Our client is a Distinguished European Consultancy looking to break into the UK Market as an integrator of third-party IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions … to ensure seamless integration of IAM and PAM solutions with existing client systems. Deliver training and documentation to clients for the effective use andmanagement of the implemented solutions. Stay abreast of the latest trends and developments in IAM and PAM technologies to provide innovative solutions to clients. … Strong understanding of related technological approaches (e.g. Zero Trust, Least Privilege, ) Familiarity with regulatory compliance and industry standards related to identityandaccess management. Exceptional analytical and problem-solving skills, with the ability to translate complex requirements into actionable solutions. Strong project managementandmore »
South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
the necessary improvements, meeting stakeholders expectations. Presenting to management, proactively raising concerns/issues/risks professionally with project members and escalating to management as required. Engaging with business and technical architects, designers, and analysts to ensure projects adhere to standards. Engaging and working with procurement … team player who will confidently fit into a small, dedicated function of security professionals, where everyones contributions are recognised and appreciated. Strong leadership andmanagement skills with experience of leading and directing multi-disciplinary business and technology teams (consisting of information security, professional audit, and technology colleagues). … NIST CSF Experience delivering any information security tools/capabilities such as, but not limited to, Data Loss Prevention, SIEM, IdentityandAccessManagement, EDR/XDR The deadline for applications is 11.55pm Sunday 28th April. Please apply with a CV and a covering more »
customer requirement What you'll need • Proven expertise in security technologies such as firewalls, intrusion detection/prevention systems, encryption, identityandaccessmanagement (IAM), endpoint security, etc. • Experience working with security vendors and their products, including Secure Access Service Edge (SASE … and Secure Service Edge (SSE) solutions. • In-depth understanding of IdentityandAccessManagement (IAM) concepts and technologies, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged AccessManagement (PAM), andIdentity as a Service (IDaaS). … Certified Cloud Security Professional), or equivalent. • Relevant certifications: o Palo Alto Networks Certified Cloud Security Engineer (PCCSE), o Palo Alto Networks Certified Prisma Access Specialist (PCPAS) o Cisco Certified CyberOps Professional o Check Point Certified Security Administrator (CCSE) o Check Point Certified Cloud Specialist o Fortinet Network Security more »
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Ready to utilize your skills and experience in Cyber Security, assisting client with Saviynt Identity Governance solution to meet the requirements? We have an exciting role for you – IAM Saviynt Architect. Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We … within budget Interact/coordinate with customers as required Your Profile Key skills/knowledge/experience: Extensive experience with IdentityandAccessManagement Experience as an IAM architect Application, data and infrastructure governance, experience with legacy on-premises or modern cloud IGA offerings … Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagementand Governance use cases etc. Solutioning and Architecture experiences Rewards & Benefits TCS is consistently voted more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
scalability, security, and performance requirements. Implement infrastructure as code (IaC) principles using tools like Terraform, or Azure Resource Manager to automate the provisioning andmanagement of cloud resources. Deploy and configure cloud services and platforms, such as Azure, or Google Cloud Platform (GCP), based on best practices and … architectural principles. Implement security controls, identity, andaccessmanagement (IAM), encryption, and compliance standards to ensure the security and integrity of cloud environments. Optimise cloud infrastructure and services for performance, reliability, and cost-effectiveness, utilising monitoring, logging, and analytics tools to identify and address … CircleCI. Ability to implement infrastructure testing, deployment automation, and monitoring solutions. Security and Compliance: Knowledge of cloud security best practices, identity, andaccessmanagement (IAM), encryption, and data protection. Experience implementing security controls, compliance standards, and security monitoring in cloud environments. Understanding of regulatory more »
London, England, United Kingdom Hybrid / WFH Options
ITRS
all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support … managementand helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes IdentityandAccessManagement (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance of all systems with security, data … Network Infrastructure 8+ years of managing Internal and External Data Centres 8+ years management of infrastructure incident, problem, capacity, lifecycle and change management Experience of Azure infrastructure and applications An understanding of Databases and SQL clusters Experience working in a governance framework environment The ability to more »
controls, overseeing processes such as account provisioning, deprovisioning, and permissions management, as well as managing the identityandaccessmanagement process. Promote security awareness throughout the organization by providing training and guidance on best practices. Analyze security logs, events, and … evaluations. Remain updated on emerging cybersecurity threats and vulnerabilities, utilizing threat intelligence to enhance security measures. Prepare and deliver routine security reports to managementand stakeholders, summarizing the organization's security posture, incidents encountered, and risk assessments conducted. Provide assistance with internal and external audit activities, supporting ongoing more »
security controls in AWS environments. Provide expert guidance and thought leadership to clients on best practices in cloud security, including identityandaccessmanagement, data protection, and network security. Collaborate with cross-functional teams to develop and implement secure cloud architectures that meet the more »
equivalent internationally recognised membership Experience in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/IPS, andIDAM systems Good understanding of security tooling for cloud and security automation Familiarity with relevant cyber security standards, to include NIST CSF, ISO 27001 and broader more »
Azure environment. Knowledge Transfer : Upon successful completion of User Acceptance Testing (UAT), transition ownership of the scripts to the Geospatial Team for ongoing managementand maintenance. Documentation : Document the entire solution achieved through Azure Automate tooling. Including documenting any steps or configurations that cannot be automated through scripting … DevOps pipelines to automate the deployment process throughout multiple environments. High level of proficiency with Windows, PowerShell, PowerShell DSC & Bash. Including scripting, package managementand deploying applications on both Windows Server and Ubuntu environments within a cloud infrastructure. Proficiency in diagnosing and resolving issues related to deployment … configuration, and automation, ensuring smooth operation and minimizing downtime. Understanding of security principles and best practices in cloud environments, including identityandaccessmanagement, encryption, and compliance standards, to ensure the integrity and security of deployed configurations and infrastructure. Benefits Include: Contributory pension scheme more »
