Northampton, England, United Kingdom Hybrid / WFH Options
S-SA Digital
with clients and internal teams to assess and understand their modern workplace requirements, design appropriate solutions, and implement effectively to best practice. • EMS & Endpoint Management: Manage and optimize endpoint devices, ensuring seamless integration and security through solutions like Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. • Mobile Device Management (MDM): Implement and configure MDM policies using Microsoft Intune or other EMS tools to manage and secure mobile devices across various platforms. • Application Management: Deploy and manage applications through EMS platforms, ensuring secure and seamless access to business applications on mobile devices. • Security … Compliance: Implement robust security measures to safeguard client data, devices, and communications within the modern workplace environment, adhering to industry standards and best practices. • Identity and Access Management (IAM): Configure and maintain identitymanagement solutions, such as Entra ID/Azure Active Directory (Azure AD) and more »
Job Description Fantastic opportunity to join a thriving world class business in a critical role. The “Product Strategist – Identity and Access Management (IAM)” will play a critical role in the overall Product Management of IAM by defining the Product Strategy, Vision and Roadmaps. By developing a deep … together cohesively when it comes to IAM strategy enablement. IAM Customers in the context of this role includes: and external end users of the identity platform delivery teams who support the end users Owners who utilise Identity services and external governance teams/auditors. The scope of this … role is global, and includes: identity communities – Enterprise (workforce), Business Partners, Customers, Vehicles. identity types – human & non-human accounts (e.g. service accounts) identity use cases – privileged and non-privileged Key Accountabilities and Responsibilities The role holder will: Develop a deep understanding of the group's existing organisational more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Experience of solution … areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Understand the business, commercial and technical requirements to write clear technical high-level designs is vital Lead Workshops and reduce complex ideas more »
have experience in running global teams, across a number of timezones in a heavily regulated environment. Role: Provide technical leadership and guidance to the identity and access control team. Define and implement the enterprise identity strategy and operating models. Ensure compliance with relevant regulations and audit requirements. Oversee … implementation and management of identitymanagement systems. Drive identity and access control projects to timely completion. Develop and enforce identity and access control policies. Collaborate across departments to align identity services with business needs. Champion continuous improvement in identitymanagement practices. Requirements … Strong understanding of identity and access management (IAM) principles. Technical expertise in IAM solutions, network security, and cloud security. Proven leadership skills with the ability to motivate teams and build relationships. Excellent communication and project management abilities. Business acumen aligned with organizational goals and compliance frameworks. more »
Fantastic opportunity to join a thriving world class business in a critical role. The “Product Strategist – Identity and Access Management (IAM)” will play a critical role in the overall Product Management of IAM by defining the Product Strategy, Vision and Roadmaps. By developing a deep understanding of … together cohesively when it comes to IAM strategy enablement. IAM Customers in the context of this role includes: and external end users of the identity platform delivery teams who support the end users Owners who utilise Identity services and external governance teams/auditors. The scope of this … role is global, and includes: identity communities – Enterprise (workforce), Business Partners, Customers, Vehicles. identity types – human & non-human accounts (e.g. service accounts) identity use cases – privileged and non-privileged Key Accountabilities and Responsibilities The role holder will: Develop a deep understanding of the group's existing organisational more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Broad knowledge and … experience of solution areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Ability to rapidly understand the business, commercial and technical requirements to write clear and concise technical high-level designs more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
company. You should have a genuine interest in solving IT issues and empathetic to customer needs and requirements. Day to day tasks include expert management and troubleshooting of Azure, Dev environments and Active Directory services and issues within a complex locked down System structure. You should possess good written … Layers and Role Based Access Control * Azure Networking Experience * Azure Firewalls Experience * Azure Security including Conditional Access Policies and Multi Factor Authentication and Privileged IdentityManagement * Azure Virtual Machine Management * Azure Storage Experience * Azure Monitoring and log analytics * Azure Enterprise and ADFS Application Provisioning * Active Directory Connect … Federation Services * Azure PowerShell scripting * Microsoft Windows Server 2016, 2019 and 2022 experience * Comfortable working with a Hybrid Joined Active Directory environment * Group Policy Management and Conditional Access Policy Management Experience * DNS, DHCP Experience * Working knowledge and understand of PKI Services * Scripting experience using BAT, PowerShell, C# and more »
pivotal IT Security Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM … solutions and the delivery of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities Provide expert knowledge and act as a subject matter expert on key principles … of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM threats and industry solutions, and more »
