as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
regulatory, and business security requirements. To engage as one of several Information Security Specialists working within a range of Programmes, liaising with Project & Programme management, business stakeholders, architects, business analysts and suppliers, whilst working under regulatory conditions, to help to determine the security posture for our clients IT environment. … delivered solutions. Providing support across all Security Team functions and providing assistance as at when required for additional CISO tasking. Proven experience in Identity & AccessManagementPrivilegedAccessManagement Active Directory Broad experience in Security Technologies more »
Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
I am currently looking for a PAM and EPM Specialist to join my client for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you are currently … looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the development and … maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related risks and more »
I am currently looking for a PAM and EPM Specialist to join my client for an initial 6-month contract based in Leamington Spa on a hybrid basis. The Specialist will be responsible for the development and maintenance of PAM and EPM policies across the company. If you are currently … looking for a new role, please apply promptly and I will give you a call to discuss. ROLE: PAM & EPM SPECIALIST LOCATION: WEST MIDLANDS (2 X PER WEEK) RATE: UP TO £750 A DAY INSIDE IR35 LENGTH: 6 MONTHS WITH SCOPE TO EXTEND Key responsibilities: Responsible for the development and … maintenance of PAM & EPM policies and procedures, encompassing all human and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privilegedaccess is provided for the minimum time possible Identify PAM & EPM related risks and more »
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
We are seeking an experienced NetIQ IdAM SME with expertise in NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication and IdAM. The ideal candidate will possess strong technical skills within a scalable environment and demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Familiarity … with Tiered access model, zero trust, least privilege access, Single Sign-On and Multi Factor Authentication are highly desirable. What you'll be doing: Develop and maintain identity and accessmanagement (IAM) architectural standards, guidelines, and best practices. Design and implement NetIQ Identity Manager (IDM) solutions … Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts It would be great if you had: PrivilegedAccessManagement (PAM) Identity Governance and Administration Security Best Practices If you are interested in this role but not sure if your skills and experience are exactly what more »
in the Identity Security and Security Operations space, specializing in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM). Committed to providing top-notch consulting and managed services to enterprise-level clients, we are seeking an experienced Sales Manager/Account Executive to … as the primary point of contact for key accounts. Drive sales efforts for both services and products, with a specific focus on IAM/PAM solutions. Collaboration with Lead Generation and Marketing: Work closely with the Lead Generation and Marketing teams to refine messaging and enhance the go-to-market … sales and business development, particularly in the Identity Security and Security Operations space. Experience working with enterprise-level clients, preferably in the IAM/PAM domain. Strong understanding of consulting and managed services sales processes. Excellent communication and interpersonal skills. Attributes: Results-oriented and target-driven. Strategic thinker with the more »
complex Enterprise infrastructure. You will possess strong technical skills as well as being able to demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identity and accessmanagement (IAM) architectural standards, guidelines, and best practices. + … Design and implement NetIQ Identity Manager (IDM) solutions to manage user identities, access rights, and provisioning processes. + Lead the deployment and configuration of NetIQ Identity … Manager (IDM) to automate user provisioning, de-provisioning, and synchronization processes. Key Skills + NetIQ Identity Manager + PrivilegedAccessManagement (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (url more »
month contract Inside IR35 We're seeking a skilled individual to join our clients CyberArk delivery team, deploying the cutting-edge CyberArk core PrivilegedAccess Security (PAS) solution to their esteemed clients. Responsibilities: Lead the deployment, configuration, and testing of CyberArk PAS, ensuring seamless integration across platforms like … support and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of PrivilegedAccessManagement processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, Identity Management policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an more »
the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: PrivilegedAccessManagement (PAM) Identity Governance and Administration Security Best Practices Our client is looking to interview candidates from Tuesday 30th April so please get in touch if you more »
responsible for leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and accessmanagement initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best practices. Design … vulnerabilities. Lead threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and accessmanagement strategies, including user authentication, authorization, and privilegedaccess management. Collaborate with cross-functional teams to integrate security controls and measures … CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. Strong knowledge of regulatory compliance more »
excellence, and the highest standards of cybersecurity. We are seeking a Technology Project Manager with a strong background in information security and cyber project management to help us implement cutting-edge security operations as part of our Infosec strategy. lead on the delivery of British Heart Foundation’s (BHF … of security solutions, you’ll lead the implementation of Microsoft Purview, you’ll support the delivery of our PrivilegedAccessManagement (PAM) programme. You’ll also manage other projects related to information security and cybersecurity. The Technology department is an integral internal partner for BHF, helping to … at the application or interview stage. About you To be successful in this role you'll have the following qualifications, skills and experience: • Project Management qualifications in one or both of PRINCE2 or AGILE • Experience with MS Project, MS SharePoint, and Office tools • Proven track record and credentials of more »
excellence, and the highest standards of cybersecurity. We are seeking a Technology Project Manager with a strong background in information security and cyber project management to help us implement cutting-edge security operations as part of our Infosec strategy. lead on the delivery of British Heart Foundation's (BHF … of security solutions, you'll lead the implementation of Microsoft Purview, you'll support the delivery of our PrivilegedAccessManagement (PAM) programme. You'll also manage other projects related to information security and cybersecurity. The Technology department is an integral internal partner for BHF, helping to … at the application or interview stage. About you To be successful in this role you'll have the following qualifications, skills and experience: Project Management qualifications in one or both of PRINCE2 or AGILE Experience with MS Project, MS SharePoint, and Office tools Proven track record and credentials of more »
of this project, I cannot reveal much information at this point, but key experience is: LLD & HLD Infrastructure - MS Suite MoD Cloud (Ideally Azure) PAM (PrivilegedAccessManagement) You must have A ctive DV Clearance & be a sole British National to apply for this role. Any experience more »
to be onsite in Berkshire 3 days a week. Key experience for these roles are: LLD & HLD Infrastructure & Data Centre MS Suite Private Cloud PAM (PrivilegedAccessManagement) Directory Services DNS, DHCP, NTP Cyber Security Awareness - Vulnerability, Malware, Compliance You must have A ctive DV Clearance & be more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK & abroad. … in total) Flexible working Competitive salary Social fund ---------------------- About CyberIAM CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in Identity AccessManagement and PrivilegedAccess Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identity management services to the best customers is where our passion lies. more »
to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threat management, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps automations to … and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business continuity plans, disaster recovery, and critical management plans to ensure the resilience of our operations in the face of cyber threats and other emergencies. Key Competencies Technical Significant experience in Cyber … protecting IT, OT, and IP networks, including IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Expertise in PrivilegedAccessManagement and related tools High level of expertise in Vulnerability and Compliance Management; DDOS protection Hands-on experience in Cyber more »
Partners are excited to be working with a growing global cyber security consultancy to recruit a Managing Consultant/Project Lead IAM (Identity and AccessManagement) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world’s leading … ClearSkye, CyberArk, Delinea. 5 years proven project management experience within IAM. Delivery of large scales IAM projects, Ideally in SailPoint and/or PAM technologies In-depth knowledge of IAM principles, standards, and best practices. Excellent leadership and communication skills, with the ability to effectively interact with diverse stakeholders. … Ability to manage multiple projects in parallel. Experience with IAM technologies such as identity governance and privilegedaccess management. Familiarity with regulatory requirements related to data privacy and security Proficiency in project management tools and methodologies Responsibilities will involve: Develop detailed project plans covering all phases: Definition more »
for a security engineer to ensure new system solution meets security requirements. Your role will be * Alongside an SME, learn and develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop Identity and AccessManagement solution; including feeding into Service more »
emails with encryption. Become the gatekeeper of our inboxes. • Platform Maestro: Deploy, configure, and command a symphony of security tools - EDR/XDR, vulnerability management, email gateways, you name it. Fine-tune rules and detections, optimising threat detection and reducing false alarms. • Network Security Sage: Possess a deep understanding … Incident response methodologies (MITRE ATT&CK, D3FEND) • Microsoft 365 Security • DMARC, SPF, DKIM • Strong Scripting (e.g., PowerShell or Python) • Security automation frameworks • Security platform management • Vulnerability management tools • Privilege AccessManagement • Industry-standard frameworks (NIST, SANS) and best practices controls (CIS) About Us ComfortDelGro is one more »
including both Consulting/Professional and Managed Services, across Enterprise Computing, Cloud, Data Centres, DevOps, End User Computing, Service Desk, Network Services and Environment Management Services. Job roles and responsibilities: Providing a clear view of the level of risk to ensure appropriate mitigation plans are put in place and … experience in building Zero Trust Architecture Hands-on experience on tools related to one or many of the tools in Endpoint security, IAM, Privilege Access Management. Tools exposure: Zscaler, Microsoft Defender, Sentinel, BeyondTrust, Azure native security etc. Preferred Skill: OT security is preferred. At Cognizant you will experience an more »