Role: Sailpoint SME Location: London Duration: 6 months Key essential skills: 5+ years of experience in IdentityandAccessManagement 4+ years of SailPoint IIQ experience Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations … our team as an additional resource for our SailPoint upgrade project. The ideal candidate will have a strong background in IdentityandAccessManagement (IAM), with significant experience specifically in SailPoint Identity IQ (IIQ) platform upgrades and migrations. Role & Responsibilities: Lead and … transitions and minimal disruptions to operations. Utilize expertise in SailPoint Identity IQ platform to manage Access Lifecycle, Certifications, and Role Management processes effectively. Onboard applications using various connectors including but not limited to Active Directory, JDBC, SCIM 2.0, and Azure Active Directory. Develop APIs more »
Identity Engineer Role Overview The Senior Identity Engineer is pivotal in delivering and supporting high-quality IdentityandAccessManagement (IAM) services, leveraging SailPoint IdentityNow as the core platform. This role extends to integrating SailPoint IdentityNow with its Access Risk Management (ARM) module for effective Segregation of Duties (SOD) management. The position involves configuring and managing identityandaccess controls across a diverse technology stack including SailPoint IDNow, SAP Identity Authentication Service (IAS) for Single Sign-On (SSO), Azure AD … Security for Multi-Factor Authentication (MFA). Key Responsibilities SailPoint IdentityNow Implementation: Lead the deployment of SailPoint IdentityNow, ensuring robust identityandaccessmanagement across the organization. Access Risk Management (ARM): Utilize the SailPoint ARM module to implement, monitor, andmore »
SailPoint Security Architect Job Overview: The SailPoint Security Architect will be responsible for the design, implementation, and security of SailPoint IdentityandAccessManagement (IAM) solutions within the organization. This role will ensure that SailPoint deployments are secure, compliant, and effectively integrated with critical … enterprise systems such as SAP and cloud environments like Azure. The Security Architect will work closely with IT, project management, and compliance teams to architect solutions that meet complex security needs and business objectives. Responsibilities: Design and architect secure, scalable, and robust SailPoint IAM solutions integrated with SAP … phases, ensuring that all security measures are properly configured and effective. Develop and enforce security policies and procedures related to identityandaccess management. Work closely with compliance teams to ensure that the IAM solutions meet all regulatory and compliance requirements. Provide expertise on authentication, authorization more »
IDAM & Entra ID/Azure AD Engineer (Contract) PLEASE NOTE: This role will fall Inside IR35. DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry … who require an IAM & Azure AD Engineer to join the team in London. The role will support the firms Global IdentityandAccessManagement Service and new Entra ID system. Delivering security, efficiency and scalability of Identity environments. Responsibilities: * Working with the … as OAuth, SAML and OpenID Connect, SCIM * Strong understanding of security concepts, including authentication and authorization. PLEASE NOTE: This role will fall Inside IR35. IDAM & Entra ID/Azure AD Engineer (Contract more »
to technology risks. Working knowledge of Data Sciences, AI & Machine Learning. Knowledge of information security principles, concepts, practices, systems software, database software, and immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management … protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class IdentityandAccessManagement solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber threat and vulnerability analysis and remediation. Forensic examination and data … information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk management domains Equal Employment Opportunity (EEO) It is the policy of Gilead Sciences, Inc. and its subsidiaries and affiliates (collectively "Gilead" or the "Company more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … with the team during design and development security roles including custom roles development, deployment and testing Strong experience of integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders more »
transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation plans Work … internal client project teams, subcontractors and partners Understand and utilise the full range of S-RM’s people and expertise Client Engagement, Account Managementand Business Development Our delivery team is at the heart of our business development activities. You will: Support engagement with clients to understand their … of: Cyber Security frameworks, standards and regulations Information security principles, tools, technologies and techniques Technical cyber knowledge, including: Cloud Security IdentityandAccessManagement Software development lifecycle Operational Technology OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their more »
Operations, focusing on preventative and detective controls •Contribute to the assurance of security to the business, specifically In relation to IdentityandAccessManagement, and Asset Management •Assist in the creation, maintenance, and delivery of cyber security education for colleagues. Mainstream: •Manage … business for various services. •Proactively investigate host, network, and log-based security events and respond to suspected compromises. •Assess and grant role-based access in accordance with business requirements and risk assessments. •Stay updated on recent security and technology changes to ensure optimal protection for the business. Once … the LMAX estate for security events, while minimizing false positives. Success Looks Like: •Ensure compliance with security best practices in network operations, system management, and processes. •Support the successful completion of internal and third-party led audit efforts. •Increased signal-to-noise security events ratio •A measurable decrease more »
controls, and privilege management. Managing and maintaining endpoint security solutions, including endpoint protection platforms (EPP), endpoint detection and response (EDR), and mobile device management (MDM) using Microsoft Intune. Developing and enforcing Data security/Application security policies, standards, and procedures across the organisation. Ensure compliance with … Microsoft Intune, Azure Active Directory, Azure Security Center, and other Microsoft security solutions. Strong understanding of network security, endpoint security, identityandaccessmanagement, and data protection concepts. Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving … skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance,Identity Fundamentals and Cybersecurity (SC-100) are a plus. Hybrid and multi-cloud infrastructures Security Cleared or able to attend Security Clearance. A few things to note This is a more »
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »