equivalent internationally recognised membership Experience in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems Good understanding of security tooling for cloud and security automation Familiarity with relevant cyber security standards, to include NIST CSF, ISO 27001 and broader more »
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
We are seeking an experienced NetIQ IdAM SME with expertise in NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication and IdAM. The ideal candidate will possess strong technical skills within a scalable environment and demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Familiarity with Tiered access model, zero trust, least privilege ac... APCT1_UKTJ more »
applications into the cloud based IAM tool Work with a variety of teams across the enterprise to propose solutions that meet the business' identity needs. Manage user identity life cycle including provisioning and deprovisioning as well as modifying access controls Implement RBAC and ensure … systems for suspicious activities. IAM Analyst - Your Background The ideal IAM Analyst will have: At least 3 years of IdentityandAccessManagement experience Proficiency in Identityand Governance tools for example: Saviynt SailPoint Entra ID Other similar tools Proven experience … of working as an IAM Analyst Strong experiences of working in adherence to access control values including RBAC and least privilege access Understanding of regulatory compliance frameworks eg GDPR, NIST, ISO Extremely strong people skills as this role will be working across a variety of business more »
our team as an additional resource for our SailPoint upgrade project. The ideal candidate will have a strong background in IdentityandAccessManagement (IAM), with significant experience specifically in SailPoint Identity IQ (IIQ) platform upgrades and migrations We need someone to more »
our team as an additional resource for our SailPoint upgrade project. The ideal candidate will have a strong background in IdentityandAccessManagement (IAM), with significant experience specifically in SailPoint Identity IQ (IIQ) platform upgrades and migrations We need somone to more »
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
Microsoft Intune, Azure Active Directory, and Conditional Access. - Familiarity with mobile device and application management, as well as identityandaccessmanagement principles. - Solid grasp of information protection and data security, including Azure Cloud Security. - Experience with security assessment methodologies and automation more »
IAM Strategy Manager - FTSE100 - £90k + Package I am currently working with a FTSE100 who are revolutionising the IdentityAccessManagement space! They are looking for an IAM Strategy Manager to come on board and shape the future of how the business views identity. … IdentityAccessManagement is a key strategic pillar for the organisation and want to use innovation in the IAM space to drive business growth by connecting their products to the identity of their customers! With customer experience at the forefront of their … and focus more on innovation across a household name! Candidate's must have: Background in technical identity roles Experience designing and configuring identity platforms Operated at strategic level Contributed to the design and execution of identity strategies whilst thinking about the future of digital more »
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identityandaccessmanagement, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
future of IAM capabilities, our next IAM Director will establish the foundation for which the company will operate from for IdentityandAccessManagement in the future! * Flexible location * Position Purpose Responsible for the planning, building, delivery, and support of the IdentityandAccessManagement (IAM) program for both Brambles enterprise users and customer facing services. This encompasses a wide range of current systems and solutions managed by disparate teams, against various standards and approaches in which this leader will work to consolidate, update, and ensure … CK). Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity, andaccess provisioning life cycle. Solid understanding of the foundation and trends in Information Technology, Information Security, Risk Management, Governance, and Compliance. Demonstrated more »
Per Day (Rolling Contract) - London/Hybrid Tech Stack – Senior Security Architect, Financial Services, Financial Conduct Authority (FCA) Regulations, IT Risk Management, Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation Firewall (NGFW … business needs. This is a great opportunity for Senior Security Architect experienced in or wanting to learn Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation Firewall (NGFW), Cloud Security (exp. AWS/Azure/… be someone with the experience with or wanting to learn industries/technologies like Financial Services, Financial Conduct Authority (FCA) Regulations, IT Risk Management, Network Security, Data Loss Prevention (DLP), IdentityAccessManagement (IAM), Network Access Control (NAC), Next-Generation more »
Manchester Area, United Kingdom Hybrid / WFH Options
The University of Manchester
Overall purpose of the job Based within the IdentityandAccessManagement (IDAM) team, the Senior IDAM Engineer is responsible for designing, implementing, testing, and maintaining the IDAM frameworks, systems, and protocols. The role will build and maintaining the infrastructure and tools used to … platforms. The post holder will lead the development of IDAM related services, whilst being an advocate for automation and security. Key responsibilities, accountabilities and duties IDAM design and development Produces detailed design specifications to form the basis for the construction of IDAM systems, including, for example,: physical data flows; user … Access reviews etc.). Possess significant experience with advanced engineering practices (e.g. Azure DevOps) and taking a lead on developing innovative and secure IDAM solutions. Demonstrable experience of providing technical understanding on strategic, large/complex security and/or identityandaccessmanagementmore »
