IAM Strategy Manager - FTSE100 - £90k + Package I am currently working with a FTSE100 who are revolutionising the IdentityAccessManagement space! They are looking for an IAM Strategy Manager to come on board and shape the future of how the business views identity. … IdentityAccessManagement is a key strategic pillar for the organisation and want to use innovation in the IAM space to drive busines... APCT1_UKTJ more »
Job Title: IdentityandAccessManagement Analyst Company: Elida Beauty Location: London, UK Contract Length: 6 months - Maternity Cover Salary : £46,500 About Us: Elida Beauty is a very exciting new beauty business that will soon be becoming independent of Unilever. We re-found more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right … businesses which make the UK what it is. Why Join KPMG Technology and Engineering as a IAM Technical Consultant? You will be an IdentityAccessManagement (IAM) Assistant Manager within the Cyber Security team delivering high quality work to clients in the IAM domain. more »
your technical abilities and in-depth business process understanding to emerge as a Subject Matter Expert (SME) in core systems such as Risk Management, Finance and Project ERP, HR, and Training platforms • Utilise technical expertise in SQL databases, relational database reporting, and workflow tools like SharePoint to manage … systems, specifically within finance, HR, and risk management domains Proficiency in areas such as configuration management, identityandaccessmanagement, active directory, collaboration platforms, and other M365-based services such as Power Automate, SharePoint and Teams A demonstrated track record more »
As the Head of Information Security Operations, you will oversee the management of the CERT function and partner with SEIM and SOC teams to uphold security standards. Responsibilities: Craft and uphold Information Security processes and procedures to align with business policies and operations. Provide strong leadership to Information … s information assets, meeting compliance and regulatory standards. Serve as the primary escalation point for Information Security Incidents, changes, and problems. Take charge of IDAMmanagementand control. Collaborate with Information Security Risk functions and colleagues to produce Risk Landscape documentation. About You: Experience with technologies/systems more »
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
Working with various business stakeholders to understand requirements, converting these needs into appropriate technical designs Knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access IT strategy and planning which focuses on maximising the value from current more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
business processes supported in ServiceNow from an Identity & AccessManagement perspective Reporting into the IdentityandAccessManagement function, you’ll be delivering automated access provisioning and integrating with other core IAM products such as IdentityNow … Sailpoint experience would be great, but training will be given Understanding of ITIL and the assorted business processes supported in ServiceNow from an Identity & Accessmanagement perspective Additional Information When you commit to Legal & General, we’ll commit to you too. That means we … ll recognise and reward your hard work, your performance and your contribution. If you join us, you’ll get access to some great benefits, including private medical insurance, at least 25 days holiday (excluding bank holidays), a generous pension scheme, life assurance, and Income Protection. You can participate more »
Northamptonshire, England, United Kingdom Hybrid / WFH Options
S-SA Digital
measures to safeguard client data, devices, and communications within the modern workplace environment, adhering to industry standards and best practices. • IdentityandAccessManagement (IAM): Configure and maintain identitymanagement solutions, such as Entra ID/Azure Active Directory (Azure … AD) and Conditional Access, to enforce secure user authentication andaccess policies. Deploy role-based access controls (RBAC) to ensure proper access control and authorisation. Job Requirements • Proven experience in Microsoft Cloud Security and Modern Workplace with a focus on architecting and … Directory, and Conditional Access. • Familiarity with mobile device management (MDM) and application management concepts. • Experience with identityandaccessmanagement (IAM) principles and best practices. • Strong understanding of information protection and data security. • Experience in Azure Cloud Security, with a more »
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identityaccessmanagementand elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged accessmanagement, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
Hove, England, United Kingdom Hybrid / WFH Options
Legal & General
growth and strategic direction for Cloud Services. The Cloud Capability Lead will provide technical leadership, guidance, and expertise in the development, deployment, standardisation andmanagement of Cloud based technologies and services. The Cloud Capability Lead will work closely with Group Technology, Architecture, Portfolio and Product Management … Capability. Define and track key business performance metrics for the Capability, ensuring alignment with Organisational goals and Objectives. Working with the Portfolio and Product Management team to plan and allocate resources effectively, ensuring the Cloud Capability has the necessary skills, flexibility and capacity to meet objectives. Working in … continuous integration, continuous delivery (CI/CD), version control, planning and collaboration. Knowledge of pipelines, builds, releases and deployment strategies. Understanding of monitoring andmanagement services for tracking performance, availability and health of resources and applications. IdentityandAccessManagement principles in more »
