At Amazon Web Services IdentityandAccessManagement (AWS IAM) we build, operate, and innovate the identitymanagement, authentication, and authorization stack for the AWS cloud. Our mission is to push the technical boundaries to enable AWS customers to run … of this mission, we Think Big and Dive Deep as we leverage technology to give customers state-of-the-art controls to manage access across all their AWS environments. At IAM, we operate one of the … largest distributed systems in the world, which processes tens of millions of transactions per second. With the growth of AWS, the customer workloads andaccess patterns keep evolving, demanding the next order of magnitude scalability. We are looking for a strong Senior Software Engineers to join the team more »
and resources. We also facilitate automated monitoring, fail-over and recovery, along with automated patching, updates and replication. As part of the AWS Identity organization, we are pioneers in areas such as identity, accessmanagement, security and providing massively scaled, distributed platform … build the most secure, reliable, scalable and performant authentication and authorization platform on the planet, which enables every AWS customer to have secure access to their resources. We are building some of the largest and most complex distributed systems in the world, and we need passionate engineers like … at least one software programming language PREFERRED QUALIFICATIONS - 3+ years of full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations experience - Bachelor's degree in computer science or equivalent Amazon is committed to a diverse and inclusive workplace. Amazon more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
and more reliably. To achieve this, you will champion the adoption of an Agile approach to data and information delivery, streamlining data and information management for security, cost-effectiveness, scalability, and reliability. Additionally, you will foster an environment of shared ownership through enhanced collaboration and communication within engineering … efficiency and data and information security within the context of GDPR, CISSP, NIST, ISO 27001, Zero Trust Architecture, Information Security, IdentityandAccessManagement, locally and internationally Develop, maintain, and oversee data principles, standards, policies, and procedures to ensure secure, high-quality data, and … for: Demonstrable experience within a similar role with a successful track record of implementing data practices Possess strong knowledge of data tools, data management tools, and various data and information technologies. E.g. DAMA DMBOK, Microsoft SQL Server, Couchbase, Apache Druid, Spark, Kafka, Airflow, etc In-depth understanding of more »
DAY INSIDE IR35 LENGTH: 6 MONTHS Key skills/knowledge/experience: (Up to 10, Avoid repetition) Strongknowledge of cryptographic concepts, HSMs, key management Hands-on experience in implementing and operating Thales Safenet HSMs Hands-on experience in designing and implementing key management solutions for enterprises. … and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies andIdentity & accessmanagement Experience working on PKI/key management solutions for connected vehicle systems If you are interested more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in … Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identityandaccessmanagement (IAM) principles and best practices. Strong understanding of information protection and data security. Benefits: Competitive salary package. Opportunity to work more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability managementand defence against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
Our client, a leading organisation, is seeking an exceptional IdentityAccessManagement (IAM) Consultant to join their innovative team. As a trusted recruitment partner, we are assisting them in finding the perfect candidate who can bring extensive knowledge and hands-on experience in designing … solutions within the Azure environment Conducting IAM assessments, identifying gaps, and providing recommendations for improvement Developing and maintaining IAM frameworks, including role-based access control (RBAC) and attribute-based access control (ABAC) Implementing single sign-on (SSO) and multi-factor authentication (MFA) solutions Ensuring compliance with … Google Cloud) and their IAM services Expertise in implementing and configuring IAM solutions such as Okta, OneLogin, Azure AD/Entra, Knowledge of identity federation protocols (SAML, OAuth, OpenID Connect) Familiarity with security standards and frameworks (ISO 27001, NIST, CIS) Excellent problem-solving and analytical skills Strong communication more »
site 4-5 days a week Job Description: "Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building Certificate Management services, Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI), use of On and off-line root certificate authority (CA) service as … OSCP,cert validation points - IdentityAccessManagement (IAM) experience including; User and Group Management, Security andAccess Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. - Defining Group Policy and secure user more »
for project delivery, where you will specialise in network security. Requirements: CCNA/CCNP/CISSP or equivalent. Palo Alto (PCNSA/PCNSE) Identity & AccessManagement: Cisco ISE, Aruba ClearPass policy manager Knowledge of Cloud deployments such as (Azure/AWS/GCP) Strong more »
practices for cloud-based applications. Monitor cloud infrastructure and services, proactively identifying and resolving issues to ensure optimal performance. Manage identityandaccessmanagement in Azure, including Azure Active Directory and role-based access control (RBAC). Implement security policies, firewalls, andmore »
DV Cleared NetiQ Engineer - Farnborough - ASAP Start - 6 months Rolling Contract iO Associates are currently looking for a DV Cleared IdAM/NetiQ Senior Engineer for a 6 month rolling contract based in Farnborough offering £775 a day (inside IR35). You must hold active DV Clearance and be a … join this programme of work - unfortunately, you can't be a dual national. We're looking for candidates with the following experience: NetIQ Access Manager (NAM) NetIQ Advanced Authentication Tiered Access Model Concepts Desirable skills: Privileged AccessManagement (PAM) Identitymore »
