National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

CyberArk Engineer

London
4 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Engineer

Senior Cyber Security Engineer

Senior Cyber Security Engineer

Senior Cyber Security Engineer

PAM Test Analyst

IAM Technology Specialist

We are working with a leading global consultancy that are on the lookout for a CYBERARK ENGINEER that has expertise with PTA (privileged threat analytics) and EPM (End point manager).

Role: CyberArk Engineer

Location: Glasgow / London

Style: Hybrid – 2/3 days onsite

Rate: Up to £500 per day (inside IR35)

Duration: 6 months (initially – view to extend)

Role Description

  • The Privilege Access Engineering team is responsible for engineering and developing cyber security controls for privileged access.

  • The team's focus is on identity assurance, accounts/secrets management, and monitoring/detective controls.

  • We look to continuously improve our capabilities for defense against environmental exploitations, persistent attacks, and insider threats.

    Key responsibilities

  • Design and implement privileged access management solutions for broad platform and service coverage

  • Working with clients to determine their requirements

  • Assist with product deployment, enhancements, and integration

  • Provide L4 escalation support

  • Work closely with operations partners in the same squad to implement solutions for the Firm

    Key Skills:

  • Expertise in Windows Server operating system

  • Experience working with CyberArk EPM and PTA

  • Experience with cybersecurity solutions

  • Solid PowerShell scripting or C#/.NET knowledge

  • Excellent conceptual, organizational, analytical, and problem-solving skills

  • Excellent written and oral English communication skills and ability to work with globally distributed teams and users

  • Ability to learn product capabilities as implemented in the Firm, and learn about firm practices and procedures

  • Knowledge of privileged access management solutions (e.g. CyberArk PAS, Hitachi ID, BeyondTrust, Avecto, CyberArk EPM, etc.)

  • Familiarity with automation tools, such as Ansible, Puppet, or Chef

  • Expertise in Unix/Linux

  • Knowledge of Microsoft Active Directory / Group Policy

  • Knowledge of development practices and processes (source control, deployment processes and automations)

    If you are interested and have the relevant experience, please apply promptly and we will contact you to discuss it further.

    Yilmaz Moore

    Senior Delivery Consultant

    London | Bristol | Amsterdam
National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.