asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Exciting Opportunity for a Linux Engineer! 🌐. Amazing opportunity to work on a highly visable IdentityandAccessManagement programme of work. Ideally the client seeks a Linux Engineer with IAM - IDAM - PAM or SIEM Tooling experience. In the rapidly evolving world of electronic … a pivotal member of the team the Linux Engineer can expect to: 🔧 Craft and maintain robust Linux server environments. 🔒 Be heavily involved in IdentityAccessManagement project. ⚡ Support lightning-fast high-frequency trading systems. 💡 Deploy the latest upgrades to Linux Servers ensuring peak performance. … Unix – Linux support and engineering. 🛠 Mastery in enterprise Linux, with a preference for Red Hat, CentOS, or Oracle Linux. 🔒 Recent hands-on exposure with IDAM, PAM, or SIEM tooling. 👁️🗨️ A track record with monitoring tools like Prometheus or Nagios. 🖥️ Scripting skillset in Python, Shell, Bash, or Ruby. 🌐 In-depth understanding more »
Role: ForgeRock SME Job Type: Permanent Location: London(Hybrid) Ready to utilise your skills and experience in IdentityandAccessManagement (I&AM) systems with ForgeRock and other I&AM product stacks? Are you passionate about developing various backend java components to meet client … be required to utilise your experience in leading, consulting, architecture, maturity assessment, requirement analysis, design, development, implementation and support of IdentityandAccess Manag1ement (I&AM) systems with ForgeRock and other I&AM product stacks. Key responsibilities: Perform the analyss, design, deploy/implement and provide … skills/knowledge/experience: Experience in leading, consulting, architecture, maturity assessment, requirement analysis, design, development, implementation and support of IdentityandAccessManagement (I&AM) systems with ForgeRock and other I&AM product stacks. IAM and IDM OAuth OpenDJ Good to have: Knowledge more »
technologies, industry leading best practices, and the promotion of a cybersecurity ownership culture across the company. Strong PKI/certificate managementandidentity security are vital to the security and operational resilience of Pfizer and critical to zero trust enablement. The Senior Manager of Zero Trust … requires subject matter expertise across the broad domain of zero trust enablement with hands-on expertise in delivering PKI, certificate managementandidentity security solutions, at massive scale, across cloud, on-premise and SaaS environments.Strong business communication skills are required to influence senior business leaders at … solutions and meet rigorous deadlines through project managementand team leadership.Familiarity with compliance frameworks and regulations related to identityandaccessmanagementand certificates (e.g., GDPR, HIPAA, NIST).Strong leadership skills with proven ability to develop talent and build bench strength in more »
from Office) Project Type: Contract Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. • Implement and manage SCIM provisioning for automated user lifecycle management • Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. • Configure and manage accessmore »
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identityandaccessmanagement capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identityandaccessmanagement domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identityand security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning andaccess control. If you have a passion for DevOps, security, andidentitymanagement, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. * Implement and manage SCIM provisioning for automated user lifecycle management * Integrate identityandaccessmanagement systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. * Configure and manage accessmore »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning andmanagement of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identityandaccessmanagement (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK … CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in IdentityAccessManagementand Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law Enforcement, Retail, Insurance, Telecoms … Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
Location: London, UK The role will be responsible for planning, coordination, governance, oversight and delivery of the IDAM Path to Effective Plan. This encompasses all aspects of IDAM controls: Joiner, Mover, Leaver Access Recertification Access Rules & Role Management Authentication Privileged Access. And will drive … deliver the required objectives, outcomes, and capabilities. You will need to communicate effectively with a wide range of programme stakeholders and partners, ranging from IDAM SMEs to senior executives. You will also drive and support the adoption of bank standards and work in alignment with change frameworks at all times. … with experience of delivering SailPoint within large and complex organisations Knowledge of Risk Management Framework, with understanding of IdentityandAccessmanagement controls would be preferred. Excellent understanding of the project & programme life cycle. Excellent understanding of Risk Based Project Managementmore »
with business areas to troubleshoot and resolve issues. Support would be provided in relation to incidents and requests, systems and applications administration, configuration andaccessmanagement carried out in accordance to the agreed levels of services and providing a good customer experience in accordance with the … as Electronic Patient Record, Shared Care Record, National Systems and Services, Mobile Working solutions, Electronic Document Management, andIdentityandAccessManagement solutions. The post holder is expected to work flexibly across main Trust sites at Aylesbury, High Wycombe and Amersham. About … learning and development opportunities to support your career progression. Alongside NHS benefits of generous annual leave entitlement and pension scheme, you'll have access to NHS discount schemes. We provide a range of health and wellbeing services to promote a healthy, happy workforce. What do we stand for more »
