PAM Engineer (One Identity) | Remote | 6 Month Contract | SC Clearance Our client is looking to onboard a PAM Engineer with skills in Quest One Identity Safeguard to join them on a 6-month remote project. You will be responsible for supporting and configuring Safeguard, and helping with integration into Active … a remote role, operating outside IR35. You must have active SC Clearance Key Skills required: Strong experience as a security engineer, specifically working with PrivilegedAccessManagement tools and processes Experience with Quest One Identity Safeguard SaaS solution SC clearance more »
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
return, the business asks that you have hands on delivery experience with: Cisco/Fortinet/Meraki LAN, WLAN, FW. Azure, EntraID, Security policy management, IdP, DLP. On prem active directory. Intune device and conditional access. M365 migrations, security hardening, management. NGAV & threat prevention solutions. PrivilegedAccessmore »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat management and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … the lead in the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetration testing and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present … standard accreditations and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privilegedaccessmanagement, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Some duties include: This role will be required to research, implement, and more »
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Cognizant
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege AccessManagement Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
Manchester, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … of implementing and working with PrivilegedAccessManagement systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability Management Details. Wages. Perks. You'll join us in one of our brilliant digital more »
month contract Inside IR35 We're seeking a skilled individual to join our clients CyberArk delivery team, deploying the cutting-edge CyberArk core PrivilegedAccess Security (PAS) solution to their esteemed clients. Responsibilities: Lead the deployment, configuration, and testing of CyberArk PAS, ensuring seamless integration across platforms like … support and guidance on CyberArk's suite of products, spanning on-premise, AWS, and Azure environments. Requirements: Proven hands-on experience with CyberArk's Privileged Identity and Privileged Session Management Suites. Ability to extend and enhance CyberArk technologies, optimizing services for maximum efficiency. Deep understanding of PrivilegedAccessManagement processes, particularly within CyberArk. Familiarity with major operating systems including Microsoft Windows, UNIX, and Linux. Knowledge of Active Directory structures, Identity Management policies, and major databases like Microsoft SQL and Oracle. Please apply for more information. ECS Recruitment Group Ltd is acting as an more »
Job Title: PAM Manager (PrivilegedAccessManagement) Location: London | Midlands | Buckinghamshire Role Type: Full-time, Hybrid (Note: We are unable to provide sponsorship for this role) About the Company: Our client is a renowned organisation that plays a pivotal role in logistics and distribution throughout the UK. … of privilegedaccess within the organisation's IT infrastructure. Responsibilities: Lead the development and implementation of privilegedaccessmanagement (PAM) strategies, policies, and procedures. Work closely with key stakeholders to understand business requirements and translate them into PAM solutions. Manage relationships with implementation partners, including … to ensure successful deployment and integration of PAM tools. Oversee the configuration, customisation, and optimisation of PAM tools - working closely with the wider IAM & IGA team. Conduct regular assessments of privilegedaccess risks and vulnerabilities, and develop mitigation strategies. Provide guidance and support to IT teams on PAMmore »
london, south east england, United Kingdom Hybrid / WFH Options
Experis
Hiring: PrivilegedAccessManagement Consultant (PAM) 📍 Location: Hybrid working – various clients in London area 🗓 6 month initial contract – likely extension 💷 Competitive day rate – inside IR35 Experis are working with an award-winning IT Consultancy provider who are looking for an experienced Consultant with excellent experience in implementing … and troubleshooting PAM Solutions. We are welcoming applicants with experience and skills in PrivilegedAccessManagement (PAM) solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, Azure and AWS Security. You will be responsible for implementing, troubleshooting, and supporting various PAM components and integrations, as well as creating and … skills: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field, or equivalent work experience At least 3 years of experience in PAM solutions, such as CyberArk, Sailpoint, Checkpoint, BeyondTrust, etc. Experience in cloud platforms and security, such as Azure and AWS Excellent communication, collaboration, and problem-solving more »
successful delivery of multiple workstreams including vendors that will see the successful deployment of a comprehensive IDAM capability requiring strategic leadership, managing resources, financial management & following established governance, whilst ensuring the efficient and effective execution of this programme. Experienced professional with full programme lifecycle management of large transformational … involves a significant amount of stakeholder engagement; both at central and local site level, planning and execution, controls applied for planning, issue and risk management, as well as reporting on a day-to-day and key milestone/deliverable basis. It is also critical a quality-based handover to … and best practices Implemented large scale Identity Governance and Administration (IGA), Identity AccessManagement (IAM) and PrivilegedAccessManagement (PAM) solutions and monitoring. Knowledgeable in key IAM concepts (Lifecycle and governance, Role Based access control, user provisioning, workflow and self-service management, password more »