Ready to utilise your skills in Cyber Security? Are you passionate about IdentityandAccessManagement? We have an exciting role for you – SailPoint Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not …/Knowledge/Experience: Experience in Engineering & architecting IAM solutions using SailPoint IIQ. Engineering background with knowledge and experience of IdentityandAccessManagement principles and practices. Experience in the installation and configuration of solutions using a wide range of IAM related technologies such … access control (RBAC), entitlement management, policy management, data access governance, cloud access governance andidentity analytics. Strong collaboration, influencing and communication skills, with an enthusiasm for problem solving, solutioning, and idea sharing. A proven ability to listen, coach more »
IDAM & Entra ID/Azure AD Engineer (Contract) PLEASE NOTE: This role will fall Inside IR35. DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry … who require an IAM & Azure AD Engineer to join the team in London. The role will support the firms Global IdentityandAccessManagement Service and new Entra ID system. Delivering security, efficiency and scalability of Identity environments. Responsibilities: * Working with the … as OAuth, SAML and OpenID Connect, SCIM * Strong understanding of security concepts, including authentication and authorization. PLEASE NOTE: This role will fall Inside IR35. IDAM & Entra ID/Azure AD Engineer (Contract more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities andaccess, supporting secure collaboration, and staying current with the latest technologies. You'll … testing and quality assurance efforts to ensure that solutions meet the specified requirements. Manage user identities throughout their lifecycle, including provisioning, deprovisioning, andaccess modifications. Implement role-based access control (RBAC) and ensure appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identityandaccess management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA processes, policies, and configurations. Provide more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAMManagement: Take responsibility for IdentityandAccessManagement (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Security Management System frameworks and standards and their application. Partnered with knowledge of governance processes and practices, including ISMS monitoring and control management frameworks such as, ISO, ISF and COBIT, their relationships to other frameworks and the application within a financial services environment. Good working … knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identityandaccessmanagement, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls … WAFs, DLP, cryptography, vulnerability scanning, identityandaccessmanagement, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to audience and stakeholders. What more »
to technology risks. Working knowledge of Data Sciences, AI & Machine Learning. Knowledge of information security principles, concepts, practices, systems software, database software, and immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management … protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class IdentityandAccessManagement solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber threat and vulnerability analysis and remediation. Forensic examination and data … information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk management domains Equal Employment Opportunity (EEO) It is the policy of Gilead Sciences, Inc. and its subsidiaries and affiliates (collectively "Gilead" or the "Company more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … with the team during design and development security roles including custom roles development, deployment and testing Strong experience of integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders more »
transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation plans Work … internal client project teams, subcontractors and partners Understand and utilise the full range of S-RM’s people and expertise Client Engagement, Account Managementand Business Development Our delivery team is at the heart of our business development activities. You will: Support engagement with clients to understand their … of: Cyber Security frameworks, standards and regulations Information security principles, tools, technologies and techniques Technical cyber knowledge, including: Cloud Security IdentityandAccessManagement Software development lifecycle Operational Technology OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their more »
controls, and privilege management. Managing and maintaining endpoint security solutions, including endpoint protection platforms (EPP), endpoint detection and response (EDR), and mobile device management (MDM) using Microsoft Intune. Developing and enforcing Data security/Application security policies, standards, and procedures across the organisation. Ensure compliance with … Microsoft Intune, Azure Active Directory, Azure Security Center, and other Microsoft security solutions. Strong understanding of network security, endpoint security, identityandaccessmanagement, and data protection concepts. Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving … skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance,Identity Fundamentals and Cybersecurity (SC-100) are a plus. Hybrid and multi-cloud infrastructures Security Cleared or able to attend Security Clearance. A few things to note This is a more »