is only for candidates based out of UK. About JumpCloud JumpCloud® helps IT teams and Managed Service Providers (MSPs) Make Work Happen® by centralizing management of user identities and devices, enabling small and medium-sized enterprises to adopt Zero Trust security models. JumpCloud has been used by more than … Sands Capital, Atlassian, and CrowdStrike. Our teams are growing fast, too, and we're looking for talent across engineering, sales, customer success, marketing, product management, and more. Join our team of dedicated, passionate, and creative people who are eager to change the IT industry forever. About the Role We … are looking for inspired technology professionals who love the challenge of implementing and migrating customers from their Active Directory, Okta, and other identitymanagement directories to the JumpCloud platform through a structured, efficient, outcome-based process while leveraging your expertise and all available JumpCloud resources. Solutions Architects at more »
ForgeRock Identity Cloud Consultant – London (Hybrid) – FTE 12 months to be extended My client, a prominent IT Services and Consulting firm, is renowned for delivering inventive solutions to clients globally. Their proficiency encompasses the deployment of state-of-the-art technologies and spearheading digital transformation endeavors. Presently, they are … in search of an adept ForgeRock Identity Cloud Consultant to join their London team on a full-time basis for an initial 12-month contract, with the potential for extension. Location: London (Hybrid: 2 days onsite, 3 days remote) Requirements: degree in Computer Science, Engineering, or a related field. … experience in implementing, configuring, and administering ForgeRock CIAM solutions. proficiency in developing custom authentication modules for ForgeRock OpenAM/AM. experience with ForgeRock Identity Cloud platform, both on-premise and in cloud environments. with identity and access management (IAM) principles and best practices. communication and interpersonal skills more »
occur in their infrastructure which are reported. Ensuring enough information is present to deliver a sound security risk assessment. Responsibilities: Support the roll out, management and monitoring of a programme promoting the adoption of the new legislation underpinning the TSR. Provide annual report to the SOS (Secretary of State … Experienced in fixed and mobile signalling (GSM through to 5G) and virtualisation from a telecom’s perspective. Strong understanding across all cyber security risk management domains (strategy; governance and risk management; protection, detection, response, recovery and resumption of services; situational awareness; testing). Knowledge of fixed and mobile … communication skills including clear and effective presentation to both internal and external audiences. Desirable Skills/Experience Managing and monitoring security assurance programmes. Project management including developing and delivering against plans, managing risks and issues along the way. Experience and understanding of some of these technical areas: Supply chain more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
experienced IT Consultant/Engineer/IT Manager to become one of the team. They are a thriving and growing business specialising in IT Management, Device and IdentityManagement, Cyber Security, Networks, Cloud platforms, and Connectivity. Relationships and technical excellence are the name of the game with … ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetration testing, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design fault-tolerant systems, ensure data more »
immediate access storage technology to carry out activities relating to security certification and accreditation. Ability to provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical information technology security issues. Recommends and coordinates the application of fixes, patches, & recovery procedures in the event of … breach. Understanding of security tools and platforms including SIEM, IPS/IDS, SecOps, Endpoint and Server protection, Network protection, Firewalls, etc. Knowledge of Federated IdentityManagement, Single Sign On, and Enterprise class Identity and Access Management solutions (e.g. technology, processes, architecture, etc.) Extensive experience in Cyber … Excellent presentation, facilitation and diplomacy skills. High level of personal integrity consistent with Gilead’s core values. EDUCATION & CERTIFICATION Bachelor of Science degree in management information systems, computer science, engineering or other IT-related major is required. 5 or more years of experience in IT security, privacy and risk more »
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities and access, supporting secure collaboration, and staying current with the latest technologies. You'll also be instrumental … appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identity and access management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA … We work collaboratively and imaginatively. ABOUT YOU We are looking for an IGA Analyst who is detail-oriented, analytically minded, and well-versed in identity governance and access management practices. The ideal candidate possesses strong technical expertise across various identity technologies (e.g., Saviynt, Azure, SailPoint) and a more »
As an IAM Managing consultant you will use a variety of tools including Azure AD, SailPoint, and Okta as the company’s lead for Identity and Access Management. You will manage the products, configure, enhance, optimise and look towards future tools and technologies to ensure the business is constantly … will be responsible for: Define project scope, milestones, and success/acceptance criteria. Plans will outline the project objectives, timelines, resources, and deliverables. Team Management Risk Management What's in it for you? Bonus Pension 25 Days Holiday + Bank holidays Private Medical + more! “By applying for more »
Manager (CPM) Privileged Session Manager (PSM) HTML5 Gateway (H5G) Privileged Threat Analytics Essential Responsibilities and Requirements: Demonstrated hands-on experience with CyberArk's Privileged Identity and Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR). Proven experience in extending existing CyberArk technologies and practices, providing recommendations … ideally CyberArk. Required Experience & Qualifications: Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and Middleware technologies. Understanding of Active Directory structures, IdentityManagement policies, and processes. Knowledge of PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience in facilitating business process design … Ability to organize and prioritize tasks effectively. Strong interpersonal skills to establish and maintain relationships and interact with team members. Excellent organization and time management skills. Strong analytical and problem-solving skills. more »
Manager (CPM) Privileged Session Manager (PSM) HTML5 Gateway (H5G) Privileged Threat Analytics Essential Responsibilities and Requirements: Demonstrated hands-on experience with CyberArk's Privileged Identity and Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR). Proven experience in extending existing CyberArk technologies and practices, providing recommendations … ideally CyberArk. Required Experience & Qualifications: Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and Middleware technologies. Understanding of Active Directory structures, IdentityManagement policies, and processes. Knowledge of PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience in facilitating business process design … Ability to organize and prioritize tasks effectively. Strong interpersonal skills to establish and maintain relationships and interact with team members. Excellent organization and time management skills. Strong analytical and problem-solving skills. more »
Identity and Access Architect/Engineer – Edinburgh or Glasgow - 9 Month Contract Lorien’s Public Sector client are currently recruiting for a Business Architect to join on a 9 month initial contract, inside IR35. The successful candidate will have the following skills/knowledge: Okta Workforce Identity Cloud … able to use MS Excel to monitor and track work as well as perform analysis when required including vlookups, pivot tables etc. Okta Workforce Identity Cloud SAML/OIDC Active Directory Working knowledge of other cloud-based security platforms which complement the IdP landscape, i.e., Entra, zScaler, Crowdstrike, etc. more »
Skills: · Proficient in supporting and maintaining SAP ECC/ECP and SAP PI/PO environments. · Comprehensive SAP Basis knowledge, including system patching, user management, performance tuning, transport management, monitoring, authorisations, and troubleshooting. · Experience with server OS support and troubleshooting across Windows Server and Linux. · Knowledgeable in networking … Familiarity with integration platforms such as SAP CPI, SAP PI/PO, and Dell Boomi. · Experience with Single Sign-On (SSO) implementations. · Understanding of identitymanagement solutions, including Microsoft Entra ID (formerly known as Azure AD) and Active Directory. · Experience in MS SQL Server database administration. · Expertise in … Soft Skills: · Exceptional proficiency in English, both in speaking and writing. · Capable of employing a logical and analytical approach to problem-solving. · Proven time management capabilities, with the ability to adhere to project timelines while juggling multiple client engagements. · Openness to acquiring new abilities and adapting to change. more »
and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of Privileged Access Management processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, IdentityManagement policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an Employment Business in more »
to enhance security capabilities across projects and operations. Collaborates with technical teams to establish baseline security configuration standards for operating systems, network segmentation, and identity and access management (IAM). Works closely with technical teams to define standards and procedures for data encryption and tokenisation, aligning with the … organisation's data classification criteria. Drafts security procedures and standards for review and approval by executive management and/or formal authorization by the CISO. Monitors developments and shifts in the digital business and threat landscapes to ensure alignment with security strategy plans and architecture artifacts. Facilitates or conducts … design" principles, with a deep understanding of methodologies for conducting threat-modelling exercises on new applications and services, as well as proficient knowledge in identitymanagement and securing CI/CD pipelines. Direct, hands-on experience or robust working knowledge of pertinent security patterns, vulnerability management tools more »
AWS and Azure environments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as … tasks. Capability to organise and prioritise tasks Strong interpersonal skills to establish/maintain relationships and interact with team members Strong organisation and time management skills Strong analytical and problem solving skills more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Broad knowledge and … experience of solution areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Ability to rapidly understand the business, commercial and technical requirements to write clear and concise technical high-level designs more »
