At a Glance
- Tasks: Lead security assessments and design IAM solutions for telecom applications and networks.
- Company: Join a leading telecom security firm focused on innovation and collaboration.
- Benefits: Attractive salary, flexible working options, and opportunities for professional growth.
- Other info: Dynamic role with potential for career advancement in a fast-paced environment.
- Why this job: Make a significant impact in telecom security while working with cutting-edge technologies.
- Qualifications: 10+ years in Telecom Security and IAM, with strong stakeholder management skills.
The predicted salary is between 80000 - 100000 £ per year.
Telecom & Application Security Assessments
- Perform security assessments for telecom applications, platforms, and integrations (OSS/BSS, core network-related systems).
- Review application and network architectures to identify security gaps, risks, and non-compliance.
- Conduct threat modeling, risk assessments, and security design reviews across on-prem and cloud-hosted applications.
- Provide assessment outputs including risk ratings, mitigation recommendations, and security assurance artefacts.
IAM Solution Design & Architecture
- Design end-to-end IAM solutions covering IGA, PAM, WAM, MFA, SSO, and directory services.
- Define High-Level and Low-Level Designs (HLD/LLD) for IAM integrations with telecom applications.
- Support IAM onboarding of applications, including entitlement modeling, access workflows, and approval constructs.
- Align IAM designs with Zero Trust and telecom security principles.
Network & Platform Security
- Provide security inputs for telecom network components (4G/5G core, transport networks, supporting platforms).
- Review firewall rules, network flows, privileged access paths, and secure connectivity models.
- Ensure alignment with network security standards, segmentation, and least privilege access.
Governance & Stakeholder Engagement
- Act as the onsite security/IAM focal point, coordinating with customer security teams, architects, and application owners.
- Support architecture governance forums, technical reviews, and customer walkthroughs.
- Produce customer-facing documentation such as security assessment reports, design documents, and solution proposals.
- Work closely with offshore delivery and CoE teams to ensure design-to-implementation alignment.
Required Skills & Experience
- 10+ years of experience in Telecom Security, Network Security, and IAM roles.
- Strong understanding of Telecom architecture (OSS, network-facing applications, integrations).
- Hands-on experience in IAM solution design using platforms such as SailPoint, CyberArk, Microsoft Entra ID (Azure AD), LDAP/AD.
- Experience with authentication and authorization standards (SAML, OAuth2, OIDC, MFA).
- Proven capability in security architecture reviews, risk assessments, and compliance support.
- Experience producing HLDs, LLDs, and security assurance documentation.
- Strong onsite stakeholder management and communication skills.
Preferred / Good to Have
- Experience working with UK Telecom operators or large-scale regulated environments.
- Knowledge of ISO 27001, NIST, Zero Trust, and telecom security frameworks.
- Exposure to cloud security (Azure/AWS) in telecom environments.
- Prior experience acting as onsite security consultant or IAM architect.
Security & Access Management Governance (PAM) Lead in Slough employer: KBC Technologies Group
Contact Detail:
KBC Technologies Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security & Access Management Governance (PAM) Lead in Slough
✨Tip Number 1
Network with industry professionals! Attend telecom security events or webinars to meet people in the field. You never know who might have a lead on your dream job.
✨Tip Number 2
Showcase your expertise! Create a portfolio that highlights your experience in IAM solution design and security assessments. This can really set you apart when chatting with potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of telecom architecture and security frameworks. Be ready to discuss how you've tackled security gaps in past roles—real examples go a long way!
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it makes it easier for us to keep track of your application.
We think you need these skills to ace Security & Access Management Governance (PAM) Lead in Slough
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Security & Access Management Governance Lead. Highlight your experience in telecom security and IAM solutions, and don’t forget to mention any relevant certifications or projects that align with the job description.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re the perfect fit for this role. Mention specific experiences that relate to the responsibilities listed, like conducting security assessments or designing IAM solutions.
Showcase Your Communication Skills: Since stakeholder engagement is key in this role, make sure to highlight your communication skills in your application. Share examples of how you've successfully coordinated with teams or presented findings to clients in the past.
Apply Through Our Website: We encourage you to apply through our website for a smoother process. It’s the best way for us to receive your application and ensure it gets the attention it deserves. Plus, you’ll find all the details you need about the role there!
How to prepare for a job interview at KBC Technologies Group
✨Know Your Telecom Security Inside Out
Make sure you brush up on your knowledge of telecom architecture and security frameworks like ISO 27001 and NIST. Be ready to discuss specific examples from your past experience that demonstrate your understanding of OSS/BSS systems and how you've identified security gaps in similar environments.
✨Showcase Your IAM Expertise
Prepare to talk about your hands-on experience with IAM solutions, especially platforms like SailPoint and CyberArk. Have a few examples ready where you designed end-to-end IAM solutions, focusing on aspects like entitlement modelling and access workflows, to show how you align with Zero Trust principles.
✨Communicate Clearly with Stakeholders
Since stakeholder engagement is key, practice explaining complex security concepts in simple terms. Think about how you've coordinated with customer security teams in the past and be ready to share those experiences, highlighting your communication skills and ability to produce clear documentation.
✨Prepare for Technical Reviews
Expect to dive deep into technical discussions during the interview. Review your past work on security assessments and design documents, and be prepared to discuss how you approach risk assessments and security design reviews. This will help demonstrate your capability in governance and alignment with security standards.