Role: Sailpoint SME Location: London Duration: 6 months Key essential skills: 5+ years of experience in Identity and Access Management 4+ years of SailPoint IIQ experience Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations Expertise working with SailPoint Identity IQ platform - Access Lifecycle Management, Certifications, Role Management VS Code, SQL Management Studio, Jira, Git. Programming languages: Java, Python, SQL Server 2022. Databases: MSSQL, Oracle. Cloud Technology: Azure QA duties: usability, performance & automated testing, test scripts, cases and plans. Expertise in onboarding applications with various connectors like Active Directory, JDBC, SCIM 2.0, Azure Active Directory Expertise developing APIs (SCIM, REST) leveraging Java based development Experience of Privileged Access Management concepts and use cases. Desirable skills: Experience with SSO & MFA products like PingFederate, OKTA, ForgeRock, CyberArk, Delinea is a plus Excellent verbal and written communication skills Degree qualified in Computer Science or a related field CISSP, or other industry recognized security certification(s) are preferred. Overview: We are seeking an experienced professional to join our team as an additional resource for our SailPoint upgrade project. The ideal candidate will have a strong background in Identity and Access Management (IAM), with significant experience specifically in SailPoint Identity IQ (IIQ) platform upgrades and migrations. Role & Responsibilities: Lead and support SailPoint Identity IQ platform version upgrades, particularly from v8 to v8.3/8.4, ensuring smooth transitions and minimal disruptions to operations. Utilize expertise in SailPoint Identity IQ platform to manage Access Lifecycle, Certifications, and Role Management processes effectively. Onboard applications using various connectors including but not limited to Active Directory, JDBC, SCIM 2.0, and Azure Active Directory. Develop APIs leveraging Java-based development, particularly SCIM and REST APIs. Demonstrate understanding and experience with Privileged Access Management (PAM) concepts and use cases. Collaborate with the team to ensure compatibility and integration of IAM solutions with other systems and platforms. Stay updated with industry best practices and emerging technologies related to IAM and SailPoin Outline Thebes Group: Thebes Group is a leading UK wide IT infrastructure technology consultancy. We are well-known for our extensive talent pool of highly competent IT professionals and exclusive Academy programmes, which provide a great opportunity to undertake technical training in core disciplines. Thebes work with a number of leading vendors, Government, financial institutions and insurance companies including investment banks, brokers and hedge funds. Thebes does IT solutions & services differently from most other IT service providers. As an Assured Outcome Provider (AOP) we have spent fifteen years willingly sharing the client's risk with them by focusing on outputs (ie quality service & solutions and ROI) rather than inputs (ie pricelists and headcount). We do this by fitting our skills, solutions & capabilities to needs, augmenting our staff with enthusiastic professionals from our Academy programme and remaining flexible as our clients needs change.
26/04/2024
Project-based
Role: Sailpoint SME Location: London Duration: 6 months Key essential skills: 5+ years of experience in Identity and Access Management 4+ years of SailPoint IIQ experience Experience in SailPoint Identity IQ platform version upgrades (ideally v8 to v8.3/8.4) and migrations Expertise working with SailPoint Identity IQ platform - Access Lifecycle Management, Certifications, Role Management VS Code, SQL Management Studio, Jira, Git. Programming languages: Java, Python, SQL Server 2022. Databases: MSSQL, Oracle. Cloud Technology: Azure QA duties: usability, performance & automated testing, test scripts, cases and plans. Expertise in onboarding applications with various connectors like Active Directory, JDBC, SCIM 2.0, Azure Active Directory Expertise developing APIs (SCIM, REST) leveraging Java based development Experience of Privileged Access Management concepts and use cases. Desirable skills: Experience with SSO & MFA products like PingFederate, OKTA, ForgeRock, CyberArk, Delinea is a plus Excellent verbal and written communication skills Degree qualified in Computer Science or a related field CISSP, or other industry recognized security certification(s) are preferred. Overview: We are seeking an experienced professional to join our team as an additional resource for our SailPoint upgrade project. The ideal candidate will have a strong background in Identity and Access Management (IAM), with significant experience specifically in SailPoint Identity IQ (IIQ) platform upgrades and migrations. Role & Responsibilities: Lead and support SailPoint Identity IQ platform version upgrades, particularly from v8 to v8.3/8.4, ensuring smooth transitions and minimal disruptions to operations. Utilize expertise in SailPoint Identity IQ platform to manage Access Lifecycle, Certifications, and Role Management processes effectively. Onboard applications using various connectors including but not limited to Active Directory, JDBC, SCIM 2.0, and Azure Active Directory. Develop APIs leveraging Java-based development, particularly SCIM and REST APIs. Demonstrate understanding and experience with Privileged Access Management (PAM) concepts and use cases. Collaborate with the team to ensure compatibility and integration of IAM solutions with other systems and platforms. Stay updated with industry best practices and emerging technologies related to IAM and SailPoin Outline Thebes Group: Thebes Group is a leading UK wide IT infrastructure technology consultancy. We are well-known for our extensive talent pool of highly competent IT professionals and exclusive Academy programmes, which provide a great opportunity to undertake technical training in core disciplines. Thebes work with a number of leading vendors, Government, financial institutions and insurance companies including investment banks, brokers and hedge funds. Thebes does IT solutions & services differently from most other IT service providers. As an Assured Outcome Provider (AOP) we have spent fifteen years willingly sharing the client's risk with them by focusing on outputs (ie quality service & solutions and ROI) rather than inputs (ie pricelists and headcount). We do this by fitting our skills, solutions & capabilities to needs, augmenting our staff with enthusiastic professionals from our Academy programme and remaining flexible as our clients needs change.
Role: IdAM/NetIQ Senior Engineer Location: Onsite in Farnborough Rate: circa £750 per day inside ir35 We are looking for an experienced DV cleared IdAM/NetIQ Senior Engineer to join our client replacing a large complex Enterprise infrastructure. You will possess strong technical skills as well as being able to demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identity and access management (IAM) architectural standards, guidelines, and best practices. + Design and implement NetIQ Identity Manager (IDM) solutions to manage user identities, access rights, and provisioning processes. + Lead the deployment and configuration of NetIQ Identity Manager (IDM) to automate user provisioning, de-provisioning, and synchronization processes. Key Skills + NetIQ Identity Manager + Privileged Access Management (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (see below) CBSbutler is acting as an employment business for this role.
26/04/2024
Project-based
Role: IdAM/NetIQ Senior Engineer Location: Onsite in Farnborough Rate: circa £750 per day inside ir35 We are looking for an experienced DV cleared IdAM/NetIQ Senior Engineer to join our client replacing a large complex Enterprise infrastructure. You will possess strong technical skills as well as being able to demonstrate the ability to design, implement, and maintain identity, access, and privilege management. Role and Responsibilities + Develop and maintain identity and access management (IAM) architectural standards, guidelines, and best practices. + Design and implement NetIQ Identity Manager (IDM) solutions to manage user identities, access rights, and provisioning processes. + Lead the deployment and configuration of NetIQ Identity Manager (IDM) to automate user provisioning, de-provisioning, and synchronization processes. Key Skills + NetIQ Identity Manager + Privileged Access Management (PAM) + Identity Governance and Administration If you are interested in discussing this IdAM/NetIQ Senior Engineerrole further, please send your updated CV to (see below) CBSbutler is acting as an employment business for this role.
NetIQ Access Manager - DV Cleared - Farnborough (Full-time onsite) - £775p/d (Inside of IR35) - 6 months Our major Public Sector client is now looking to replace their complex Legacy enterprise infrastructure and are looking for a NetIQ Access Manager to support this. The NetIQ Access Manager will be responsible for designing, implementing and leading the deployment and configuration of NetIQ Identity Manager solutions. The ideal NetIQ Access Manager will have the following skills/experience: Holds Active DV Clearance Proven Experience with NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication and IdAM Previously designed, implemented, and maintained identity, access and privilege management. Ideally, familiar with Tiered access model, zero trust, least privilege access, Single Sign-On and Multi Factor Authentication are highly desirable. This is a DV-cleared role and would require you onsite 5 days onsite at their office in Farnborough. If you're an experienced NetIQ Access Manager with active DV-Clearance looking for an exciting new opportunity working at a leading public sector client, please apply!
26/04/2024
Project-based
NetIQ Access Manager - DV Cleared - Farnborough (Full-time onsite) - £775p/d (Inside of IR35) - 6 months Our major Public Sector client is now looking to replace their complex Legacy enterprise infrastructure and are looking for a NetIQ Access Manager to support this. The NetIQ Access Manager will be responsible for designing, implementing and leading the deployment and configuration of NetIQ Identity Manager solutions. The ideal NetIQ Access Manager will have the following skills/experience: Holds Active DV Clearance Proven Experience with NetIQ, NetIQ Access Manager (NAM), NetIQ Advanced Authentication and IdAM Previously designed, implemented, and maintained identity, access and privilege management. Ideally, familiar with Tiered access model, zero trust, least privilege access, Single Sign-On and Multi Factor Authentication are highly desirable. This is a DV-cleared role and would require you onsite 5 days onsite at their office in Farnborough. If you're an experienced NetIQ Access Manager with active DV-Clearance looking for an exciting new opportunity working at a leading public sector client, please apply!
Job Title: CyberArk Specialist Contract Duration: 65 Days - Inside IR35 Start Date: ASAP Security Clearance: Must have SC Clearance Day Rate: £500 per day Role Summary: The CyberArk Specialist will join the CyberArk delivery team to deploy the core CyberArk Privileged Access Security (PAS) solution into a public sector client. This role involves the installation, configuration, testing, and account onboarding of the CyberArk core PAS across Windows and RHEL target applications and Servers. The specialist will provide technical expertise related to the CyberArk PAS suite within on-premise, AWS, and Azure environments. CyberArk Components: Enterprise Password Vault (EPV) Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM) HTML5 Gateway (H5G) Privileged Threat Analytics Essential Responsibilities and Requirements: Demonstrated hands-on experience with CyberArk's Privileged Identity and Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR). Proven experience in extending existing CyberArk technologies and practices, providing recommendations to optimize or enhance BAU services. Strong knowledge of PAM processes, procedures, and onboarding of accounts into a PAM solution, ideally CyberArk. Required Experience & Qualifications: Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and Middleware technologies. Understanding of Active Directory structures, Identity Management policies, and processes. Knowledge of PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience in facilitating business process design related to managing identities and access privileges. Previous role as a BAU Support Engineer for a PAM solution, preferably CyberArk. Key Skills and Behaviours: Flexible approach with the ability to work cooperatively in a team environment. Self-starter with the ability to perform quality assurance and control, ensuring technical deliverables are error-free. Experience in supporting large, complex technical environments. Methodical and structured approach to tasks. Ability to organize and prioritize tasks effectively. Strong interpersonal skills to establish and maintain relationships and interact with team members. Excellent organization and time management skills. Strong analytical and problem-solving skills.
26/04/2024
Project-based
Job Title: CyberArk Specialist Contract Duration: 65 Days - Inside IR35 Start Date: ASAP Security Clearance: Must have SC Clearance Day Rate: £500 per day Role Summary: The CyberArk Specialist will join the CyberArk delivery team to deploy the core CyberArk Privileged Access Security (PAS) solution into a public sector client. This role involves the installation, configuration, testing, and account onboarding of the CyberArk core PAS across Windows and RHEL target applications and Servers. The specialist will provide technical expertise related to the CyberArk PAS suite within on-premise, AWS, and Azure environments. CyberArk Components: Enterprise Password Vault (EPV) Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM) HTML5 Gateway (H5G) Privileged Threat Analytics Essential Responsibilities and Requirements: Demonstrated hands-on experience with CyberArk's Privileged Identity and Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR). Proven experience in extending existing CyberArk technologies and practices, providing recommendations to optimize or enhance BAU services. Strong knowledge of PAM processes, procedures, and onboarding of accounts into a PAM solution, ideally CyberArk. Required Experience & Qualifications: Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux, and Middleware technologies. Understanding of Active Directory structures, Identity Management policies, and processes. Knowledge of PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience in facilitating business process design related to managing identities and access privileges. Previous role as a BAU Support Engineer for a PAM solution, preferably CyberArk. Key Skills and Behaviours: Flexible approach with the ability to work cooperatively in a team environment. Self-starter with the ability to perform quality assurance and control, ensuring technical deliverables are error-free. Experience in supporting large, complex technical environments. Methodical and structured approach to tasks. Ability to organize and prioritize tasks effectively. Strong interpersonal skills to establish and maintain relationships and interact with team members. Excellent organization and time management skills. Strong analytical and problem-solving skills.
IAM Berater/Consultant - "One Identity" 40-60% Hintergrund: Für unseren renommierten Kunden im Finanzsektor suchen wir einen Consultant, der initiale Kenntnisse im Umgang mit dem Tool "One Identity" mitbringt. Diese Position bietet die Möglichkeit, in einem dynamischen Umfeld mit einem fokussierten Team zusammenzuarbeiten und wesentliche Beiträge zur Optimierung von Identity- und Access-Management-Prozessen zu leisten. Hauptaufgaben: Implementierung und Verwaltung des Tools "One Identity" Analyse und Optimierung bestehender Identity- und Access-Management-Prozesse Zusammenarbeit mit internen Teams zur Gewährleistung der Sicherheit und Effizienz Unterstützung bei der Fehlerbehebung und Support im Zusammenhang mit "One Identity" Anforderungen: Erfahrung im Umgang mit dem Tool "One Identity" Erfahrung im Finanzsektor (Banken, Versicherungen oder Treuhand) Starke analytische Fähigkeiten und Problemlösungskompetenz Ausgezeichnete Kommunikationsfähigkeiten und Teamfähigkeit Sprachen: Deutsch fliessend (Niveau C1 - C2) Englisch von Vorteil Referenznr.: 923395FC Rolle: IAM-Berater/Consultant - One Identity Einsatzort: Zürich und Region Pensum: 40 - 60% Remote Anteil: Vorwiegend Remote mit einzelnen Tagen Vorort Start Datum: 01.01.2025 Ende Datum: 31.12.2025 (Option auf Verlängerung) Sollte diese Position Ihr Interesse geweckt haben, senden Sie uns bitte Ihr komplettes Dossier via den Link in dieser Anzeige. Über uns: ITech Consult ist ein nach ISO 9001:2015 zertifiziertes Schweizer Unternehmen mit Niederlassungen in Deutschland und Irland. ITech Consult ist spezialisiert auf die Vermittlung von IT-Kandidaten für Auftragsarbeiten. Wir wurden 1997 von IT-Profis gegründet und wissen daher, wie wichtig die professionelle Unterstützung bei der Projektsuche und -arbeit ist.
25/04/2024
Full time
IAM Berater/Consultant - "One Identity" 40-60% Hintergrund: Für unseren renommierten Kunden im Finanzsektor suchen wir einen Consultant, der initiale Kenntnisse im Umgang mit dem Tool "One Identity" mitbringt. Diese Position bietet die Möglichkeit, in einem dynamischen Umfeld mit einem fokussierten Team zusammenzuarbeiten und wesentliche Beiträge zur Optimierung von Identity- und Access-Management-Prozessen zu leisten. Hauptaufgaben: Implementierung und Verwaltung des Tools "One Identity" Analyse und Optimierung bestehender Identity- und Access-Management-Prozesse Zusammenarbeit mit internen Teams zur Gewährleistung der Sicherheit und Effizienz Unterstützung bei der Fehlerbehebung und Support im Zusammenhang mit "One Identity" Anforderungen: Erfahrung im Umgang mit dem Tool "One Identity" Erfahrung im Finanzsektor (Banken, Versicherungen oder Treuhand) Starke analytische Fähigkeiten und Problemlösungskompetenz Ausgezeichnete Kommunikationsfähigkeiten und Teamfähigkeit Sprachen: Deutsch fliessend (Niveau C1 - C2) Englisch von Vorteil Referenznr.: 923395FC Rolle: IAM-Berater/Consultant - One Identity Einsatzort: Zürich und Region Pensum: 40 - 60% Remote Anteil: Vorwiegend Remote mit einzelnen Tagen Vorort Start Datum: 01.01.2025 Ende Datum: 31.12.2025 (Option auf Verlängerung) Sollte diese Position Ihr Interesse geweckt haben, senden Sie uns bitte Ihr komplettes Dossier via den Link in dieser Anzeige. Über uns: ITech Consult ist ein nach ISO 9001:2015 zertifiziertes Schweizer Unternehmen mit Niederlassungen in Deutschland und Irland. ITech Consult ist spezialisiert auf die Vermittlung von IT-Kandidaten für Auftragsarbeiten. Wir wurden 1997 von IT-Profis gegründet und wissen daher, wie wichtig die professionelle Unterstützung bei der Projektsuche und -arbeit ist.
Senior IAM Entwickler - "One Identity" 40-60% Hintergrund: Für ein renommiertes Projekt bei einem unserer führenden Kunden im Finanzsektor suchen wir einen erfahrenen Senior Developer mit Spezialisierung auf "One Identity" Lösungen. Diese Position bietet die Möglichkeit, in einem dynamischen Team an sicherheitskritischen Identitäts- und Zugriffsmanagementprojekten zu arbeiten. Hauptaufgaben: Entwicklung und Implementierung von IAM-Lösungen unter Verwendung von "One Identity". Analyse und Integration komplexer Systeme im Bereich Identity & Access Management. Optimierung und Weiterentwicklung bestehender IAM-Infrastrukturen. Zusammenarbeit mit internen und externen Stakeholdern zur Sicherstellung der Projektziele. Dokumentation und Reporting gemäss den industriellen und internen Standards. Anforderungen: Fundierte Erfahrung in der Entwicklung von IAM-Lösungen. Nachweisbare Projekterfahrung mit "One Identity". Praxiserfahrung im Banking Umfeld Teamfähigkeit und ausgeprägte Problemlösungskompetenzen. Erfahrung im Umgang mit komplexen IT-Systemlandschaften. Sprachen: Deutsch fliessend (Niveau C1 - C2) Englisch von Vorteil Referenznr.: 923394FC Rolle: Senior IAM-Entwicker- One Identity Einsatzort: Zürich und Region Pensum: 40 - 60% Remote Anteil: Fast ausschliesslich Remote mit einzelnen Tagen Vorort Start Datum: 01.01.2025 Ende Datum: 31.12.2025 (Option auf Verlängerung) Sollte diese Position Ihr Interesse geweckt haben, senden Sie uns bitte Ihr komplettes Dossier via den Link in dieser Anzeige. Über uns: ITech Consult ist ein nach ISO 9001:2015 zertifiziertes Schweizer Unternehmen mit Niederlassungen in Deutschland und Irland. ITech Consult ist spezialisiert auf die Vermittlung von IT-Kandidaten für Auftragsarbeiten. Wir wurden 1997 von IT-Profis gegründet und wissen daher, wie wichtig die professionelle Unterstützung bei der Projektsuche und -arbeit ist.
25/04/2024
Project-based
Senior IAM Entwickler - "One Identity" 40-60% Hintergrund: Für ein renommiertes Projekt bei einem unserer führenden Kunden im Finanzsektor suchen wir einen erfahrenen Senior Developer mit Spezialisierung auf "One Identity" Lösungen. Diese Position bietet die Möglichkeit, in einem dynamischen Team an sicherheitskritischen Identitäts- und Zugriffsmanagementprojekten zu arbeiten. Hauptaufgaben: Entwicklung und Implementierung von IAM-Lösungen unter Verwendung von "One Identity". Analyse und Integration komplexer Systeme im Bereich Identity & Access Management. Optimierung und Weiterentwicklung bestehender IAM-Infrastrukturen. Zusammenarbeit mit internen und externen Stakeholdern zur Sicherstellung der Projektziele. Dokumentation und Reporting gemäss den industriellen und internen Standards. Anforderungen: Fundierte Erfahrung in der Entwicklung von IAM-Lösungen. Nachweisbare Projekterfahrung mit "One Identity". Praxiserfahrung im Banking Umfeld Teamfähigkeit und ausgeprägte Problemlösungskompetenzen. Erfahrung im Umgang mit komplexen IT-Systemlandschaften. Sprachen: Deutsch fliessend (Niveau C1 - C2) Englisch von Vorteil Referenznr.: 923394FC Rolle: Senior IAM-Entwicker- One Identity Einsatzort: Zürich und Region Pensum: 40 - 60% Remote Anteil: Fast ausschliesslich Remote mit einzelnen Tagen Vorort Start Datum: 01.01.2025 Ende Datum: 31.12.2025 (Option auf Verlängerung) Sollte diese Position Ihr Interesse geweckt haben, senden Sie uns bitte Ihr komplettes Dossier via den Link in dieser Anzeige. Über uns: ITech Consult ist ein nach ISO 9001:2015 zertifiziertes Schweizer Unternehmen mit Niederlassungen in Deutschland und Irland. ITech Consult ist spezialisiert auf die Vermittlung von IT-Kandidaten für Auftragsarbeiten. Wir wurden 1997 von IT-Profis gegründet und wissen daher, wie wichtig die professionelle Unterstützung bei der Projektsuche und -arbeit ist.
Alexander Ash are currently working with a global conglomerate firm who are looking for an IAM Analyst to join their multi-disciplinary team. Within the organisation you will be responsible for ensuring all Systems/Applications under the framework of IAM are administered in compliance with Information Security Minimum Standard requirement. This is an exciting opportunity for any IAM Analyst who is dedicated and will seek to identify improvements and efficiency's, while utilising new technologies and existing tools as the organisation takes on one of it's biggest bodies of work. Responsibilities Project work for the IAM function development Document support - New process documentation Being a main point of contact for any related issues User Access reviews
24/04/2024
Project-based
Alexander Ash are currently working with a global conglomerate firm who are looking for an IAM Analyst to join their multi-disciplinary team. Within the organisation you will be responsible for ensuring all Systems/Applications under the framework of IAM are administered in compliance with Information Security Minimum Standard requirement. This is an exciting opportunity for any IAM Analyst who is dedicated and will seek to identify improvements and efficiency's, while utilising new technologies and existing tools as the organisation takes on one of it's biggest bodies of work. Responsibilities Project work for the IAM function development Document support - New process documentation Being a main point of contact for any related issues User Access reviews
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
24/04/2024
Full time
Job: Security Architect Location: Reading, UK, Hybrid Job Type: Permanent Job Description We are seeking a highly skilled and experienced Security Architect to join our team who will be responsible for development of the Security Architecture that ensures the appropriate protection of all aspects of security, (people, process, electronic, data, physical) in Spring Fibre. You will be a subject matter expert and provide security guidance and recommendations to technology/business teams and contribute toSpring's security policies, standards, and guidelines related to information and Network security. This is a technical role and suitable for someone who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. Establish metrics and monitoring to report the effectiveness and efficiency of the Security Architecture function. Identify, register and maintain security risks throughout their lifetimes, including agreeing treatment of risks with their owners, and reporting &escalating to Internal Audit and the CIO, when necessary. Develop, review and update security & privacy policies & standards and provide awareness guidelines, implementation and exceptions advice. Engage with owners & custodians of BAU IT systems to understand the architecture, data flow and security controls in their systems. Conduct periodic security compliance assessments and ISO 27001/2 reviews of BAU IT applications, infrastructures & ISMS. Review the security posture of potential M&A acquisition targets. Requirement Mapping long term business requirements to security architecture frameworks such as NIST, CIS etc. Experience delivering Hybrid Cloud and Internet facing applications with a strong focus on cyber security. Broad hands-on knowledge of Firewalls, intrusion detection systems, data encryption, and other industry-standard techniques and practices. Strong knowledge of IT infrastructure, IP Networking, security best practices, and automation technologies. Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001/2. Analysing network security controls, including Firewall and Router security configuration. Preferred Delivering the security review processes and frameworks, with full audit trail. Managing multiple security assessments and changing priorities, simultaneously Ensuring Security Architecture Review is built into group wide and business specific processes for acquiring and developing new technology,including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In depth knowledge of: Firewall: Juniper/Cisco/PaloAlto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection. Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/au-tomating common tasks) Preferred: Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Expert-level certification in either AWS or Azure, with a Security specialization. Experience in working within regulated environments, such as PCI-DSS Experience in defining secure development life cycles. Qualifications Bachelor's Degree in either Computer Science, Computer Engineering, Software Engineering, Electrical Engineering, Math, Physics. CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect.
