Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
Virgin Money
ask ‘what if?’ We’re a diverse bunch who love what we do and ensure we have fun along the way. The Identity and AccessManagement (IAM) Governance team is currently a small but mighty team and part of the wider Security Operations area of TOCS. The team … reduce manual effort. Raising, managing and ownership of risks. Creating and maintaining a roadmap for the supported technologies, building the solution designs Conducting Privilege Access reviews using specialised Identity Governance and Administration tools such as RSA G&L Assisting in driving an IAM improvements programme to improve efficiencies and … AccessManagement systems (IAM). Identity Governance and Administration (IGA) system administration such as RSA G&L. Privilege AccessManagement (PAM) systems and methodologies including the following, CyberArk, Microsoft Entra. Experience of positively influencing at a senior level to get the right outcome. A track record more »
leadership role. Must demonstrate knowledge of modern identity management protocols across multiple domain expertise areas (AD, PKI and certificates, encryption, SSO/MFA, PAM, etc), as well as the ability to learn new ways of thinking and technologies (e.g., Zero Trust, Mitre ATT&CK). Expert understanding of IAM … and centralization onto unified IAM platforms. Desirable Relevant certifications, such as CISSP, CISM, or GIAC are preferred. Experience with Okta, Azure AD, PKI, and PAM solutions preferred. Experience working in a manufacturing environment, preferred. Experience with global security and privacy standards and regulations such as GDPR and CCPA is a … and drive large complex programs across the enterprise. Technical expertise in multiple IAM domain spaces such as AD, SSO/MFA, PKI and certificates, PAM, and Identity and Entitlements. Leading high-performance global teams. Demonstrated mastery in IAM security platforms and processes. Demonstrated awareness of the lifecycle of cybersecurity threats more »
Partners are excited to be working with a growing global cyber security consultancy to recruit a Managing Consultant/Project Lead IAM (Identity and AccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world’s leading … ClearSkye, CyberArk, Delinea. 5 years proven project management experience within IAM. Delivery of large scales IAM projects, Ideally in SailPoint and/or PAM technologies In-depth knowledge of IAM principles, standards, and best practices. Excellent leadership and communication skills, with the ability to effectively interact with diverse stakeholders. … Ability to manage multiple projects in parallel. Experience with IAM technologies such as identity governance and privilegedaccess management. Familiarity with regulatory requirements related to data privacy and security Proficiency in project management tools and methodologies Responsibilities will involve: Develop detailed project plans covering all phases: Definition more »
responsible for leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and accessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best practices. Design … vulnerabilities. Lead threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and accessmanagement strategies, including user authentication, authorization, and privilegedaccess management. Collaborate with cross-functional teams to integrate security controls and measures … CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. Strong knowledge of regulatory compliance more »
Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM Programme … Manager Do you have project management experience, and are you seeking a new opportunity? Cognizant is looking for an IDAM Programme Manager, and the role comes with an attractive salary and benefits package, including the opportunity to be part of a positive and diverse workplace culture. As an IDAM … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Experience in delivering IDAM Change/Transformation Experience delivering IDAM Change/Transformation Expertise in synthesizing and clearly communicating complex information to more »
Our client, a leading global consultancy, are looking for a PAM and EPM Specialist to join for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you … are currently looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the … development and maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related more »
security technologies, such as tuning, Firewall Policies etc. Operation and optimisation of security tooling/products, including, encryption technologies, network security, logging and auditing, privilegedaccess management. Actively participate in incident response activities where required Collaborate with cross-functional teams to promote a culture of security awareness and more »
emails with encryption. Become the gatekeeper of our inboxes. Platform Maestro: Deploy, configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threat detection and reducing false alarms. Network Security Sage: Possess a deep understanding … Incident response methodologies (MITRE ATT&CK, D3FEND) Microsoft 365 Security DMARC, SPF, DKIM Strong Scripting (e.g., PowerShell or Python) Security automation frameworks Security platform management Vulnerability management tools Privilege AccessManagement Industry-standard frameworks (NIST, SANS) and best practices controls (CIS) About Us ComfortDelGro is one more »
complex Enterprise infrastructure. You will possess strong technical skills as well as being able to demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identity and accessmanagement (IAM) architectural standards, guidelines, and best practices. + … Design and implement NetIQ Identity Manager (IDM) solutions to manage user identities, access rights, and provisioning processes. + Lead the deployment and configuration of NetIQ Identity … Manager (IDM) to automate user provisioning, de-provisioning, and synchronization processes. Key Skills + NetIQ Identity Manager + PrivilegedAccessManagement (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (url more »
prevailing threats. You will take the lead in managing technical security processes which will have a Trust-Wide impact, such as Cyber Security Awareness, PrivilegedAccessManagement, and Multifactor Enrolment, and will advise on possible future developments.You will provide risk assessments as required for the assurance of … and mentor other staff in the team to help develop their skills. You will be an active participant in the Trust's cyber-risk management process, recording risk, prioritising and actioning mitigation. You will provide advice and support to other Digital Services teams. About us We manage three major more »