well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threat managementand will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to technology. You … an outstanding benefits package, which includes pension schemes, discounted gym memberships, a cycle-to-work scheme, access to home furnishings and electronics, access to Employee Assistance Program (EAP), discounts at various high street retailers, eligibility for the Blue Light Card, the opportunity to apply for low … anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identityandaccessmanagement) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access, virtualisation more »
related, including MScInfoSec, CISM, CISA, CISSP etc. - AZ300: Microsoft Azure Architect - AZ304: Microsoft Azure Architect Design Training Demonstrable experience in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM) experience, including delivery experience, is required. In-depth understanding of … modern authentication solutions using SAML/OAuth/OIDC is essential. Experience in design and delivery related to an Identity Provider, e.g., Active Directory, Azure Active Directory, SailPoint IdentityNow, is desired. Technical proficiency in identity protocols (SAML, OIDC, LDAP, Kerberos, FIDO2, WebAuthN) is also necessary. more »
with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … of the following Information Security domains, 4 required Security Operations Cloud Security Network Security Vulnerability and Threat ManagementIdentityandAccessManagement (IAM) Database Security Application Security 2 or more years of experience in an IT management role 2 or … more years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3 or more years of experience with security information and event management (SIEM) tools 3 or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds more »
Our Client is a dynamic and innovative player in the Identity Security and Security Operations space, specializing in IdentityandAccessManagement (IAM) and Privileged AccessManagement (PAM). Committed to providing top-notch consulting and managed services … a pivotal role in expanding our market share, with a primary focus on services (Consulting and Managed Services) and product sales in the Identity Security and Security Operations space. Key Responsibilities: Market Share Expansion: Develop and execute … strategies to expand Our Client's market presence in the UK region. Identify and pursue business opportunities to drive revenue growth. Sales and Account Management: Manage client relationships and act as the primary point of contact for key accounts. Drive sales efforts for both services and products, with more »
Experience in Architecting Data & Analytics Platforms like Cloud/Big Data/EDW's Must have 5+ years in Data Governance Solutions (Metadata Management, Data Quality, Data Lineage, Data Catalogue) Must have 5+ solution experience in Reporting/Visulization Platform Modernization (Canned, Self Service and Real Time Reporting … Data technologies (e.g. Oracle, SQL Server, Postgres, Spark, Hadoop, other Open Source). Must have experience in Data Security Solutions (IdentityandAccessManagementand Data Security AccessManagement) Must have 3+ years' experience of DevOps (CI/CD) Certifications … with End users clients. Worked in Onsite/Offshore model. Demonstrated excellent communication, presentation, and problem-solving skills. Experience in project governance and enterprise customer managementmore »
At Amazon Web Services IdentityandAccessManagement (AWS IAM) we build, operate, and innovate the identitymanagement, authentication, and authorization stack for the AWS cloud. Our mission is to push the technical boundaries to enable AWS customers to run … of this mission, we Think Big and Dive Deep as we leverage technology to give customers state-of-the-art controls to manage access across all their AWS environments. At IAM, we operate one of the … largest distributed systems in the world, which processes tens of millions of transactions per second. With the growth of AWS, the customer workloads andaccess patterns keep evolving, demanding the next order of magnitude scalability. We are looking for a strong Senior Software Engineers to join the team more »
Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: IdentityAccessManagement (IAM) User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
site 4-5 days a week Job Description: "Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP,cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture.The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … s overall cybersecurity strategy.Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls.Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements.Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality … SLA's. Evaluate and implement CIS critical security controls where necessary.Will provide input into cybersecurity strategic roadmap and annual budget.Adhere to applicable change management policy and procedure. Qualifications:Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training more »
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … team during the design and development of security roles including custom roles development, deployment, and testing Strong experience in integrating identityandaccessmanagement controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »