Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Maclean Moore Consulting
Maclean Moore are working with our global consultancy client to find an experience IAM Specialist is responsible for delivering global identityandaccessmanagement services and the associated governance within a well know car manufacturing client. Key responsibilities: Provide consultancy on IAM Best Practices … or potentially from monitoring systems. Key skills/knowledge/experience: Significant prior experience as a subject matter expert within IdentityandAccessManagement, in particular deep technical knowledge of identitymanagement within a Microsoft Environment (Windows Operating Systems & Active … Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of IdentityandAccessManagement governance principles and best practices and experience in managing information security risk relating to identity. Knowledge of SAML/OAUTH protocols Experience of working andmore »
tasks and configurations plus generating custom reports via PowerShell/Azure CLI Experience in design, implementation and operational support of IdentityandAccessManagement solutions, tools, technologies and processes. Experience with Microsoft Azure Active Directory. Proficiency in Enterprise Application creation and maintenance, Application Registration … with internal and external SaaS applications. Prior experience with B2B setup, configuration and support. Subject matter expert in setting up and implementation federation, accessmanagement, authentication, access control … and service provisioning. Serve as a subject matter expert in the design, implementation, operation, and administration of the organization's identityandaccessmanagement program, including federation, accessmanagement, authentication, access control, and service provisioning. Implement and manage more »
is part of an Active Directory assessment project, where you will be responsible for designing the future state OT environment, specifically focusing on identitymanagement, such as JML and PAM. Key … Responsibilities Conduct a thorough Active Directory assessment to understand the current state of the environment Design and implement solutions for identityandaccessmanagement Collaborate with cross-functional teams to ensure successful integration of the future state OT environment Provide expertise in Active Directory … JML, and other identitymanagement tools Job Requirements Significant experience in Active Directory andidentitymanagement Knowledge of JML and other related tools Understanding of access control and security best practices Ability to work in a fast-paced, collaborative environment more »
to identity processes, procedure and infrastructure. Assesses current applications and architecture to ensure current implementations align with industry guidelines, best practices andmanagement approved standards. Architects plans for implementing management's directives in most secure manners with least disruption. Excellent understanding of IdentityAccessmanagement Experience working with CyberArk … Okta. Key Skills/requirements 4 years of dedicated identityaccessmanagement experience. 3 years Designing and implementing identity solutions. Intermediate to advanced knowledge of identity technologies and concepts. Intermediate to advanced knowledge of Active Directory, Single-Sign On (SSO more »
Role: IdAM/NetIQ Senior Engineer Location: Onsite in Farnborough Rate: circa £750 per day inside ir35 We are looking for an experienced DV cleared IdAM/NetIQ Senior Engineer to join our client replacing a large complex Enterprise infrastructure. You will possess strong technical skills as well as being … design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identityandaccessmanagement (IAM) architectural standards, guidelines, and best practices. + Design and implement NetIQ Identity Manager (IDM) solutions to manage … Manager + Privileged AccessManagement (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (url removed) CBSbutler is acting as an employment business for this role. more »
East London, London, United Kingdom Hybrid / WFH Options
RiverSafe Ltd
Lead security remediation efforts following audits against an identified list and extend this list as suitable to provide a rounded security posture. Privilege Management: Strategically manage and reduce standing privileges to minimise risks and ensure compliance with industry best practices and regulatory requirements. Attack Surface Reduction: Identify vulnerabilities … and Compliance: Formulate and document/diagram process and enforce policies for access control, identitymanagementand device management based on Microsoft security protocols and tools. Skills Minimum of 5 years of experience in a security engineering role with a focus on … Microsoft technologies, including Active Directory, Entra, Intune and Autopilot. Expertise in Microsoft Active Directory, Microsoft Entra & Conditional Access Policies, Azure Key Vault and Microsoft Certificate Authority. Experience with Bloodhound/Pingcastle/Azurehound or similar testing tools. CIS SecureSuite and application of CIS Benchmarks across the enterprise. Microsoft more »
Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: IdentityAccessManagement (IAM) User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop IdentityandAccessManagement solution; including feeding into Service * Working with test and pen testers to set appropriate scopes including planning, report writing, remediation more »