My1Login is the UK’s leading, multi-award-winning IdentityandAccessManagement service that enables seamless workforce access to web, mobile and legacy desktop applications delivering operational savings and protecting businesses against the financial and reputational damage of a data breach. … This is a management position and it is envisaged the role would appeal to an experienced individual seeking to work in the dynamic environment of a rapidly growing technology business. You will be responsible for achieving successful business and user outcomes for My1Login’s customers that maximise user more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
York. Some key experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced more »
technical challenges. Compliance and Security: Ensure designs adhere to data practices, regulatory standards, and security frameworks relevant to highly secure government systems. Requirements Management: Identify and capture non-functional requirements and integrate them into technical designs. Standards Development: Shape and evolve technical standards and principles related to cloud … highly secure on-premise IT infrastructure. Technical Expertise: Experience with technologies such as VMware, VxRail, Networks, SIEM, AntiVirus, PKI/HSM, Cross Domain Gateways, IDAM/RBAC/ABAC/MFA, Windows Technologies, High Grade Crypto. Design Principles: Knowledge of Secure by Design and Zero Trust Principles is beneficial. Defence more »
Identity & AccessManagement Analyst/IAM Analyst A fantastic opportunity has arisen for an Identity & AccessManagement Analyst/IAM Analyst to join our Manchester based client on a permanent basis. Identity & AccessManagement Analyst/IAM Analyst Summary: This role will help to support the operational Identity & AccessManagement activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic change projects as … and grows. Identity & AccessManagement Analyst/IAM Analyst Key Responsibilities: • Deliver the BAU IdentityandAccessManagement function through the Joiners, Movers and Leavers process in line with established operational processes • Work as a key point of more »
technologies, industry leading best practices, and the promotion of a cybersecurity ownership culture across the company. Strong PKI/certificate managementandidentity security are vital to the security and operational resilience of Pfizer and critical to zero trust enablement. The Senior Manager of Zero Trust … requires subject matter expertise across the broad domain of zero trust enablement with hands-on expertise in delivering PKI, certificate managementandidentity security solutions, at massive scale, across cloud, on-premise and SaaS environments.Strong business communication skills are required to influence senior business leaders at … solutions and meet rigorous deadlines through project managementand team leadership.Familiarity with compliance frameworks and regulations related to identityandaccessmanagementand certificates (e.g., GDPR, HIPAA, NIST).Strong leadership skills with proven ability to develop talent and build bench strength in more »
data analytics solutions • Providing expertise and support across the enterprise information framework, including data intake, data transformation, data quality, metadata and master data management, data virtualisation, data governance, data lineage, data services, data security and data lakes.• Lead technology consulting engagements, solution workshops and due diligence • Work closely … maintaining enterprise data models for analytics using dimensional, star, snowflake or data vault methodologies. • Proficient in implementing and maintaining Master and Reference Data Management to ensure data accuracy and integrity across the organisation. • Comprehensive expertise in programming languages and tools for data preparation, analysis and reporting • At least …/Powerautomate/PowerBI) • Azure cloud ETL toolset, including Azure SQL Server, Azure Data Factory, Datalake. • Cloud infrastructure including Microsoft Azure Cloud infrastructure, Identity & AccessManagement, data stores connections, cloud functions concepts.• Familiar with Big Data infrastructures, including file-based and in-memory big more »
happening in tech. The main responsibility of the Senior/Lead DevOps Engineers will be to manage the creation, enhancement, deployment, continuous upkeep, andmanagement of our clients AWS framework and related systems. In addition, they will provide technical guidance to junior team members, serve as the team … DevSecOps and collaboration with Information Security (InfoSec) teams to deploy secure solutions, utilizing Role-Based Access Control (RBAC), IdentityandAccessManagement (IAM), Cloud Security protocols, and third-party security tools like AquaSec. Ability to self-manage development projects, tasks, and time more »
other DevOps practices for cloud-based applications.Monitor cloud infrastructure and services, proactively identifying and resolving issues to ensure optimal performance.Manage identityandaccessmanagement in Azure, including Azure Active Directory and role-based access control (RBAC).Implement security policies, firewalls, and network more »
Role: IdAM/NetIQ Senior Engineer Location: Onsite in Farnborough Rate: circa £750 per day inside ir35 We are looking for an experienced DV cleared IdAM/NetIQ Senior Engineer to join our client replacing a large complex Enterprise infrastructure. You will possess strong technical skills as well as being … design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identityandaccessmanagement (IAM) architectural standards, guidelines, and best practices. + Design and implement NetIQ Identity Manager (IDM) solutions to manage … Manager + Privileged AccessManagement (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (url removed) CBSbutler is acting as an employment business for this role. more »
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged accessmanagement tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create … documentation that enables the business to use the cloud securely Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & AccessManagement, Privileged AccessManagement (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into the Lead Cyber Security Engineer, you will have plenty of opportunity to learn and test and advance your skills across a range of projects. To be considered you must have a cyber more »