Oracle ERP/Fusion Experience is Essential Exposure to Configuring Oracle Accessand Segregation of Duties Experience with IdentityandAccessManagement, Roles and Permissions including custom roles, along with Privileged Access The minimum criteria you’ll need is a … day. This means that our working environment is one where everyone’s experience is important. Where people are treated fairly, everyone has equal access to opportunities and where everyone feels safe to be themselves. We want to create a culture where it’s okay to ask questions andmore »
Manchester, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Methods
years as a senior scrum master having led squads and multiple workstreams on infrastructure programs including hosting, networking, digital workplace, identity, andaccessmanagement 2+ years' experience within a client facing consultancy You are comfortable with Agile methodologies and frameworks (Scrum, Kanban, LeSS) and … of exciting project work that is making a difference in society Strong, inspiring and thought-provoking leadership A supportive and collaborative environment Development - access to LinkedIn Learning, a management development programme, and training Wellness - 24/7 confidential employee assistance programme Flexible Working - including home working more »
passionate about helping our clients succeed in an ever-changing industry. We are/have: Experts in Banking & Payments, Capital Markets, Insurance and Wealth & Asset Management Deep knowledge in financial services offering, including eg Finance, Risk and Compliance, Financial Crime, Core Banking etc. Committed to growing our business … expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identityandaccessmanagement, or offensive security engineering An understanding of the end to end technology delivery life cycle, with exposure to working in more »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
Watford, Hertfordshire, South East, United Kingdom
Senitor Associates Limited
for the successful delivery of new cloud, web and mobile projects and/or change knowledge of single sign-on, identityandaccessmanagement (IAM), plus application role-based access key contributor to IT strategy and planning which focuses on maximising the more »
seeking an experienced Implementation Project Manager for an initial 6 month contract. The Data Consent Project will focus on implementing a data consent management platform. The right person will have extensive experience in similar implementation projects, proven data privacy compliance knowledge and a background managing enterprise level projects. … business and IT to create processes for selecting a platform and partner to implement a global consent and identify platform. Collaborate with senior management, stakeholders, and technical teams to define the project scope, goals, and deliverables. Lead a cross-functional project team consisting of IT professionals and business … IT projects on time and within budget. Strong experience managing enterprise projects involving data privacy compliance and implementation of customer identityandaccessmanagement (CIAM) solutions like Adobe Experience Platform, SAP CDC, Oracle Identity Cloud Service (OICS), or Auth0. Strong understanding of more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and delivery of an integrated set of systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee integration principles, standards, policies, and procedures to ensure secure, high-quality integrations … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Devon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
of CI/CD tools and SAST/DAST tooling. Understanding of networking principles and cloud security frameworks. Experience with identityandaccessmanagement tools. Familiarity with relational and NoSQL databases. #INDTech more »
Enterprise Architect Job Role : Enterprise Architec tLocation: Fully Remot eSalary: £90 k Working for the UK's largest fleet management SAAS provider who's data driven platform enables 80% of UK big brands to monitor their connected assets & ensure sustainability within their day to day operation s. Job … ems.Research and recommend data tools and technologies to enhance system efficiency and integration, considering Zero Trust Architecture, Information Security, andIdentityandAccessManagement princip les.Develop and maintain integration principles, standards, policies, and procedures to ensure secure, high-quality integrations and governance practi ces.Collaborate more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
application can be reviewed. As our Mobile Architect , you will work on Domain Architecture within the Enterprise Architecture team working closely with Product Management, Security and Technical teams. Spearheading the architectural design and planning, you will support the integration of various Mobile and Edge product offerings and their … of an integrated set of Mobile applications systems, whilst considering the principles and requirements of Zero Trust Architecture, Information Security, IdentityandAccessManagement, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures to ensure secure, high-quality … so come be a part of our success! Best Workplace in the UK for Tech certified Low overtime culture with flexible working opportunities Access to our salary sacrifice EV Car Scheme - payments are made before tax and other contributions, so saving you money, whilst doing your bit for more »
Azure Integrations services, Logic Apps, Azure Functions, and Azure API management - Thorough understanding of Biztalk - Knowledge of Microsoft IdentityandAccessmanagement services. - Proven track record of successfully integrating business services using BizTalk - C# Knowledge Why this role? This role offers the more »
Active Directory, including administration, architecture, or management of environments with at least 10,000 users. Awareness of the identityandaccessmanagementand infosec product landscapes, including technical features of competing products. Experience doing customer demos of software products. Experience developing technical more »
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions andidentity/accessmanagement across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
must and the candidate should be proactive and self-driven, communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
must and the candidate should be proactive and self-driven communicating effectively to non-technical stakeholders. About the Role Design, implement, and manage Identity Governance Administration solutions, assessing stakeholder needs and defining cybersecurity controls for public cloud, enterprise, and app design. Collaborate on policy enforcement, provide security reports … and support infrastructure. Specialize in SailPoint IDN, user provisioning, RBAC, and SoD. Integrate systems, customize workflows, and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP more »
SailPoint Consultant - Migration 6 months Remote/London - 2 days a week on-site £Negotiable - INSIDE IR35 - Experience in IdentityandAccessManagement - SailPoint IIQ experience - Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations … Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena more »
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, Vulnerability Management, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, Vulnerability Management, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber security support activities (configuration more »
expertise in Microsoft cloud services, including Azure and Microsoft 365. Experience creating and implementing infrastructure policies and standards. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Experience in Azure Cloud Security, with a … strong understanding of Azure security services and configurations. Experience dealing with large global Microsoft 365 migrations/implementations after M&A. Solid stakeholder management up to c-suite If this sounds of interest, please apply for more information. more »
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identityandaccessmanagement, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
IVC Evidensia
outstanding care in around 2,500 locations globally. IVC Evidensia is undergoing an exciting digital transformation. Key to this is to improve the management of our core data sets. This means accelerating the standardisation of operational systems in practices, the creation of stronger tools for managing master data … breaking the challenges into deliverables. Along with this, they will also work closely with the Data Architect to define our over-arching data management strategy. In return, you will benefit from: * Hybrid working environment in a dog-friendly office * 5 weeks holiday, plus bank holidays * Your birthday as … with information security best practice. Capabilities in interfacing the IT Infrastructure team to ensure non-functional requirements, such as performance, scalability, resilience andidentity/accessmanagement, are effectively delivered in the end-to-end solution. Following receipt of your application, you will be more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »