessments Collaborate with IT, DevOps, andSecurityMore ❯
Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerability management, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT More ❯
solutions (e.g., CyberArk, BeyondTrust, Delinea) Implement least privilege access models and enforce secure credential management Monitor and audit privileged access activities across systems and applications Integrate PAM tools with SIEM, IAM, and other security platforms Develop and maintain policies, procedures, and documentation for PAM operations Conduct regular access reviews, privilege audits, and risk assessments Collaborate with IT, DevOps, andSecurityMore ❯
solutions (e.g., CyberArk, BeyondTrust, Delinea) Implement least privilege access models and enforce secure credential management Monitor and audit privileged access activities across systems and applications Integrate PAM tools with SIEM, IAM, and other security platforms Develop and maintain policies, procedures, and documentation for PAM operations Conduct regular access reviews, privilege audits, and risk assessments Collaborate with IT, DevOps, andSecurityMore ❯
Wokingham, England, United Kingdom Hybrid / WFH Options
RED Global
BeyondTrust, or Delinea . Implement least privilege access models and enforce secure credential management practices. Monitor and audit privileged access activities across systems and applications. Integrate PAM tools with SIEM, IAM, and cloud security platforms. Develop and maintain policies, documentation, and access procedures . Conduct regular access reviews, privilege audits, and risk assessments . Work closely with IT, DevOps, andMore ❯