methods, you do not need to be a practitioner. KEY TECHNOLOGIES: Cloud platforms: Primarily AWS and Azure covering organisation design (layout), tenancy/account management, security, identitymanagement, service provisioning and reporting functions. Identity and Directory services: Design, management and maintenance of Microsoft Active Directory … OpenLDAP, KeyCloak and Microsoft's enterprise Single Sign-On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusion detection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities and access, supporting secure collaboration, and staying current with the latest technologies. You'll also be instrumental … appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identity and access management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA … We work collaboratively and imaginatively. ABOUT YOU We are looking for an IGA Analyst who is detail-oriented, analytically minded, and well-versed in identity governance and access management practices. The ideal candidate possesses strong technical expertise across various identity technologies (e.g., Saviynt, Azure, SailPoint) and a more »
Brighton, England, United Kingdom Hybrid / WFH Options
Legal & General
As a Cyber Security Analyst Apprentice you will gain experience with all pillars of the security team with regards to Security Operations, Infrastructure, and IdentityManagement teams. You will use the latest threat intelligence to inform daily activities and proactive threat hunts to detect and respond to threat … Group Functions Change and Technology Services team. Successful applicants will join the security team, which provides support to our service functions (HR, Finance, Brand management, Risk etc.) and develop their skills here. While the team has several areas of focus, they all provide the opportunity for apprentices to work … on a wide variety of activities and learn from security experts. Successful applicants will be involved in operational security management, incident response, risk management & compliance and security advice provision to deliver safe, secure, and innovative business solutions to drive sustainable value for a competitive and modern L&G. more »
years we have provided financial services to customers across the UK, and now the US. As one of Europe’s largest insurance and asset management groups, with over £1 trillion in assets, we are experts in safeguarding people’s financial futures. Our ambitions are underpinned by five strong businesses … innovating and expanding globally, adding new products and solutions to their strategic goals. We aim to be leaders in four key areas: retirement, investment management, capital investment and insurance. Our businesses work together to deliver on our purpose and to drive synergies across the Group. Job Description Legal & General … technologies (DB2, Oracle, SQL Server), performance/clustering/scalability concerns, Data Warehousing and reporting (e.g. Business Objects, Ab-initio, SAS) and Enterprise content management products. Knowledge of repositories, code controls and development tools such as JIRA, Confluence and similar tools Application and Web Service security, IdentityManagementmore »
Reading, England, United Kingdom Hybrid / WFH Options
Primark
take design ownership for projects which are delivered by a highly technical teams that supports a complex retail environment which includes: Oracle Merchandise Operations Management suite Existing EPOS application, deployed across all territories Online order management solution to support Primark’s Click & Collect offering Integration solutions HR and … IdentityManagement services • Negotiate with key stakeholders involving prioritisation of projects and resources. • Responsible for identifying cross directorate and cross project dependencies, risks and activities and negotiating resolution to conflict. • Input to development of product roadmaps and designs and solutions at technical level. • Providing Technical design assurance for more »
Delivery Manager - IdentityManagement - £450p/d Outside IR35 - 1x week in Reading Key Responsibilities: Lead and guide agile teams to achieve project goals and deliver value. Serve as Scrum Master for designated teams, ensuring effective sprint planning, execution, and retrospective processes. Prioritize tasks and initiatives to align … a Scrum Master or Product Owner. Strong understanding of agile methodologies and principles. Experience with digital improvements and transformations within agile settings. Familiarity with IdentityManagement and Access Management concepts. Excellent communication and stakeholder management skills. Proficiency in tools like JIRA, Confluence, DevOps, or similar. more »
have experience in running global teams, across a number of timezones in a heavily regulated environment. Role: Provide technical leadership and guidance to the identity and access control team. Define and implement the enterprise identity strategy and operating models. Ensure compliance with relevant regulations and audit requirements. Oversee … implementation and management of identitymanagement systems. Drive identity and access control projects to timely completion. Develop and enforce identity and access control policies. Collaborate across departments to align identity services with business needs. Champion continuous improvement in identitymanagement practices. Requirements … Strong understanding of identity and access management (IAM) principles. Technical expertise in IAM solutions, network security, and cloud security. Proven leadership skills with the ability to motivate teams and build relationships. Excellent communication and project management abilities. Business acumen aligned with organizational goals and compliance frameworks. more »
leverage security capabilities in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to … be reviewed and approved by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure … by design” including a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identitymanagement, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing more »
