/CD pipelines and Infrastructure as Code (IAC) toolchains, utilizing tools such as Jenkins, Terraform, Ansible, or Chef to automate application deployment, configuration management, and infrastructure provisioning on Azure. Containerization and Orchestration: Proficiency in containerization technologies like Docker and container orchestration with Kubernetes, particularly on Azure … Kubernetes Service (AKS). Ability to manage containerized workloads effectively. Azure Identity & Security: In-depth knowledge of Azure IdentityandAccessManagement (IAM) and Azure Security Center to design and implement robust security andidentity solutions in Azure environments. Azure … Services: Familiarity with other advanced Azure services, such as Azure Virtual Desktop (VDI), Windows 365, Azure Sentinel, Azure Firewall, and Azure Defender for Identity, to provide comprehensive solutions to clients. Azure DevOps: Experience with Azure DevOps services, including Azure Boards, Azure Repos, Azure Pipelines, and Azure Test Plans more »
are currently working on a large scale digital transformation project. Key Responsibilities Managing a team of cross functional skillsets including SailPoint engineers, BA's, IDAM consultants. Production and maintenance QA and training materials Providing professional IDAM subject matter expertise Assisting with the production and maintenance of IAM governance and process … documentation Managing best practices Building the end to end Identitymanagement platform for over 10000 users. You will have: Strong SailPoint technical skills and onboarding application technologies to SailPoint IDN Experience implementing SailPoint and IdentityNow Experience configuring connectors for Active Directory, SAP, Web services/REST more »
As the Head of Information Security Operations, you will oversee the management of the CERT function and partner with SEIM and SOC teams to uphold security standards. Responsibilities: Craft and uphold Information Security processes and procedures to align with business policies and operations. Provide strong leadership to Information … s information assets, meeting compliance and regulatory standards. Serve as the primary escalation point for Information Security Incidents, changes, and problems. Take charge of IDAMmanagementand control. Collaborate with Information Security Risk functions and colleagues to produce Risk Landscape documentation. About You: Experience with technologies/systems more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identityaccessmanagementand elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged accessmanagement, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right … businesses which make the UK what it is. Why Join KPMG Technology and Engineering as a IAM Technical Consultant? You will be an IdentityAccessManagement (IAM) Assistant Manager within the Cyber Security team delivering high quality work to clients in the IAM domain. more »
cloud security, data privacy, and regulatory requirements, particularly in the context of SaaS offerings in finance. Collaborate with cross-functional teams, including product management, engineering, and operations, to ensure successful implementation and deployment of cloud solutions. What we are looking for.. Bachelor's degree in Computer Science, Information … highly available, scalable, and multi-tenant architectures for SaaS applications. Solid understanding of cloud security principles and best practices, including identityandaccessmanagement, encryption, and network security in a SaaS context within the financial sector. Excellent communication and interpersonal skills, with the ability more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … with the team during design and development security roles including custom roles development, deployment and testing Strong experience of integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
Architect will be joining the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and Customer Engagement Platform (CEP). Role responsibilities: Accountable for preparing and … as UML, BPMN, ArchiMate, Essentials Project, and Lucidchart) is a must-have. Background architecture design, with an appreciation for security risk assessment and threat management, is a must-have Experience with technical architectural development, policy, asset managementand modeling is a must-have. Experience and/ more »
internationally recognised membership • Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems • A firm grasp of the threat actors and mitigations for technology risks and a keenness for learning and keeping pace with technology and ways more »
training programs. Offering long-term contracts and competitive rates, our client is searching to attract people from a background in Cyber Security andIdentityAccessManagement to work within the defense sector. Experience with enterprise networks including next gen firewall, network segmentation technology and … internet connectivity. Experience in management of next-generation firewalls (Fortinet, Palo Alto, Checkpoint, etc.) and VPN solutions (Site to Site and Remote Access). more »
range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as IdentityandAccessManagement, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Managementand Vendor/Cloud products assessment Experience carrying more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
distributed systems. Experience with DevOps practices, automation tools, and implementing continuous integration and deployment pipelines. Knowledge of security best practices, identityandaccessmanagement, and compliance standards on GCP. Proficient in Cloud computing, data managementand Cloud security knowledge Must possess exceptional more »
Retford, Nottinghamshire, East Midlands, United Kingdom
pib Group
