CyberArk IAM Engineer

Knutsford
1 week ago
Create job alert

Join us as a CyberArk IAM Engineer where you'll spearhead the evolution of our digital landscape, driving innovation and excellence.

In this role, you’ll develop, implement and maintain solutions that support the safeguarding of the banks systems and sensitive information .

To be successful as a CyberArk IAM Engineer, you will need the following:

Strong understanding on CyberArk application(Operational and Implementation).

Should have strong understanding on Plugin and PSM Connector development to manage the password for different applications.

Should also has a strong background in Information Security principles and controls

Some other highly valued skills include:

Strong focus to drive successful delivery and implementation of key enterprise initiatives related to Privileged Identity and Access Management technologies.

Decision making, should be able to take decisions during major incidents, outages on matters related to service degradation and managing communications to impacted stakeholders. Be able to supplement with a rationale for decisions taken. 

Good understanding of Controls 

You may be assessed on the key critical skills relevant for success in role, such as risk and controls strategic thinking and digital and technology, as well as job-specific technical skills.

This role will be based out of our Knutsford campus.

Purpose of the role

To develop, implement and maintain solutions that support the safeguarding of the banks systems and sensitive information.  

Accountabilities

Provision of subject matter expertise on security systems and engineering patterns.

Development and implementation of protocols, algorithms, and software applications to protect sensitive data and systems.

Management and protection of secrets, ensuring that they are securely generated, stored, and used.

Execution of audits to monitor, identify and assess vulnerabilities in the banks infrastructure/software and support the response to potential security breaches.

Identification of advancements in to support the innovation and adoption of new cryptographic technologies and techniques.

Collaboration across the bank, including developers and security teams, to ensure that cryptographic solutions align with business objectives, security policies and regulatory requirements.

Development/ Implementation and maintenance of Identity and Access Management solutions and systems.

Assistant Vice President Expectations

To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with other functions/ business divisions.

Lead a team performing complex tasks, using well developed professional knowledge and skills to deliver on work that impacts the whole business function. Set objectives and coach employees in pursuit of those objectives, appraisal of performance relative to objectives and determination of reward outcomes

If the position has leadership responsibilities, People Leaders are expected to demonstrate a clear set of leadership behaviours to create an environment for colleagues to thrive and deliver to a consistently excellent standard. The four LEAD behaviours are: L – Listen and be authentic, E – Energise and inspire, A – Align across the enterprise, D – Develop others.

OR for an individual contributor, they will lead collaborative assignments and guide team members through structured assignments, identify the need for the inclusion of other areas of specialisation to complete assignments. They will identify new directions for assignments and/ or projects, identifying a combination of cross functional methodologies or practices to meet required outcomes.

Consult on complex issues; providing advice to People Leaders to support the resolution of escalated issues.

Identify ways to mitigate risk and developing new policies/procedures in support of the control and governance agenda.

Take ownership for managing risk and strengthening controls in relation to the work done.

Perform work that is closely related to that of other areas, which requires understanding of how areas coordinate and contribute to the achievement of the objectives of the organisation sub-function.

Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy.

Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively.

Communicate complex information. 'Complex' information could include sensitive information or information that is difficult to communicate because of its content or its audience.

Influence or convince stakeholders to achieve outcomes.

All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave

Related Jobs

View all jobs

Solution Architect – IAM

CyberArk Security Analyst

IAM Governance Manager

CyberArk Engineer

CyberArk Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.