Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … performance • Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identityaccessmanagementand Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to-end project lifecycle gained within a more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure … DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & AccessManagement (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits more »
of our IAM. Seeking how far you can push the system before it breaks. Re-architecting our current process. Required Skills Strength in IdentityAccessManagement Cloud knowledge of security using Microsoft Azure M365 Identity migration expertise Knowledge of Cross Tenant Synch more »
Security Architect MS/Azure/Identity Migration/AD Cross tenant Contract (Inside) Responsibilities: Looking for a Microsoft Azure security architect who has a lot of experience within the Identity & AccessManagement domain. You should have extensive financial services background Be more »
training programs. Offering long-term contracts and competitive rates, our client is searching to attract people from a background in Cyber Security andIdentityAccessManagement to work within the defense sector. Experience with enterprise networks including next gen firewall, network segmentation technology and … internet connectivity. Experience in management of next-generation firewalls (Fortinet, Palo Alto, Checkpoint, etc.) and VPN solutions (Site to Site and Remote Access). more »
coordinating the adoption process. Experience with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Excellent interpersonal skills, able to effectively communicate with and influence both internal and external stakeholders more »
South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
the necessary improvements, meeting stakeholders expectations. Presenting to management, proactively raising concerns/issues/risks professionally with project members and escalating to management as required. Engaging with business and technical architects, designers, and analysts to ensure projects adhere to standards. Engaging and working with procurement … team player who will confidently fit into a small, dedicated function of security professionals, where everyones contributions are recognised and appreciated. Strong leadership andmanagement skills with experience of leading and directing multi-disciplinary business and technology teams (consisting of information security, professional audit, and technology colleagues). … NIST CSF Experience delivering any information security tools/capabilities such as, but not limited to, Data Loss Prevention, SIEM, IdentityandAccessManagement, EDR/XDR The deadline for applications is 11.55pm Sunday 28th April. Please apply with a CV and a covering more »
Security Consultant - Identity & AccessManagement Services SOC consulting experience with OT experience With Threat Management/hunting/intel/security operations more »
London, England, United Kingdom Hybrid / WFH Options
ITRS
all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support … managementand helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes IdentityandAccessManagement (IAM) for infrastructure. Monitor and Event management for infrastructure Ensure the compliance of all systems with security, data … Network Infrastructure 8+ years of managing Internal and External Data Centres 8+ years management of infrastructure incident, problem, capacity, lifecycle and change management Experience of Azure infrastructure and applications An understanding of Databases and SQL clusters Experience working in a governance framework environment The ability to more »
/CD pipelines and Infrastructure as Code (IAC) toolchains, utilizing tools such as Jenkins, Terraform, Ansible, or Chef to automate application deployment, configuration management, and infrastructure provisioning on Azure. Containerization and Orchestration: Proficiency in containerization technologies like Docker and container orchestration with Kubernetes, particularly on Azure … Kubernetes Service (AKS). Ability to manage containerized workloads effectively. Azure Identity & Security: In-depth knowledge of Azure IdentityandAccessManagement (IAM) and Azure Security Center to design and implement robust security andidentity solutions in Azure environments. Azure … Services: Familiarity with other advanced Azure services, such as Azure Virtual Desktop (VDI), Windows 365, Azure Sentinel, Azure Firewall, and Azure Defender for Identity, to provide comprehensive solutions to clients. Azure DevOps: Experience with Azure DevOps services, including Azure Boards, Azure Repos, Azure Pipelines, and Azure Test Plans more »
transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation plans Work … internal client project teams, subcontractors and partners Understand and utilise the full range of S-RM’s people and expertise Client Engagement, Account Managementand Business Development Our delivery team is at the heart of our business development activities. You will: Support engagement with clients to understand their … of: Cyber Security frameworks, standards and regulations Information security principles, tools, technologies and techniques Technical cyber knowledge, including: Cloud Security IdentityandAccessManagement Software development lifecycle Operational Technology OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their more »
Operations, focusing on preventative and detective controls •Contribute to the assurance of security to the business, specifically In relation to IdentityandAccessManagement, and Asset Management •Assist in the creation, maintenance, and delivery of cyber security education for colleagues. Mainstream: •Manage … business for various services. •Proactively investigate host, network, and log-based security events and respond to suspected compromises. •Assess and grant role-based access in accordance with business requirements and risk assessments. •Stay updated on recent security and technology changes to ensure optimal protection for the business. Once … the LMAX estate for security events, while minimizing false positives. Success Looks Like: •Ensure compliance with security best practices in network operations, system management, and processes. •Support the successful completion of internal and third-party led audit efforts. •Increased signal-to-noise security events ratio •A measurable decrease more »
controls, and privilege management. Managing and maintaining endpoint security solutions, including endpoint protection platforms (EPP), endpoint detection and response (EDR), and mobile device management (MDM) using Microsoft Intune. Developing and enforcing Data security/Application security policies, standards, and procedures across the organisation. Ensure compliance with … Microsoft Intune, Azure Active Directory, Azure Security Center, and other Microsoft security solutions. Strong understanding of network security, endpoint security, identityandaccessmanagement, and data protection concepts. Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving … skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance,Identity Fundamentals and Cybersecurity (SC-100) are a plus. Hybrid and multi-cloud infrastructures Security Cleared or able to attend Security Clearance. A few things to note This is a more »