into the UK Market as an integrator of third-party Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions, specialising in customising, deploying, and managing sophisticated security solutions for businesses across various sectors. Their expertise lies in seamlessly integrating third-party IAM and … PAM solutions into complex IT environments, ensuring enhanced security, compliance, and operational efficiency for their clients. Job Description: As a IAM/PAM Security Consultant you will play a crucial role in delivering bespoke IAM and PAM integration solutions to clients across various sectors. You will be responsible for the … design, configuration, testing, deployment, and post-implementation support. This role requires a deep understanding of both the technical and strategic aspects of IAM and PAM technologies, as well as the ability to design and implement solutions that integrate smoothly with clients' existing IT infrastructure. The successful candidate will act as more »
excellence, and the highest standards of cybersecurity. We are seeking a Technology Project Manager with a strong background in information security and cyber project management to help us implement cutting-edge security operations as part of our Infosec strategy. lead on the delivery of British Heart Foundations (BHF) Website … successful delivery of security solutions, youll lead the implementation of Microsoft Purview, youll support the delivery of our PrivilegedAccessManagement (PAM) programme. Youll also manage other projects related to information security and cybersecurity. The Technology department is an integral internal partner for BHF, helping to deliver … at the application or interview stage. About you To be successful in this role you'll have the following qualifications, skills and experience: Project Management qualifications in one or both of PRINCE2 or AGILE Experience with MS Project, MS SharePoint, and Office tools Proven track record and credentials of more »
ask 'what if?' We're a diverse bunch who love what we do and ensure we have fun along the way. The Identity and AccessManagement (IAM) Governance team is currently a small but mighty team and part of the wider Security Operations area of TOCS. The team … reduce manual effort. Raising, managing and ownership of risks. Creating and maintaining a roadmap for the supported technologies, building the solution designs Conducting Privilege Access reviews using specialised Identity Governance and Administration tools such as RSA G&L Assisting in driving an IAM improvements programme to improve efficiencies and … AccessManagement systems (IAM). Identity Governance and Administration (IGA) system administration such as RSA G&L. Privilege AccessManagement (PAM) systems and methodologies including the following, CyberArk, Microsoft Entra. Experience of positively influencing at a senior level to get the right outcome. A track record more »
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
I am currently looking for a PAM and EPM Specialist to join my client for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you are currently … looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the development and … maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related risks and more »
excellence, and the highest standards of cybersecurity. We are seeking a Technology Project Manager with a strong background in information security and cyber project management to help us implement cutting-edge security operations as part of our Infosec strategy. lead on the delivery of British Heart Foundation’s (BHF … of security solutions, you’ll lead the implementation of Microsoft Purview, you’ll support the delivery of our PrivilegedAccessManagement (PAM) programme. You’ll also manage other projects related to information security and cybersecurity. The Technology department is an integral internal partner for BHF, helping to … at the application or interview stage. About you To be successful in this role you'll have the following qualifications, skills and experience: • Project Management qualifications in one or both of PRINCE2 or AGILE • Experience with MS Project, MS SharePoint, and Office tools • Proven track record and credentials of more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK & abroad. … in total) Flexible working Competitive salary Social fund ---------------------- About CyberIAM CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in Identity AccessManagement and PrivilegedAccess Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identity management services to the best customers is where our passion lies. more »
including both Consulting/Professional and Managed Services, across Enterprise Computing, Cloud, Data Centres, DevOps, End User Computing, Service Desk, Network Services and Environment Management Services. Job roles and responsibilities: Providing a clear view of the level of risk to ensure appropriate mitigation plans are put in place and … experience in building Zero Trust Architecture Hands-on experience on tools related to one or many of the tools in Endpoint security, IAM, Privilege Access Management. Tools exposure: Zscaler, Microsoft Defender, Sentinel, BeyondTrust, Azure native security etc. Preferred Skill: OT security is preferred. At Cognizant you will experience an more »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
I am currently looking for a PAM and EPM Specialist to join my client for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you are currently … looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the development and … maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related risks and more »
excellence, and the highest standards of cybersecurity. We are seeking a Technology Project Manager with a strong background in information security and cyber project management to help us implement cutting-edge security operations as part of our Infosec strategy. lead on the delivery of British Heart Foundation's (BHF … of security solutions, you'll lead the implementation of Microsoft Purview, you'll support the delivery of our PrivilegedAccessManagement (PAM) programme. You'll also manage other projects related to information security and cybersecurity. The Technology department is an integral internal partner for BHF, helping to … at the application or interview stage. About you To be successful in this role you'll have the following qualifications, skills and experience: Project Management qualifications in one or both of PRINCE2 or AGILE Experience with MS Project, MS SharePoint, and Office tools Proven track record and credentials of more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: PrivilegedAccessManagement (PAM) Identity Governance and Administration Security Best Practices Our client is looking to interview candidates from Tuesday 30th April so please get in touch if you more »