/VOiP/Audio & Video Conferencing/Contact Centre/Unified Comms) Managed Print Services Networks (WAN/LAN/WiFi) Security Tooling IdentityAccessManagement Email, Storage & Domain Management Cloud Services Supporting the managementand maintenance of well performing … Working within a matrixed team Proactive problem solver and independent thinker. Can prioritise and manage a demanding and agile workload. Excellent communication and stakeholder management capability Attention to detail Ability to think laterally Commercial acumen Further information As well as a competitive salary we offer the following benefits … puts people at the heart of their organisation, then we would love to hear from you. PIB operates a flexible working policy, and our management teams will talk to you about how that would meet both your flexible working needs and those of the business and role you more »
technology solutions and offerings and recommending change where required Responsible for ensuring all compliance and risk issues are understood and highlighted to senior management as they arise Providing technical guidance and assistance to Operational teams where necessary Taking personal responsibility to ensure solutions are evaluated, planned, tested and … as Code and Documentation as Code. Excellent Entra ID and Active Directory administration experience plus familiarity with technologies in wider IdentityandAccessManagement including PAM, PIM and RBAC. Experience with Microsoft Defender for Cloud, cloud security posture management (CSPM) and cloud … Scrum methodologies Exceptional communication, presentation and interpersonal skills with an ability to extract, translate and communicate meaningful information at all levels of executives, managementand peers Strong technical documentation skills; workflows, architectural diagrams, support documentation Please note, you will be joining an organisation who offer excellent career prospects more »
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identityandaccessmanagement, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
is part of an Active Directory assessment project, where you will be responsible for designing the future state OT environment, specifically focusing on identitymanagement, such as JML and PAM. Key … Responsibilities Conduct a thorough Active Directory assessment to understand the current state of the environment Design and implement solutions for identityandaccessmanagement Collaborate with cross-functional teams to ensure successful integration of the future state OT environment Provide expertise in Active Directory … JML, and other identitymanagement tools Job Requirements Significant experience in Active Directory andidentitymanagement Knowledge of JML and other related tools Understanding of access control and security best practices Ability to work in a fast-paced, collaborative environment more »
Devon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of CI/CD tools and SAST/DAST tooling. Understanding of networking principles and cloud security frameworks. Experience with identityandaccessmanagement tools. Familiarity with relational and NoSQL databases. #INDTech more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
Storage, and Azure Networking, to optimize application performance and availability Define and enforce security and compliance measures in Azure, including identityandaccessmanagement, network security, and data encryption Collaborate with operations teams to implement monitoring and logging solutions using Azure Monitor, Azure Log more »
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols andaccess control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents General connectivity/network issue management/service management experience more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Domino's Pizza
role will focus on leading on a roadmap for Modern Workplace enhancements and providing technical expertise and support for the implementation, configuration, andmanagement of various modern workplace technologies and tools. Success in this role looks like: Design, implement, and manage modern workplace solutions. Collaborate with IT and … users. Stay updated with the latest trends and best practices in workplace technology. Design and ownership of authentication andidentity platforms including IDAM, F5 VPN, Active Directory (on-premise and Azure) and Office 365 Maintain and support the infrastructure powering the Digital Workplace solutions (Video Conferencing, Wi-Fi … Printing, Mobile Device Management/Enterprise Mobility Management etc.) 5+ years strong demonstratable experience in a similar role supporting enterprise server Infrastructure and End User Computing environments. Ideally you will be a skilled engineer looking for their next step into an architect/managementmore »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Airbus
and Friday afternoons off, hybrid working, flexible working, option to buy/sell holiday Personal Development: Personalised development plan, Airbus Leadership University and unlimited access to 10,000+ E-learning courses, internal mobility including international opportunities Health & Wellbeing: Bupa health insurance (including assisted fertility treatments and gender dysphoria … our purpose . So what's your next change? You will join a highly motivated and collaborative team managing the IdentityandAccessManagement (IAM) products in Airbus, ensuring our employees, customers and suppliers have secure access to applications and data with … a wide range of internal customers and stakeholders, (Legal, HR, Customer Services, IT...) Build and maintain state-of-the art IT products delivering access control, collaborating with IT architects, developers business analysts and process owners Analyze the IAM systems and data to identify opportunities to deliver improvement andmore »
Employment Type: Permanent, Part Time, Work From Home