AWS IAM / PingID Specialist - SC Cleared

Whitehall Resources Ltd
3 weeks ago
Create job alert

AWS IAM / PingID Specialist - SC Cleared

Location:

United Kingdom

Job Category:

Information Technology

EU work permit required:

Yes

Job Reference:

BBBH62947_1738854870

Job Views:

6

Posted:

06.02.2025

Expiry Date:

23.03.2025

Job Description:

AWS IAM / PingID Specialist - SC Cleared

Whitehall Resources are currently looking for an AWS IAM / PingID Specialist on a remote basis for an initial 4 month contract.

*** ACTIVE SC CLEARANCE ***

*** INSIDE IR35 ***

Job Spec:

  1. Technical Proficiency in IAM Tools:Expertise in using and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities and access permissions.
  2. Security and Compliance Knowledge:Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure and compliant access management.
  3. Scripting and Automation:Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems.
  4. Authentication and Access Management:Strong experience in integrated third parties and applications using industry standards (SAML/OIDC).
  5. Problem-Solving and Analytical Abilities:Strong problem-solving skills to diagnose and resolve access issues, analyze security incidents, and perform regular audits and risk assessments of IAM systems.
  6. Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and compliant with DCC Security standards.
  7. Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications.
  8. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities.
  9. Implements and manages multi-factor authentication (MFA), single sign-on (SSO), and other authentication methods to secure user access.
  10. Ensures compliance with regulatory requirements (e.g., GDPR, HIPAA) by conducting regular audits and maintaining detailed records of access activities.
  11. Develops and enforces security policies and best practices for identity and access management, reducing the risk of unauthorized access and data breaches.
  12. Defines and manages roles and permissions to streamline access control and ensure users have the minimum necessary access to perform their duties.
  13. Integrates IAM solutions with other IT systems, such as HR databases, cloud services, and enterprise applications, to streamline identity management processes.
  14. Provides training and support to SOC Analyst users on IAM policies, procedures, and tools to ensure effective and secure use of identity management systems.

All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description.

Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.

#J-18808-Ljbffr

Related Jobs

View all jobs

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/Pingid Specialist - CGEMJP00285455

Application Security Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.