of 2 completed deployments. Essential Responsibilities and Requirements: * Proven 'Hands on' experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) * Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and applications/middleware technologies/platforms * Familiarity with Active Directory structures and IdentityManagement policies and processes * Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. * Experience facilitating business process design as … tasks. * Capability to organise and prioritise tasks * Strong interpersonal skills to establish/maintain relationships and interact with team members * Strong organisation and time management skills * Strong analytical and problem solving skills Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the more »
best suited for this position will be someone who loves to stay on forefront of technology and bring practical and efficient solutions in network management and connectivity, is able to work independently and is highly motivated to engage various teams to improve employee and customer experience. The Network and … strong work ethic and pride in delivering quality work with a security first attitude. Strong experience with firewall and network design (Palo Alto Firewall management), SD-WAN and BGP routing (7-8 yrs.) Experience with Site-to-Site IPsec VPN management and optimization, AWS VPC's, QOS and … Differentiated Services. Familiarity with Public cloud (AWS and Azure) design, and Colocation, Datacenter, Hybrid Cloud Delivery Models Understanding of Endpoint Configuration Management Concepts (Intune, JAMF, Mosyle) Experience with IdentityManagement Concepts (Azure, Active Directory, DUO, Okta) Experience with Cisco Meraki switches, Aruba WiFi, RUCKUS WiFi, layer more »
Warwickshire, Coventry, West Midlands (County), United Kingdom
Adria Solutions Ltd
based in Warwickshire is currently looking for an experienced Cloud Solutions Engineer. In this position, you Contribute to the architecture, deployment, delivery, configuration, and management of our clients Hybrid Cloud Solutions, with particular emphasis on the Microsoft Azure estate, ensuring optimum performance, availability, and security. Key Duties and Responsibilities … Implementation and management of Azure-based cloud storage Utilising Microsoft and industry security best practices, aligning with the Microsoft Cloud Adoption Framework for Azure, Working closely with our Development Team supporting and following Continuous Integration (CI), and Continuous Deployment (CD) best-practices using Azure DevOps build and release pipelines. … complex issues surrounding the Azure estate Attend cross-functional meetings to help drive appropriate cost-effective design solutions to support business goals and strategy Management of Azure IdentityManagement Experience: Excellent knowledge of Azure Architecture and Solutions and Administration Experience delivering Azure IaaS/PaaS solutions with more »
from an adversary's perspective. Hands-on experience with security operations processes and systems, encompassing security monitoring, intrusion prevention and detection, network security, endpoint management and protection, identitymanagement, threat detection, and vulnerability management. Ability to identify threats in distributed environments and effectively respond to them. Programming more »
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identitymanagement, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
vendors, customers, and team partners. Ability to solve technical problems involving a variety of integrated software and hardware platforms. Well-versed with Linux system management, specifically with Red Hat OS including IdentityManagement (IdM) and Single Sign On (SSO). Experience with scripting (Ansible, Python, Bash, Puppet more »
vendors, customers, and team partners. Ability to solve technical problems involving a variety of integrated software and hardware platforms. Well-versed with Linux system management, specifically with Red Hat OS including IdentityManagement (IdM) and Single Sign On (SSO). Experience with scripting (Ansible, Python, Bash, Puppet more »
vendors, customers, and team partners. Ability to solve technical problems involving a variety of integrated software and hardware platforms. Well-versed with Linux system management, specifically with Red Hat OS including IdentityManagement (IdM) and Single Sign On (SSO). Experience with scripting (Ansible, Python, Bash, Puppet more »
solutions and working with relevant team members to ensure they are transitioned into build activities appropriately; Cost effective and commercially aware budgetary control and management for the recommendations made/designs provided Key responsibilities The Audit Solutions Architect will take responsibility for the delivery of assigned projects as part … Online Azure Technologies such as Azure AD, Azure App Gateway, Azure SQL, Azure VMs etc Networking technologies in both on-prem and cloud contexts IdentityManagement Overall Microsoft toolsets/technologies Skills we’d love to see/Amazing Extras: Minimum 5 years in engineering roles, with solution more »
balancers, VPN, MPLS WAN, SD-WAN, QoS, ACI, Azure ExpressRoute Security solutions – Email, Endpoint, Web, firewalls, IPS, IDS, WAF, PKI, VPN, MFA and other identitymanagement services Server infrastructure – Virtualisation, storage, managed backup, hyper-converged platforms Experience in Unix and Linux – AIX and Red Hat Enterprise Databases platforms … across SAP RISE, Azure Cloud and on-premise. Associated experience of high availability patterns, resilience, backup and recovery Client mobility – Mobile device and app management, InTune, AirWatch Telephony and collaboration –VOIP platforms across an international setting. Microsoft Teams voice integration What you’ll need to have Experience of solution … areas including infrastructure, transformation and migration, security, business analysis, applications, integration, service management and understands how all these interact to arrive to an end-to-end solution Understand the business, commercial and technical requirements to write clear technical high-level designs is vital Lead Workshops and reduce complex ideas more »