Manager Rolling contract Inside IR35 Remote One of our leading Banking clients are recruiting for a Programme Manager with experience of working within the IDAM Cyber Security space with experience of Risk and Auditing. This is a rolling contract and offers remote working opportunities. Role Purpose: Project & Programme Management … global, and may cross multiple GB/GFs . Specifically, the role will be responsible for planning, coordination, governance, oversight and delivery of the IDAM Path to Effective Plan. This encompasses all aspects … of IDAM controls! Knowledge & Experience/Qualifications for the role Knowledge of Risk Management Framework, with understanding of IdentityandAccessmanagement controls would be preferred. Excellent understanding of the project & programme lifecycle. Excellent understanding of Risk Based Project Managementmore »
DAY INSIDE IR35 LENGTH: 6 MONTHS Key skills/knowledge/experience: (Up to 10, Avoid repetition) Strongknowledge of cryptographic concepts, HSMs, key management Hands-on experience in implementing and operating Thales Safenet HSMs Hands-on experience in designing and implementing key management solutions for enterprises. … and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmanagement Experience working on PKI/key management solutions for connected vehicle systems If you are interested more »
OT/ICS Systems Security: Proven experience in securing Operational Technology and Industrial Control Systems (e.g., SCADA, HMI, PLC). IdentityandAccessManagement: In-depth knowledge of identityandaccess management. Threat Mitigation: Familiar with common cybersecurity threats andmore »
. * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identityandaccessmanagement, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber … controls and standards to both business and security solutions in order to maintain or increase the Bank's security posture. * Knowledge of risk management processes (e.g. methods for assessing and mitigating risk). * Skill in designing countermeasures to identified security risks. * Knowledge of cybersecurity and privacy principles andmore »
Cloud Security Engineer - Contract (Outside IR35) London (Hybrid) - Up to £500p/day We are seeking an experienced Cloud Security Engineer skilled in identityandaccess management. Your responsibilities will encompass the design, implementation, andmanagement of cloud security solutions. You'll also be … dealing directly with their internal security and cloud teams to guarantee secure identitymanagement across multiple platforms, including Active Directory, Entra ID, and GCP. Responsibilities: Develop automation scripts and tools for IAM tasks using Go or Kotlin. Automate infrastructure using IaC tools (Terraform experience is a … Kubernetes, and vulnerability scanning tools is a plus). Qualifications: More than 5 years of experience in Cloud Security, with a focus on identityand security. Strong proficiency in programming with Go or Kotlin. Hands-on experience with Azure AD/Entra ID and SCIM provisioning. more »
SailPoint Consultant - Migration 6 months Remote/London - 2 days a week on-site £Negotiable - INSIDE IR35 - Experience in IdentityandAccessManagement - SailPoint IIQ experience - Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations … Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena more »
ideal candidate will possess a broad range of security knowledge and best practices across multiple security domains, including network security, identityandaccessmanagement, data protection, application security, and endpoint security. Experience in securing the delivery of IT change initiatives is essential, with additional more »
deliverable. You will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
initiatives programme. Will have a broad range of security knowledge and best practice across multiple security domains including network security, identityandaccessmanagement, data protection, application security and endpoint security. As well as experience in securing the delivery of IT change initiatives, an more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols andaccess control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents. General connectivity/network issue management/service management experience Networking People (UK) is acting as an Employment Business in relation to this vacancy. more »
Employment Type: Contract, Work From Home
Rate: £600 - £680 per day + Deemed Inside IR35 determination
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols andaccess control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. more »
Employment Type: Contract, Work From Home
Rate: £600 - £680 per day + Deemed Inside IR35 determination
SIEM, EDR, XDR and CMDBs. Develop and deliver secure system profiles and maintain a view of compliance. Assist the development of granular Asset Management tooling and processes and employ such mechanisms to maintain granular visibility of the estate. Where and when appropriate you may be expected to support … on premise infrastructure. Network security design and technologies. Experience securing OT/ICS systems (SCADA, HMI, PLC, etc.). Experience and knowledge of identityandaccess management. Knowledge of common cyber security threats and application of countermeasures. Good knowledge of Tactics, Techniques and Procedures (TTP) e.g. more »