Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Identity Access Management SME - Reading - Up to £80,000

Job Title: Identity Access Management SME - Reading - Up to £80,000
Contract Type: Permanent
Location: Basingstoke, Hampshire
Industry:
Salary: £75000 - £80000 per annum + benefits
Start Date: ASAP
REF: le037
Contact Name: Lewis Etherington
Contact Email: lewise@montash.com
Job Published: over 1 year ago

Job Description

Montash has been retained by a global financial services organisation that is looking for an Identity Access Management Subject Matter Expert to work within its Identity Access Management team. The focus of the role will be working on the implementation and development of SailPoint Identity IQ across the organisation.

The IAM SME will have experience working with the SailPoint Identity IQ tool as they will be focusing on how the tool will be implemented throughout the organisation in order to enhance business processes through on boarding of new employees.

Role Responsibilities

  • Acting as a technical Subject Matter Expert for SailPoint Identity IQ
  • Design and implementation of Sailpoint Identity IQ across the business
  • Working within the Identity Access Management team
  • Engaging with vendor representatives throughout design and implementation of SailPoint
  • Reviewing code to ensure that it is correct

Key Skills

  • Strong background in Identity Access Management
  • Experience working with SailPoint Identity IQ is essential
  • Excellent stakeholder engagement
  • Business orientated
  • Self-starter

Identity Access Management , IAM, Identity Management, User Access, SailPoint, Identity IQ, Reading, Basingstoke, SailPoint Identity IQ

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...