divisional strategic roadmaps, and industry standard best practices to ensure our infrastructure products & practices are enablers to the wider L&G strategic goals Operational Management & Governance – Taking accountability ofInfrastructure Engineering operations, ensuring the Infrastructure Products are reliable, accessible, and compliant to the L&G Technology & InfoSec Risk Management frameworks. Management of Infrastructure Engineering costs, optimised for maximum value to support business sustainability & growth Ways of Working – Leading organisational consistency of DevSecOps supporting a common orchestration pipeline so that complexity is reduced, enabling enterprise efficiency, scalability, and sustainability. Driving and role modelling agile mindset and methodology, embedding … life cycles, and up-to-date knowledge on industry standards and best practices Knowledge of business models, operating models, financial models, budgeting, and risk management Knowledge of business ecosystems, SaaS, IaaS, PaaS, SOA, API, open data, micro services, event driven IT and predictive analytics and business intelligence/analytics more »
Northamptonshire, England, United Kingdom Hybrid / WFH Options
S-SA Digital
with clients and internal teams to assess and understand their modern workplace requirements, design appropriate solutions, and implement effectively to best practice. • EMS & Endpoint Management: Manage and optimize endpoint devices, ensuring seamless integration and security through solutions like Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. • Mobile Device Management (MDM): Implement and configure MDM policies using Microsoft Intune or other EMS tools to manage and secure mobile devices across various platforms. • Application Management: Deploy and manage applications through EMS platforms, ensuring secure and seamless access to business applications on mobile devices. • Security … Compliance: Implement robust security measures to safeguard client data, devices, and communications within the modern workplace environment, adhering to industry standards and best practices. • Identity and Access Management (IAM): Configure and maintain identitymanagement solutions, such as Entra ID/Azure Active Directory (Azure AD) and more »
Identity and Access Architect/Engineer – Edinburgh or Glasgow - 9 Month Contract Lorien’s Public Sector client are currently recruiting for a Business Architect to join on a 9 month initial contract, inside IR35. The successful candidate will have the following skills/knowledge: Okta Workforce Identity Cloud … able to use MS Excel to monitor and track work as well as perform analysis when required including vlookups, pivot tables etc. Okta Workforce Identity Cloud SAML/OIDC Active Directory Working knowledge of other cloud-based security platforms which complement the IdP landscape, i.e., Entra, zScaler, Crowdstrike, etc. more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Experience of solution … areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Understand the business, commercial and technical requirements to write clear technical high-level designs is vital Lead Workshops and reduce complex ideas more »
are looking for, Role: Front-End Developer (React.js/Redux) Location: Leeds, UK Role Type–Hybrid–FTC 12 Months Must have Prior experience with identitymanagement, implementing MFA, and rolling out features such as SSO using tools like Okta and Auth0. NO SPONSORSHIP WILL BE PROVIDED If you more »
Northampton, Northamptonshire, East Midlands, United Kingdom
The University of Northampton
Storage Spaces) Virtual Infrastructure VMWare, Hyper V, Nutanix Linux/Unix administration Mimecast Web and Email Backup and recovery/DR Testing Service Monitoring IdentityManagement (IDM) MS Certificate Services Azure/AWS and AZURE MFA security configuration PowerShell scripting You will be able to demonstrate at interview … that you have experience working as part of a team, while giving exceptional customer service to end users. Knowledge/experience of project management processes and delivery of project elements. Experience at undertaking operational activities, such as support, monitoring and trouble shooting incidents. Personal Qualities: Excellent interpersonal skills with … Storage Spaces) Virtual Infrastructure VMWare, Hyper V, Nutanix Linux/Unix administration Mimecast Web and Email Backup and recovery/DR Testing Service Monitoring IdentityManagement (IDM) MS Certificate Services Azure/AWS and AZURE MFA security configuration PowerShell scripting Qualifications Essential: Relevant Professional IT Certification or experience more »
and forests with multiple domains Troubleshoot basic problems in MS SQL Office 365 tenant setup and configuration to best practise Microsoft Azure, IaaS and Identitymanagement (ADFS, WAP) Working knowledge Private and Public Cloud platforms, Azure and AWS Virtualisation Technologies (VMware, Hyper-V,) SAN and Clustering technologies (Dell more »
of data technologies used by Dynamics 365, including Dataverse, Virtual Tables, Azure SQL and Dual-Write technologies. Good understanding of Azure Integration Services (API Management, Service Bus, Event Hub). Good understanding of Microsoft IdentityManagement solutions (Azure AD, Azure AD B2C). Good understanding of cloud more »
ensuring the efficient, secure, and cost-effective operation of their cloud infrastructure on Microsoft Azure. You will be responsible for the day-to-day management of the Azure environment, including resource provisioning, performance optimization, security configuration, and troubleshooting issues. Responsibilities: Manage and optimize the deployment and configuration of Azure … resources (VMs, storage, networking, databases, etc.) Implement and enforce security best practices within the Azure environment, including access control, identitymanagement, and threat detection Monitor Azure services for performance and identify opportunities for optimization Automate routine tasks using Azure automation tools (ARM templates, Azure CLI, PowerShell) Troubleshoot and … latest Azure services and features Collaborate with development teams to ensure smooth integration with the cloud environment Develop and document operational procedures for Azure management Contribute to cost optimization strategies for the Azure environment Desired Skills: Azure certifications (AZ-104, AZ-500) Experience with DevOps methodologies and CI/ more »