controls, overseeing processes such as account provisioning, deprovisioning, and permissions management, as well as managing the identityandaccessmanagement process. Promote security awareness throughout the organization by providing training and guidance on best practices. Analyze security logs, events, and … evaluations. Remain updated on emerging cybersecurity threats and vulnerabilities, utilizing threat intelligence to enhance security measures. Prepare and deliver routine security reports to managementand stakeholders, summarizing the organization's security posture, incidents encountered, and risk assessments conducted. Provide assistance with internal and external audit activities, supporting ongoing more »
and strategy (private, public and hybrid) Experience with infrastructure configuration and automation processes and tools: puppet, ansible, chef, Terraform Good understanding of Cloud Identity Security, AccessManagement Implementations, Cloud monitoring solutions and networking Drive effectiveness, efficiency and continuous improvement using automation. Collaborate with Architecture … and mitigate from happening again had too better improve service(s) we deliver. Understand and work towards a strategy set out by senior management ensuring we adhere to direction and execute tasks based on priority to meet strategy deadlines. Have the drive to constantly improve and try out … compute all the way to scalable automated deployments. A good understanding of Linux OS (Ubuntu/RHEL). A good understanding of configuration managementand automation with Ansible, Puppet, Jenkins. Experience in migrating services from on-prem to GCP Cloud and from other Cloud providers to GCP. A more »
City of London, London, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
ForgeRock Identity Cloud Consultant - London (Hybrid) - FTE 12 months to be extended - My client, a prominent IT Services and Consulting firm, is renowned for delivering inventive solutions to clients globally. Their proficiency encompasses the deployment of state-of-the-art technologies and spearheading digital transformation endeavors. Presently, they … are in search of an adept ForgeRock Identity Cloud Consultant to join their London team on a full-time basis for an initial 12-month contract, with the potential for extension. Location: London (Hybrid: 2 days onsite, 3 days remote) Responsibilities: Lead the implementation, configuration, development, and administration … AM. Hands-on experience with ForgeRock Identity Cloud platform, both on-premise and in cloud environments. Familiarity with identityandaccessmanagement (IAM) principles and best practices. Excellent communication and interpersonal skills, with the ability to collaborate effectively with diverse teams. Problem more »
passionate about helping our clients succeed in an ever-changing industry. We are/have: Experts in Banking & Payments, Capital Markets, Insurance and Wealth & Asset Management Deep knowledge in financial services offering, including eg Finance, Risk and Compliance, Financial Crime, Core Banking etc. Committed to growing our business … expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identityandaccessmanagement, or offensive security engineering An understanding of the end to end technology delivery life cycle, with exposure to working in more »
cloud security, data privacy, and regulatory requirements, particularly in the context of SaaS offerings in finance. Collaborate with cross-functional teams, including product management, engineering, and operations, to ensure successful implementation and deployment of cloud solutions. What we are looking for.. Bachelor's degree in Computer Science, Information … highly available, scalable, and multi-tenant architectures for SaaS applications. Solid understanding of cloud security principles and best practices, including identityandaccessmanagement, encryption, and network security in a SaaS context within the financial sector. Excellent communication and interpersonal skills, with the ability more »
security controls in AWS environments. Provide expert guidance and thought leadership to clients on best practices in cloud security, including identityandaccessmanagement, data protection, and network security. Collaborate with cross-functional teams to develop and implement secure cloud architectures that meet the more »
London, England, United Kingdom Hybrid / WFH Options
ITRS
scalability, innovation, and best practices for Salesforce and solutions with service improvement reviews and drive improving and tuning services delivered. IdentityandAccessManagement (IAM) for Salesforce and integrated solutions Working with other internal IT departments, you will need to work with key business … team members are motivated, and their skills are developed to allow them to support our Salesforce and integrated solutions. Manage the commercial and technical management of external 3rd party suppliers, including Salesforce and integrated solutions to ensure excellent service delivery and value for money. Manage the outsourced function … to ensure governance and compliance with both internal policies and regulations. You will have: 7+ Years Hands-on experience of Salesforce support and team management Experienced of Supporting Certinia Experience supporting Pardot, Clari, Gong would be advantages. Experience running multiple implementation project Experience of Agile project delivery andmore »
Azure environment. Knowledge Transfer : Upon successful completion of User Acceptance Testing (UAT), transition ownership of the scripts to the Geospatial Team for ongoing managementand maintenance. Documentation : Document the entire solution achieved through Azure Automate tooling. Including documenting any steps or configurations that cannot be automated through scripting … DevOps pipelines to automate the deployment process throughout multiple environments. High level of proficiency with Windows, PowerShell, PowerShell DSC & Bash. Including scripting, package managementand deploying applications on both Windows Server and Ubuntu environments within a cloud infrastructure. Proficiency in diagnosing and resolving issues related to deployment … configuration, and automation, ensuring smooth operation and minimizing downtime. Understanding of security principles and best practices in cloud environments, including identityandaccessmanagement, encryption, and compliance standards, to ensure the integrity and security of deployed configurations and infrastructure. Benefits Include: Contributory pension scheme more »
range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as IdentityandAccessManagement, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Managementand Vendor/Cloud products assessment Experience carrying more »
distributed systems. Experience with DevOps practices, automation tools, and implementing continuous integration and deployment pipelines. Knowledge of security best practices, identityandaccessmanagement, and compliance standards on GCP. Proficient in Cloud computing, data managementand Cloud security knowledge Must possess exceptional more »
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, IdentityandAccessManagement, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »
policies, standards, and procedures for protecting Clarion's information security assets. With extensive knowledge of security technologies, including network, application, identityandaccessmanagementand encryption you'll develop and lead an effective, high-performance Information Security team and support your Director to establish more »