a business differentiator across all digital channels. Responsibilities: Maintain working knowledge of accessmanagement, directory services, privilegedaccessmanagement (PAM), multi-factor authentication (MFA), Azure Active directory (Azure AD), and federated identities across applications and services Understands the roles of certificates and keys in securing … identities Provide solutions and operations for identity and accessmanagement services for on premises and cloud environments Responsible for swiftly resolving disruptions to technology services, minimizing user impact Supporting the development of strategy, roadmaps and implementation plans for IAM Required Skills: Knowledge of Cyber Security frameworks, including PCIDSS … understanding of cloud native authentication mechanisms Provides expert knowledge of SAML 2.0, SSO, 2FA/MFA, Kerberos and LDAP Expert knowledge of Identity Lifecyle Management In-depth knowledge of windows operating systems Experience with deployment/implementation/of M365 tools Strong experience of access governance, identity administration more »
as there is a lot of crossover between the two technologies. About The Role Design, implement, and manage PrivilegedAccessManagement (PAM) solutions, assessing stakeholder requirements and defining technical cybersecurity controls across various platforms. Collaborate on policy enforcement, provide regular security reports, and possess expertise in Delinea … PAM, including integration with IGA systems and customization for specific business needs. Investigate and resolve access incidents while monitoring logs for suspicious activity. Ideal Hire Candidates should come from a professional services or end-user background and should ideally have experience in REGULATED ENVIRONMENTS . Where customers essentially serve more »
Job Title: Head of Identity and AccessManagement (IAM) Location: London Salary: £100,000 - £135,000 + Bonus + Car etc Company Overview: Our client is a leading multinational consultancy firm specializing in providing innovative solutions. With a global presence and a commitment to excellence, the company assists … clients in navigating complex challenges and achieving their business objectives. Position Overview: Our client is seeking a dynamic and experienced Head of Identity and AccessManagement (IAM) to join its team. The ideal candidate will be responsible for developing and implementing comprehensive IAM strategies, policies, and procedures to … of IAM, the individual will lead a team of IAM professionals, collaborate with key stakeholders, and drive initiatives to enhance security posture and streamline accessmanagement processes. Key Responsibilities: Develops and executes IAM strategies aligned with business objectives and regulatory requirements. Leads the design, implementation, and maintenance of more »
Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in Identity and AccessManagement (IAM) and PrivilegedAccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and more »
the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: PrivilegedAccessManagement (PAM) Identity Governance and Administration Security Best Practices Our client is looking to interview candidates from Tuesday 30th April so please get in touch if you more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in PrivilegedAccessManagement (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
of this project, I cannot reveal much information at this point, but key experience is: LLD & HLD Infrastructure - MS Suite MoD Cloud (Ideally Azure) PAM (PrivilegedAccessManagement) You must have A ctive DV Clearance & be a sole British National to apply for this role. Any experience more »
to be onsite in Berkshire 3 days a week. Key experience for these roles are: LLD & HLD Infrastructure & Data Centre MS Suite Private Cloud PAM (PrivilegedAccessManagement) Directory Services DNS, DHCP, NTP Cyber Security Awareness - Vulnerability, Malware, Compliance You must have A ctive DV Clearance & be more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
SOC Technical writing experience 4+ years of Information Security experience Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Strong knowledge of risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerability assessment … and forensic investigations tools. Knowledge of PrivilegedAccessManagement technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical writing for policies, standards, and communications. Lead in the creation and … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and life cycle. Manage the exception request process and consult more »
SOC Technical writing experience 4+ years of Information Security experience Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Strong knowledge of risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerability assessment … and forensic investigations tools. Knowledge of PrivilegedAccessManagement technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical writing for policies, standards, and communications. Lead in the creation and … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and life cycle. Manage the exception request process and consult more »