Privileged Access Management Jobs

26 to 49 of 49 Privileged Access Management Jobs

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What … holiday per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Employment Type: Permanent
Salary: £40,000
Posted:

DV Cleared NetiQ / IdAM Senior Engineer

Farnborough, England, United Kingdom
iO Associates - UK/EU
the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged Access Management (PAM) Identity Governance and Administration Security Best Practices Our client is looking to interview candidates from Tuesday 30th April so please get in touch if you more »
Posted:

Lead Cyber Security Engineer

London Area, United Kingdom
GCS
and enforce the Cyber framework and Security compliance policies company-wide, including the formulation of robust business continuity plans, disaster recovery strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical and Strategic: Lead the design and implementation … IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Advanced knowledge in Privileged Access Management (PAM) and associated tools. High proficiency in Vulnerability and Compliance Management, as well as DDOS protection. Hands-on experience in engineering Cyber Security solutions for more »
Posted:

GRC Security Risk Specialist

Chicago, Illinois, United States
Request Technology - Craig Johnson
team, leads and executes the programs within the GRC team, is a subject matter expert for Information Security (consulting to technical/non-technical management and the user community), and performs key risk management functions within the Security Governance department. Primary functions include life cycle management of … client responses, Policy & Standards life cycle management, Security Vendor Risk program management, Security Awareness, Controls Assurance, and GRC platform and program management. Responsibilities: Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and lifec-ycle. Manage the exception request process and consult more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

GRC Security Risk Specialist

Austin, Texas, United States
Request Technology - Craig Johnson
team, leads and executes the programs within the GRC team, is a subject matter expert for Information Security (consulting to technical/non-technical management and the user community), and performs key risk management functions within the Security Governance department. Primary functions include life cycle management of … client responses, Policy & Standards life cycle management, Security Vendor Risk program management, Security Awareness, Controls Assurance, and GRC platform and program management. Responsibilities: Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and lifec-ycle. Manage the exception request process and consult more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

Security Operations Specialist

London Area, United Kingdom
Eames Consulting
and procedures. Resolve security operations support incidents promptly. Assist Information Security Architecture team with technical security matters. Support Internal Control Framework (ICF) development, vulnerability management, and technical audits. Promote security awareness and best practices within the company Collaborate with technical teams and third-party security partners on key projects. … Technical Requirements: Expertise in security technologies (endpoint protection, vulnerability scanners, network security, cloud security, etc.). Knowledge of Privileged Access Management (PAM) best practices and technologies. Proficiency with Microsoft technologies (Windows Server, Active Directory, SQL Server). Experience with Linux distributions (Ubuntu, Red Hat, Rocky). Familiarity more »
Posted:

M365 Architect

London Area, United Kingdom
Wipro
Key Skills: Sharepoint/Onedrive/Powerapps/Quest Key responsibilities: 1. Tenant administration. 2. PowerShell scripting to manage admin tasks. 3. Azure License management 4. SharePoint Administration(Basics) 5. Exchange Administration. (Basics) 6. Teams administration.(Basics) 7. Yammer/Viva Engage admin(Basics) 8. Streams Admin(Basics) 9. … Handling Azure AD related issues. 10. SSO/MFA 11. DLP & Conditional Access 12. Managing MS health advisory and implementing upgrades. 13. Handling domains 14. knowledge of OnPrem AD & AAD sync 15. Identity Management. 16. Privileged Identity Management 17. Privileged Access Management 18. Automations more »
Posted:

Continuous Monitoring Cyber Security Engineer (Zero Trust)

Washington, Washington DC, United States
Govcio LLC
to visualize cyber risk through cyber "heat maps". Support the design and implementation of the client provided Privileged Access Management (PAM) system. Troubleshoot where necessary and install and develop new plug-ins and connectors for PAM solutions. Support the design and implementation of client selected endpoint more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Network Support Engineer

London, England, United Kingdom
Pioneer Search
Cloud landing zone, as well as branch offices, head office and data centre. Maintain the organisation's LAN/WAN networking, including wireless controllers, Access points, Checkpoint firewalls, Proxy, Citrix NetScaler load balancers, MS Teams Voice, and Cisco switches and routers. Manage the configuration and installation of all network … the IT infrastructure. Skills/qualifications required: Strong knowledge and understanding of information security principles. Practical experience with Privileged Access Management (PAM). Proven track record in troubleshooting complex networks, hardware, and software. Extensive experience with network systems, global configuration standards, and relevant protocols across all major more »
Posted:

DV Cleared Technical Architect

County Of Herefordshire, England, United Kingdom
iO Associates - UK/EU
of this project, I cannot reveal much information at this point, but key experience is: LLD & HLD Infrastructure - MS Suite MoD Cloud (Ideally Azure) PAM (Privileged Access Management) You must have A ctive DV Clearance & be a sole British National to apply for this role. Any experience more »
Posted:

DV Infrastructure Solutions Architect

West Berkshire, England, United Kingdom
iO Associates - UK/EU
to be onsite in Berkshire 3 days a week. Key experience for these roles are: LLD & HLD Infrastructure & Data Centre MS Suite Private Cloud PAM (Privileged Access Management) Directory Services DNS, DHCP, NTP Cyber Security Awareness - Vulnerability, Malware, Compliance You must have A ctive DV Clearance & be more »
Posted:

Information Security Analyst

London Area, United Kingdom
Stack Digital
Rate Payable to Contractors: £350 - £400 per day Duration of Assignment: 6 months Role Description: The Information Security Analyst role at RBC BlueBay Asset Management involves providing expert advice and support on Information Security. The role includes system access reviews, security monitoring, compliance checks, and contributing to the … and ensure a safe and sound environment through pragmatic risk-based analysis. Key Responsibilities: Information Security Systems Review and Monitoring: Coordinate and manage user access and access rights review cycles for BlueBay systems. Maintain and improve security monitoring, including: Compliance with security standards. Monitoring vulnerabilities. Compliance with the … IT KRIs/KPIs. Conduct periodic internal penetration testing and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and followed. Document standard and security procedures for BAU tasks on the internal SharePoint site. Support and challenge third more »
Posted:

Security Incident Lead

London Area, United Kingdom
Acumin
Incident Lead Join our Cyber Security product group as a Security Incident Lead, a pivotal role within our team dedicated to cyber security incident management and security operations technologies. Our mission is to deliver top-tier enterprise security services across the organization. Key Responsibilities: Subject Matter Expertise : Lead as … the expert on security operations technologies, enhancing identity governance and privileged access management processes. Incident Management : Oversee the full lifecycle of security incidents, especially during high-priority investigations. Ensure outcomes align with business priorities and policies, and disseminate lessons learned effectively. Collaboration : Work closely with team … Provide coaching and guidance to the Digital Technology & Innovation (DTI) Product Groups and the wider DTI Security community. What You Will Gain: Innovative Tools : Access to a wide range of cutting-edge cyber security tools and applications. Cloud Exposure : Experience working with multiple cloud providers and security suites. Development more »
Posted:

Security Project Manager

London Area, United Kingdom
Nexere Consulting
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
Posted:

Partnerships Manager

Chester, England, United Kingdom
CyberIAM
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK & abroad. … in total) Flexible working Competitive salary Social fund ---------------------- About CyberIAM CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in Identity Access Management and Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identity management services to the best customers is where our passion lies. more »
Posted:

Senior Auditor, Infrastructure and Cyber Security

London, England, United Kingdom
Jobleads-UK
and supporting them to realise their potential on the engagement The skills you’ll need We’re looking for someone with audit or risk management experience, together with a strong understanding of the principles of good risk management. You’ll also need: In depth understanding of Infrastructure and Cyber …/PaaS services running in MZ Azure, AWS or GCP Familiarity with the latest cyber security and engineering concepts, including: defence in depth, cryptography, privileged access management, DevOps, Continuous Integration & Continuous Deployment (CI/CD) Networking (Device Configuration Management) and Security Excellent analytical skills and the … ability to assess and prioritise data effectively, quickly establishing what’s important A thorough grounding in monitoring and testing effective controls Excellent stakeholder management skills Great communication skills, with the ability to translate concepts in a clear and concise way #J-18808-Ljbffr more »
Posted:

Security GRC Specialist

Chicago, Illinois, United States
Request Technology
SOC Technical writing experience 4+ years of Information Security experience Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Strong knowledge of risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerability assessment … and forensic investigations tools. Knowledge of Privileged Access Management technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third-party business partners in a timely manner. Document and perform assessments as needed. Technical writing for policies, standards, and communications. Lead in the creation and … risk, compliance, and assurance from internal and external perspectives. Serve as a subject matter expert for Information Security consulting to technical/non-technical management and staff. Manage and support the 3rd Party Security Vendor Risk Management program and life cycle. Manage the exception request process and consult more »
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

IAM Managing Consultant

United Kingdom
Hybrid / WFH Options
Transition Partners
Partners are excited to be working with a growing global cyber security consultancy to recruit a Managing Consultant/Project Lead IAM (Identity and Access Management) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world’s leading … ClearSkye, CyberArk, Delinea. 5 years proven project management experience within IAM. Delivery of large scales IAM projects, Ideally in SailPoint and/or PAM technologies In-depth knowledge of IAM principles, standards, and best practices. Excellent leadership and communication skills, with the ability to effectively interact with diverse stakeholders. … Ability to manage multiple projects in parallel. Experience with IAM technologies such as identity governance and privileged access management. Familiarity with regulatory requirements related to data privacy and security Proficiency in project management tools and methodologies Responsibilities will involve: Develop detailed project plans covering all phases: Definition more »
Posted:

PAM Engineer (One Identity) | Remote | 6 Month Contract | SC Clearance

United Kingdom
Hybrid / WFH Options
Trilogy International
PAM Engineer (One Identity) | Remote | 6 Month Contract | SC Clearance Our client is looking to onboard a PAM Engineer with skills in Quest One Identity Safeguard to join them on a 6-month remote project. You will be responsible for supporting and configuring Safeguard, and helping with integration into Active … a remote role, operating outside IR35. You must have active SC Clearance Key Skills required: Strong experience as a security engineer, specifically working with Privileged Access Management tools and processes Experience with Quest One Identity Safeguard SaaS solution SC clearance more »
Posted:

Information Security Analyst

London Area, United Kingdom
IPS Group
Information Security Architect and Security Operations Manager in the London office. Responsibilities include: Spearheading response to threats detected Supporting in the production, development and management of security systems and strategies Continuously update and maintain existing operations tools, documents and procedures whilst also promoting best practice and and awareness Engaging … hours support where necessary (not common) Technical Requirements: Knowledge of security technologies and domains including attack simulation, network and cloud security etc. Comprehension of Privileged Access Management procedures Proficiency in Windows Server, Active Directory and SQL Server as as work Strong understanding of Linux distributions Working knowledge more »
Posted:

Performance Test Lead

Nationwide, United Kingdom
Hybrid / WFH Options
Experis
of opportunities in the evolving world of cloud, digital and platforms. Role: Performance Test Lead The Performance Test Lead will be joining the existing PAM Project test team (currently 4 manual test analysts, a test lead, test manager and 2 automation engineers) The PAM test team is responsible for testing … all project test phases incl functional test, SIT, UAT and performance testing prior to hand over to Pre-Production The PAM Project is a global, multi-phase, multi release project that includes large data volumes and migration of a large number of existing accounts. The PAM application/vendor is … both solution and migration Manage execution of performance testing for both solution and migration, including progress and completion reports, metrics/dashboards and defect management Build the performance test team to support the defined strategy. Required Skills: Experience of high-volume performance testing in a complex global environment Experience more »
Employment Type: Contract
Rate: £600 - £620/day
Posted:

Information Security Consultant

Leeds, West Yorkshire, United Kingdom
Berkeley Square IT Ltd
seeking candidates with at least three of the following areas. Microsoft Security Centre Microsoft Compliance Manager Microsoft Endpoint Manager (mobile and Windows 10 device management) Microsoft Defender Multifactor Authentication App Locker Data Loss Prevention Candidates with additional experience in Privileged Access Management, Application Whitelisting, and familiarity more »
Employment Type: Permanent
Salary: £45000 - £65000/annum + Benefits
Posted:

Senior Cyber Security Architect

Coventry, West Midlands, United Kingdom
Hybrid / WFH Options
Cognizant
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege Access Management Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
Employment Type: Permanent, Work From Home
Posted:

Sr Cyber Security Architect

London Area, United Kingdom
Cognizant
To apply for this Sr. Cyber Security Architect role, your soft skills, expertise, and experience should include: Zscaler, Microsoft Defender Endpoint security, IAM, Privilege Access Management Sentinel, BeyondTrust Azure native security, etc. At Cognizant, taking care of employees is a priority: You can pursue innovative career tracks and more »
Posted:
Privileged Access Management
10th Percentile
£43,750
25th Percentile
£55,000
Median
£67,500
75th Percentile
£76,250
90th Percentile
£86,000