IAM Strategy Manager - FTSE100 - £90k + Package I am currently working with a FTSE100 who are revolutionising the IdentityAccessManagement space! They are looking for an IAM Strategy Manager to come on board and shape the future of how the business views identity. … IdentityAccessManagement is a key strategic pillar for the organisation and want to use innovation in the IAM space to drive business growth by connecting their products to the identity of their customers! With customer experience at the forefront of their … and focus more on innovation across a household name! Candidate's must have: Background in technical identity roles Experience designing and configuring identity platforms Operated at strategic level Contributed to the design and execution of identity strategies whilst thinking about the future of digital more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
Access Rights Manager – Data ControlsLondon, UKAXA XL recognizes data and information as critical business assets, both in terms of managing risk and enabling new business opportunities. This data should be high quality and actionable, enabling the AXA XL executive leadership team to maximize benefits and facilitate sustained enterprise … on driving innovation by optimizing how we leverage data to drive strategy and create a new business model - disrupting the insurance market.As Axiom Access Rights Manager you will be in a key position, reporting into the Division Lead - Data Controls, and will operate in a matrix organization across … the IDA, Global Technology, InfoSec, DPO and other control functions with responsibility for ARM/Attribute-based Access Controls (ABAC) into Axiom (AXA XL’s strategic analytics platform). You will lead a small team of direct reports and by example demonstrate your own experience, knowledge, and determination more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
the SEIM and SOC partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … products o LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP o Identityandaccessmanagement systems Active Directory, GPO Configuration o Citrix/VMWare 🌳 Ideally the candidate will be CISSP certified and be certified in … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement 🌳Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function This role is inside IR35 and will be initially more »
IdentityandAccessManagement Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office … Identity … migration expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities andaccess, supporting secure collaboration, and staying current with the latest technologies. You'll … testing and quality assurance efforts to ensure that solutions meet the specified requirements. Manage user identities throughout their lifecycle, including provisioning, deprovisioning, andaccess modifications. Implement role-based access control (RBAC) and ensure appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identityandaccess management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA processes, policies, and configurations. Provide more »
Role | IAM Developer 💫 Company | Healthcare 📏 Size | 10k+ 🪜 Level | Mid Level ✨Skills | Forgerock AccessManagement, IAM Solutions, SSO, OAuth 📍 Based | Staines or Manchester 💻 Hybrid | Once a week in either Staines or Manchester 💰 Offer | up to £60K A global international healthcare service provider is currently expanding their IdentityAccessManagement team by bringing on an additional 2 Forgerock Developers to assist with the development of their technology roadmap in the Identity arena. What you'll be doing: Developing IAM solutions that deliver measurable benefit to their 32 million members worldwide. … a environment with mixed teams including contractors and outsourced vendors What you'll need: Experience with ForgeRock or IAM products such as Ping Identity, Sailpoint, Microsoft B2C or Azure AD Experience in ForgeRock AccessManagement Experience with Single Sign On, LDAP, SAML2, OAuth, OpenID more »
to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right … businesses which make the UK what it is. Why Join KPMG Technology and Engineering as a IAM Technical Consultant? You will be an IdentityAccessManagement (IAM) Assistant Manager within the Cyber Security team delivering high quality work to clients in the IAM domain. more »
IAM Strategy Manager - FTSE100 - £90k + Package I am currently working with a FTSE100 who are revolutionising the IdentityAccessManagement space! They are looking for an IAM Strategy Manager to come on board and shape the future of how the business views identity. … IdentityAccessManagement is a key strategic pillar for the organisation and want to use innovation in the IAM space to drive busines... APCT1_UKTJ more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAMManagement: Take responsibility for IdentityandAccessManagement (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identityaccessmanagementand elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged accessmanagement, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
We are looking for an experienced IdentityAccessManagement (IAM)Consultant, with 7+ years of relevant experience with consulting and IAM architect background to join our client on an upcoming project. The role will suit an ambitious individual with experience with a background in more »
time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with IdentityandAccessManagement with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagementand Governance use cases etc. Solutioning and Architecture experiences more »
Job DetailsDVF Recruitmenthttps://www.dvfrecruitment.comThe IdentityandAccessManagement (IAM) Architect is a new manager level role within our clients Architecture function with responsibility for the definition, product selection, design, development and planning of all aspects of the IAM and related Security capabilities more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization andaccess control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identityandaccessmanagement, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability managementand secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • IdentityandAccess Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
scalability, security, and performance requirements. Implement infrastructure as code (IaC) principles using tools like Terraform, or Azure Resource Manager to automate the provisioning andmanagement of cloud resources. Deploy and configure cloud services and platforms, such as Azure, or Google Cloud Platform (GCP), based on best practices and … architectural principles. Implement security controls, identity, andaccessmanagement (IAM), encryption, and compliance standards to ensure the security and integrity of cloud environments. Optimise cloud infrastructure and services for performance, reliability, and cost-effectiveness, utilising monitoring, logging, and analytics tools to identify and address … CircleCI. Ability to implement infrastructure testing, deployment automation, and monitoring solutions. Security and Compliance: Knowledge of cloud security best practices, identity, andaccessmanagement (IAM), encryption, and data protection. Experience implementing security controls, compliance standards, and security monitoring in cloud environments. Understanding of regulatory more »
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
Security Management System frameworks and standards and their application. Partnered with knowledge of governance processes and practices, including ISMS monitoring and control management frameworks such as, ISO, ISF and COBIT, their relationships to other frameworks and the application within a financial services environment. Good working … knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identityandaccessmanagement, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls … WAFs, DLP, cryptography, vulnerability scanning, identityandaccessmanagement, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to audience and stakeholders. What more »