cloud security, data privacy, and regulatory requirements, particularly in the context of SaaS offerings in finance. Collaborate with cross-functional teams, including product management, engineering, and operations, to ensure successful implementation and deployment of cloud solutions. What we are looking for.. Bachelor's degree in Computer Science, Information … highly available, scalable, and multi-tenant architectures for SaaS applications. Solid understanding of cloud security principles and best practices, including identityandaccessmanagement, encryption, and network security in a SaaS context within the financial sector. Excellent communication and interpersonal skills, with the ability more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Sectech Solutions
team during the design and development of security roles including custom roles development, deployment and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Utilize professional judgement, critical thinking skills and research to improve processes … Job Qualifications Hands-on experience delivering Dynamics Security portfolio including D365 Finance, D365 Project Operations Attach, D365 Project Operations Sub, D365 Supply Chain Management, and D365 Team Members. Strong experience working in MSD security roles and in designing, developing and deploying custom security roles in D365 based on more »
internationally recognised membership • Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems • A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
Essential Functions Take a lead role in the delivery of BAU IdentityandAccessmanagement operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory … of design, configuration, deployments, and operations in the area of IAM. Work on accessmanagement, identity governance, andidentitymanagement solutions. AWS Identityand Azure Identity : Leverage AWS IdentityandAccessManagement … in CyberSecurity, computer science, Information Technology or related field or equivalent work experience Relevant Microsoft certifications such as Microsoft Certified: IdentityandAccess Administrator Associate, Microsoft Certified: Azure Security Engineer Associate, or other industry certifications (e.g., CISSP, CISM, CompTIA Security+). Certifications including but not limited more »
technology solutions and offerings and recommending change where required Responsible for ensuring all compliance and risk issues are understood and highlighted to senior management as they arise Providing technical guidance and assistance to Operational teams where necessary Taking personal responsibility to ensure solutions are evaluated, planned, tested and … as Code and Documentation as Code. Excellent Entra ID and Active Directory administration experience plus familiarity with technologies in wider IdentityandAccessManagement including PAM, PIM and RBAC. Experience with Microsoft Defender for Cloud, cloud security posture management (CSPM) and cloud … Scrum methodologies Exceptional communication, presentation and interpersonal skills with an ability to extract, translate and communicate meaningful information at all levels of executives, managementand peers Strong technical documentation skills; workflows, architectural diagrams, support documentation Please note, you will be joining an organisation who offer excellent career prospects more »
/CD pipelines and Infrastructure as Code (IAC) toolchains, utilizing tools such as Jenkins, Terraform, Ansible, or Chef to automate application deployment, configuration management, and infrastructure provisioning on Azure. Containerization and Orchestration: Proficiency in containerization technologies like Docker and container orchestration with Kubernetes, particularly on Azure … Kubernetes Service (AKS). Ability to manage containerized workloads effectively. Azure Identity & Security: In-depth knowledge of Azure IdentityandAccessManagement (IAM) and Azure Security Center to design and implement robust security andidentity solutions in Azure environments. Azure … Services: Familiarity with other advanced Azure services, such as Azure Virtual Desktop (VDI), Windows 365, Azure Sentinel, Azure Firewall, and Azure Defender for Identity, to provide comprehensive solutions to clients. Azure DevOps: Experience with Azure DevOps services, including Azure Boards, Azure Repos, Azure Pipelines, and Azure Test Plans more »
DV Cleared NetiQ Engineer - Farnborough - ASAP Start - 6 months Rolling Contract iO Associates are currently looking for a DV Cleared IdAM/NetiQ Senior Engineer for a 6 month rolling contract based in Farnborough offering £775 a day (inside IR35). You must hold active DV Clearance and be a … join this programme of work - unfortunately, you can't be a dual national. We're looking for candidates with the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged AccessManagement (PAM) Identitymore »
NetIQ Access Manager - DV Cleared – Farnborough (Full-time onsite) – £775p/d (Inside of IR35) - 6 Months Our major Public Sector client is now looking to replace their complex legacy enterprise infrastructure and are looking for a NetIQ Access Manager to support this. The NetIQ Access Manager will be responsible for designing, implementing and leading the deployment and configuration of NetIQ Identity Manager solutions. The ideal NetIQ Access Manager will … have the following skills/experience: Holds Active DV Clearance Proven Experience with NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication andIdAM Previously designed, implemented, and maintained identity, accessand privilege management. Ideally, familiar with Tiered access model, zero trust, least more »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »
AWS), web and mobile application technologies Infrastructure and Network understanding, how systems and technology integrate Knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access Reviewing and advising on third parties' technical designs This is an excellent more »