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary up to £56,000 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. * Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). * Proficiency in technical security aspects including Firewalls, network security groups, and access controls. * Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. * Track record of leading response efforts during live cyber incidents and executing remediation strategies. * Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. * Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. * Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
23/04/2024
Full time
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary up to £56,000 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. * Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). * Proficiency in technical security aspects including Firewalls, network security groups, and access controls. * Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. * Track record of leading response efforts during live cyber incidents and executing remediation strategies. * Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. * Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. * Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
23/04/2024
Full time
Lead IT Security Manager Permanent Birmingham - 2 Days per week on site £48,900 - £61,140 per annum My client in the Rail industry are looking for a Lead IT Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to IT. * Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerability assessment activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks and vulnerabilities and assessment of their impacts. * Manage and oversee the day-to-day activity of the SOC supplier who will deliver security capabilities, communicating their activity to relevant teams. * Manage the design, delivery, maintenance, and continuous improvement of the IT Security Ops capabilities in line with business needs. * Manage the Security Operations Centre (SOC) capability, ensuring effective protection, defence, and response to IT security risks. * Promote the Security, Compliance & Identity function to develop and enhance the team profile to develop enduring relationships with stakeholders and teams. * Implement a multi-year Security roadmap that provides proactive capabilities which enable business objectives. * Actively promote and embed Equality Diversity and Inclusion (EDI) in all your work, and support and comply with all organisational initiatives, policies and procedures on EDI. Skills: * Relationship Building. Ability to develop and maintain strong relationships with internal and external stakeholders. * Security Operations. Ability provide leadership for live security incidents and helping conduct robust investigations in order to identify corrective actions and see them through to completion. * Threat Intelligence. Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. * Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. * Risk Management. Ability to identify IT security operations risks and the delivery of audit remediation activities. * Emerging technology monitoring. Ability to identify and assess new and emerging technologies, products, services, methods and techniques. Knowledge: * Knowledge of IT Service Frameworks, methodologies, and best practice such as ITIL v4 and Agile. * Knowledge of day-to-day activities and best practice within a SOC. * Knowledge of technical security such as Firewalls, network security groups, and access controls. Type of Experience: * Experience of leading a team through the full IT service life cycle, enhancing security posture, and evolving capabilities via continual service improvement. * Experience of leading live cyber incidents and the remediation actions. * Experience of partnering with supplier teams for managed services delivery of improvements. * Experience across the full IT security spectrum (software, Servers, infrastructure, and networks). * Experience designing and implementing secure systems, leading review where necessary of complex security issues. * Experience of enabling and informing risk-based decisions. * Experience dealing with the security implications of transformation and day-to-day product changes. * Experience working with system architectures, displaying a strong understanding of the impact of vulnerabilities on varied systems Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission.
Request Technology - Craig Johnson
San Francisco, California
*We are unable to sponsor for this Remote permanent role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior RBAC Engineer, preferably with strong SailPoint experience. This individual will be a technical leader in RBAC solutions and should also be able to effectively collaborate, acting as a liaison with business and technology partners. This role requires extensive background and experience in Identity Management and Role-based Access Control. Responsibilities: Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Qualifications: 8+ years of IT experience with 5+ years developing and implementing enterprise RBAC solutions Excellent written and verbal communication Collaborative approach to problem solving Work well under pressure to produce results Sensitivity to business processes and drivers Demonstrated history of influencing change within teams and across the organization Bachelor's and/or Master's degree in Computer Science, Computer Engineering, Information Systems, etc. (or demonstrated professional experience)
23/04/2024
Full time
*We are unable to sponsor for this Remote permanent role* *Position is bonus eligible* Prestigious Enterprise Company is currently seeking a Senior RBAC Engineer, preferably with strong SailPoint experience. This individual will be a technical leader in RBAC solutions and should also be able to effectively collaborate, acting as a liaison with business and technology partners. This role requires extensive background and experience in Identity Management and Role-based Access Control. Responsibilities: Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Qualifications: 8+ years of IT experience with 5+ years developing and implementing enterprise RBAC solutions Excellent written and verbal communication Collaborative approach to problem solving Work well under pressure to produce results Sensitivity to business processes and drivers Demonstrated history of influencing change within teams and across the organization Bachelor's and/or Master's degree in Computer Science, Computer Engineering, Information Systems, etc. (or demonstrated professional experience)
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary £40,000-50,950 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, Strong IT Security Management experience Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). Proficiency in technical security aspects including Firewalls, network security groups, and access controls. Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. Track record of leading response efforts during live cyber incidents and executing remediation strategies. Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
