Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer IdentityAccessManagement (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAMManagement: Take responsibility for IdentityandAccessManagement (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identityaccessmanagementand elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged accessmanagement, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization andaccess control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identityandaccessmanagement, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability managementand secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • IdentityandAccess Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
to ensure the successful delivery of cloud, web, and mobile projects and changes. Utilize your expertise in single sign-on, identityandaccessmanagement (IAM), and application role-based access to enhance security and user experience. Act as a key contributor to … related field. Proven experience in cloud technologies (especially AWS), web, and mobile application development. Strong understanding of single sign-on, identityandaccessmanagement (IAM), and application role-based access. Experience working with various business stakeholders to gather requirements and design appropriate technical solutions. more »
Security Management System frameworks and standards and their application. Partnered with knowledge of governance processes and practices, including ISMS monitoring and control management frameworks such as, ISO, ISF and COBIT, their relationships to other frameworks and the application within a financial services environment. Good working … knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identityandaccessmanagement, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls … WAFs, DLP, cryptography, vulnerability scanning, identityandaccessmanagement, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to audience and stakeholders. What more »
knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. Application security: including but not limited to authentication, identityandaccessmanagement, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability managementand secure … file transfers, security event monitoring, malware security, and cyber security. Operational security: including but not limited to incident management, change and patch management, data centre and physical security, backups, DR and BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys and certificate management … Skills Required: In-depth knowledge of: Firewall: Juniper/Cisco/Palo Alto. Onion Security, Splunk, Suricata, Kali. Application Security. IdentityandAccess Management. Data Protection Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell more »
projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation andidentityandaccessmanagement (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive managementand/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/… mentoring teams in “secure by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security more »
applications into the cloud based IAM tool Work with a variety of teams across the enterprise to propose solutions that meet the business' identity needs. Manage user identity life cycle including provisioning and deprovisioning as well as modifying access controls Implement RBAC and ensure … systems for suspicious activities. IAM Analyst - Your Background The ideal IAM Analyst will have: At least 3 years of IdentityandAccessManagement experience Proficiency in Identityand Governance tools for example: Saviynt SailPoint Entra ID Other similar tools Proven experience … of working as an IAM Analyst Strong experiences of working in adherence to access control values including RBAC and least privilege access Understanding of regulatory compliance frameworks eg GDPR, NIST, ISO Extremely strong people skills as this role will be working across a variety of business more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
NetIQ Access Manager - DV Cleared – Farnborough (Full-time onsite) – £775p/d (Inside of IR35) - 6 Months Our major Public Sector client is now looking to replace their complex legacy enterprise infrastructure and are looking for a NetIQ Access Manager to support this. The NetIQ Access Manager will be responsible for designing, implementing and leading the deployment and configuration of NetIQ Identity Manager solutions. The ideal NetIQ Access Manager will … have the following skills/experience: Holds Active DV Clearance Proven Experience with NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication andIdAM Previously designed, implemented, and maintained identity, accessand privilege management. Ideally, familiar with Tiered access model, zero trust, least more »
infrastructure, utilising appropriate tools for identifying and correcting complex issues. Planning and scheduling of appropriate cloud infrastructure releases in line with release and change management procedures. Develop and maintain the necessary pipelines and tooling to support the DevSecOps cloud practices. Maintaining knowledge of this area of the ICT … to stay informed of developments in other areas of technology which have a bearing on the provision of services for the client Development andmanagement of security tooling and services including, but not limited to, KMS, PKI, Encryption, secrets management, native cloud security tooling, Software composition … plans for existing infrastructure and providing roadmaps for future development work Essential Skills & Experience: StrongAWS Terraform Jenkins IdentityAccessManagement secretsmanagement - AWS IdentityandAccessManagement (IAM): For managing user accessand permissions. Amazon GuardDuty: Amazon Macie: AWS CloudTrail: Security Hub Desirable Skills: Ansible more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice … SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture … month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Please apply via this ad in the first instance or send a CV with covering note or contact me on more »
Purfleet, England, United Kingdom Hybrid / WFH Options
Carpetright
technology and building a team of Technology experts who can help fast forward our mission to create the best omnichannel customer experience. With access to all the latest product releases and innovations, Carpetright is the place for you to develop and accelerate your career. The opportunity: Technical Architect … suppliers, service health, SLA’s etc Azure tenant administration – Subscription management, IAM, billing. Azure Active Directory – AAD Connect, IdentityandAccessManagement, MFA, Conditional Access Azure Disaster recovery and Business Continuity – Azure Backup/Azure Site Recovery An understanding of … and cloud. Azure DevOps – Work item tracking, Repos, Pipelines Excellent level of technical experience in all aspects of IT infrastructure on premise and cloud Project managementand delivering IT projects to agreed timescales and budget. Azure certifications are desirable You’ll have the ability to collaborate effectively with more »
data analytics solutions • Providing expertise and support across the enterprise information framework, including data intake, data transformation, data quality, metadata and master data management, data virtualisation, data governance, data lineage, data services, data security and data lakes.• Lead technology consulting engagements, solution workshops and due diligence • Work closely … maintaining enterprise data models for analytics using dimensional, star, snowflake or data vault methodologies. • Proficient in implementing and maintaining Master and Reference Data Management to ensure data accuracy and integrity across the organisation. • Comprehensive expertise in programming languages and tools for data preparation, analysis and reporting • At least …/Powerautomate/PowerBI) • Azure cloud ETL toolset, including Azure SQL Server, Azure Data Factory, Datalake. • Cloud infrastructure including Microsoft Azure Cloud infrastructure, Identity & AccessManagement, data stores connections, cloud functions concepts.• Familiar with Big Data infrastructures, including file-based and in-memory big more »
South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
the necessary improvements, meeting stakeholders expectations. Presenting to management, proactively raising concerns/issues/risks professionally with project members and escalating to management as required. Engaging with business and technical architects, designers, and analysts to ensure projects adhere to standards. Engaging and working with procurement … team player who will confidently fit into a small, dedicated function of security professionals, where everyones contributions are recognised and appreciated. Strong leadership andmanagement skills with experience of leading and directing multi-disciplinary business and technology teams (consisting of information security, professional audit, and technology colleagues). … NIST CSF Experience delivering any information security tools/capabilities such as, but not limited to, Data Loss Prevention, SIEM, IdentityandAccessManagement, EDR/XDR The deadline for applications is 11.55pm Sunday 28th April. Please apply with a CV and a covering more »
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
are seeking a number of experienced Senior Engineers with specialised expertise in VMware Horizon, Dynamic Environment Manager (DEM), App Volumes, Windows 11, Unified Access Gateway (UAG), Active Directory Federation Services (ADFS), and NetIQ. The ideal candidate will possess strong technical skills in VDI management within a … Manager (DEM) App Volumes Windows 11 (including CIS L2 policies, base/gold image deployments) It would be great if you had: NetIQ IdentityAccessManagement PowerShell, scripting, and automation Security Best Practices/Secure by Design VMware related qualifications If you are interested more »
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer IdentityAccessManagement (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP). Role responsibilities: Accountable for publishing … as UML, BPMN, ArchiMate, Essentials Project, and Lucidchart) is a must-have. Background architecture design, with an appreciation for security risk assessment and threat management, is a must-have Experience with technical architectural development, policy, asset managementand modeling is a must-have. Experience and/ more »
Security Consultant-Identity & AccessManagement Services The Base location for this role is 5 days in Hursley & occasional Remote Prefer SC cleared candidates. Inside IR35 £665 6 months Project are looking for a generic security consultant, who can write what used to be called … to-many search of biometric images of expected arrivals replacing the 1-to-1 match against the images stored and retrieved from passengers' identity documents. · To reduce the volume of images to match, MBTP propose to use Advance Passenger Information to search and retrieve biometric and biographic data … from repositories of trusted identity records. · The biometric and biographic data from MBTP will be passed to the Contactless Matcher sub-system to support facial matching against the biometrics of expected arrivals. · Any failure in the Contactless process will result in the passenger using the as-is document more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
Impellam UK
Impellam Group IT is on the hunt for a technical virtuoso who can lead the charge in revolutionising our end-user device andidentityaccessmanagement systems. You will strengthen our modern-managed desktop solutions and guide our team through new technical solutions. You … knowledge in Azure, Intune, and Microsoft 365 suites Expertise in managing and configuring MECM for endpoint supervision Experience in Autopilot deployment and Co-Management with Intune Working knowledge with Qualys and Ivanti Desktop Now Bachelor's degree in Computer Science, Information Technology, or related field Proven experience in more »
frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artefacts. Experience in documenting and implementing processes, procedures, and architecture … is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identityandaccessmanagement, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture more »
DV Cleared NetiQ Engineer - Farnborough - ASAP Start - 6 months Rolling Contract iO Associates are currently looking for a DV Cleared IdAM/NetiQ Senior Engineer for a 6 month rolling contract based in Farnborough offering £775 a day (inside IR35). You must hold active DV Clearance and be a … join this programme of work - unfortunately, you can't be a dual national. We're looking for candidates with the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged AccessManagement (PAM) Identitymore »
Microsoft Intune, Azure Active Directory, and Conditional Access. - Familiarity with mobile device and application management, as well as identityandaccessmanagement principles. - Solid grasp of information protection and data security, including Azure Cloud Security. - Experience with security assessment methodologies and automation more »