Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Identity & Access Management (IAM) Developer / SME

Job Title: Identity & Access Management (IAM) Developer / SME
Contract Type: Permanent
Location: London, England
Industry:
Salary: £50000 - £70000 per annum + Pension, Bonus, Healthcare, etc
Start Date: ASAP
REF: 34939.89299_1499881389
Contact Name: Oliver Thomas
Contact Email: olivert@montash.com
Job Published: 3 months ago

Job Description

My client is a global leader in financial technology solutions. They're a brand that is at the cutting edge of financial technology, with their services coverin multi-national corporations, SME sized businesses and private individuals. Their presence recognised as the most robust and fastest network in the market today. Due to the company's continued commitment to its internal and external data security they are investing heavily right now in augmenting /expanding the internal info sec team further.

Due to a huge multi-continent integration that is taking place for the Identity & Access Management system the client is looking to take on a IAM developer / SME who can assist with the entire project and other ongoing work that spiders out from this. The successful candidate will be in a very 'hands on' and technical position which will involve implementation of IAM solutions, developing the code for customisations/integration, communication with the board / business stakeholders to help with strategic direction and managing the operational (& technical) aspects of the projects involving IAM, a key pillar for the information security of the business.

The successful candidate will have : -

- 18 Months' experience implementing Identity & Access Management solutions (Oracle IAM, Tivoli, IBM, Sailpoint, Cyberark, etc)
- JAVA Development background using IAM products
- Broad understanding of networking security, Unix, active directory, infrastructure.

To discuss this and other information security positions in more detail please contact Oliver Thomas on +44 (0)20 7014 0230 or Olivert@montash.com

IAM, IDM, Identity & Access Management, JAVA, Sailpoint, Identity and access, identity management, access management, Sailpoint, Cyberark, Tivoli, Developer, Technical Consultant, Subject matter expert, SME, info-sec, information security, data security, London, Home Counties, UK, United Kingdom

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...