22/04/2024
Full time
IT Security Manager - Security Operations - Birmingham Hybrid working available Salary £40,000-50,950 %Flex fund IT Security Manager required for a leading client based in Birmingham. My client is currently seeking a IT Security Manager to come on board to effectively manage the Security Operations pillar within the IT Security, Compliance & Identity function. This involves overseeing Security technology and Security Operations Centre management. Additionally, this position involves leveraging and applying understanding of business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, Strong IT Security Management experience Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat management, and vulnerability management, among other areas. Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. Familiarity with IT Service Frameworks, methodologies, and industry best practices such as ITIL v4 and Agile. Understanding of day-to-day operations and industry best practices within a Security Operations Center (SOC). Proficiency in technical security aspects including Firewalls, network security groups, and access controls. Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying security measures, and advancing capabilities through continual service enhancement. Track record of leading response efforts during live cyber incidents and executing remediation strategies. Experience collaborating with supplier teams to facilitate managed services delivery for enhancements. Broad experience spanning the entire spectrum of IT security, encompassing software, Servers, infrastructure, and networks. Proven expertise in designing and implementing secure systems, and leading reviews of intricate security matters when necessary. Interested? Please submit your updated CV to Emma Siwicki at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Technical Architect Permanent Andover (Hybrid) £90,000 - £95,000 (DOE) + Benefits A Technical Architect needed with active SC Security Clearance and strong Identity and Access Management (IDM/IAM) experience. Hybrid working from Andover (Hampshire) with 2 days/week on-site with the option to work remotely for rest of the time. Start ASAP, ideally in March/April 2024. A chance to work with a leading global IT transformation business on a large-scale IT modernisation programmes for Government clients. Benefits include - Annual Bonus (to 5%) + Pension + 22 days holiday (plus BHs) + Healthcare + More. Delivering large-scale Identity & Access Management architecture solutions ideally for Central Government/GOV.UK projects. Leading the technical design of systems and services, communicating design decisions + resolving complex technical challenges. Strong Identity & Access Management domain experience, including authentication protocols, OAuth, SAML, OpenID Connect + account life cycles. Java application stacks, REST APIs, Linux Virtual Server environments, Cloud (AWS/Azure), IP Networking, DNS certificates, port configuration + Firewalls. Technical governance and assurance for digital identity architecture solutions + working closely with key stakeholders and 3rd party suppliers. Assimilating vendor product integration requirements + making technical design and technical decisions for both off-the-shelf and custom Java components. Technical Environment: IDM, IAM, Java, micro-services, APIs, open-source, DevSecOps teams, Agile, Scrum, BDD, TDD, Kanban
19/04/2024
Full time
Technical Architect Permanent Andover (Hybrid) £90,000 - £95,000 (DOE) + Benefits A Technical Architect needed with active SC Security Clearance and strong Identity and Access Management (IDM/IAM) experience. Hybrid working from Andover (Hampshire) with 2 days/week on-site with the option to work remotely for rest of the time. Start ASAP, ideally in March/April 2024. A chance to work with a leading global IT transformation business on a large-scale IT modernisation programmes for Government clients. Benefits include - Annual Bonus (to 5%) + Pension + 22 days holiday (plus BHs) + Healthcare + More. Delivering large-scale Identity & Access Management architecture solutions ideally for Central Government/GOV.UK projects. Leading the technical design of systems and services, communicating design decisions + resolving complex technical challenges. Strong Identity & Access Management domain experience, including authentication protocols, OAuth, SAML, OpenID Connect + account life cycles. Java application stacks, REST APIs, Linux Virtual Server environments, Cloud (AWS/Azure), IP Networking, DNS certificates, port configuration + Firewalls. Technical governance and assurance for digital identity architecture solutions + working closely with key stakeholders and 3rd party suppliers. Assimilating vendor product integration requirements + making technical design and technical decisions for both off-the-shelf and custom Java components. Technical Environment: IDM, IAM, Java, micro-services, APIs, open-source, DevSecOps teams, Agile, Scrum, BDD, TDD, Kanban
The Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established Euroclear project governance. You will be expected to document the solutions you design in out company standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Required Skills and Experience Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
19/04/2024
Project-based
The Role As a SailPoint Engineer, you will contribute to the delivery of the SailPoint infrastructure OS Upgrade. You will join the Logical Access Management project team. This role includes the analysis, design, build, test and deployment of the new infrastructure aligned to the established Euroclear project governance. You will be expected to document the solutions you design in out company standard templates such as a High-Level Technical Design; Detailed Functional Design; Detailed Technical Design, where you will need to obtain sign-off from reviewers while addressing all the concerns. You will build the solution in our test environment and ensure the solution goes through all the formal testing stages with our internal customers to obtain signoffs. Once tested and signed-off, you will perform handovers with the Operations Team, which may include performing training, knowledge sharing, provision of a cookbook to enable them to run and operate the solution you have designed. This will also include providing warranty support. Required Skills and Experience Sailpoint IIQ (Identity IQ), at least 5 to 8 years of experience implementing Sailpoint solution Identity & Access Management (IAM) Expert knowledge on one or more of following technology platforms: Windows, Unix, Network, Office/End User technologies, Mainframe, Tandem or Middleware Professional certification in CISSP, CISM and CISA, or equivalent is a plus Design, Development & Implementation of SailPoint Infrastructure Is creative and sees the bigger picture when designing solutions Works proactively, thereby keeping possible problems from affecting the overall functioning of the team Note: this role has been assessed as Inside IR35 which only affects UK resident candidates