170 Identity Governance jobs in Singapore

Identity Governance Specialist

Singapore, Singapore beBeeIdentityGovernance

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

We are seeking a seasoned Identity Governance professional to spearhead the design, deployment, and administration of IAM-IGA solutions. This individual will lead the development of scalable identity architectures, facilitate collaboration among cross-functional teams, and ensure seamless integration efforts.

  • Collaborate with stakeholders to develop IAM-IGA configurations based on client requirements and solution designs.
  • Evaluate system architecture and provide recommendations for improvement.
  • Demonstrate expertise in troubleshooting complex application architectures with diverse middleware technologies.
Maintenance and Support

The successful candidate will be responsible for maintaining and supporting IGA solutions through timely troubleshooting, incident response, and patching.

  • Create and maintain comprehensive documentation for design specifications, installations, upgrades, and test cases.
  • Cultivate relationships with vendors and support teams to resolve implementation issues and upgrade challenges.
Requirements

A Bachelor's degree in Information Technology, Cybersecurity, Information Security, Computer Science, or a related field is required. Minimum 5 years of experience in designing, deploying, implementing, and administering IGA solutions is necessary.

This advertiser has chosen not to accept applicants from your region.

Senior Identity Governance Specialist

Singapore, Singapore beBeeGovernance

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Overview

We are seeking a highly skilled Senior Identity Governance Specialist to join our team.

This is a unique opportunity to make a significant impact on the security and compliance of our organisation.


Responsibilities
  • Develop and implement comprehensive user access review cycles, ensuring compliance with organisational security policies and regulatory requirements.
  • Oversee the complete UAR lifecycle from initial data extraction through to final certification, ensuring accuracy and timeliness of all access review activities.
  • Compile and validate access data from multiple enterprise systems, cross-referencing user permissions and validating accuracy of access rights across all applications and platforms.
  • Coordinate extensively with stakeholders across the organisation to obtain timely responses and certifications, managing relationships to ensure review completion within required timeframes.
  • Track and follow up on access exceptions, working closely with system owners to ensure prompt remediation of identified compliance issues and security risks.
  • Maintain comprehensive documentation of UAR processes, findings, and remediation activities to support audit requirements and continuous improvement initiatives.

Privileged Access Management
  • Manage privileged access reviews within CyberArk environment, ensuring appropriate oversight of high-risk access permissions and maintaining security of critical systems.
  • Conduct regular assessments of privileged accounts to ensure principle of least privilege is maintained and access remains appropriate for business requirements.

IAM Audit and Compliance
  • Conduct comprehensive IAM audits to assess the effectiveness of identity governance controls and identify gaps in access management processes.
  • Perform detailed analysis of user access patterns, identifying anomalies, orphaned accounts, and potential security risks through systematic audit procedures.
  • Prepare detailed audit reports documenting findings, risk assessments, and recommended remediation actions for management and external auditors.
  • Support internal and external audit activities by providing evidence of IAM controls, access logs, and compliance documentation.
  • Maintain audit trails for all identity management activities, ensuring comprehensive documentation for regulatory compliance and forensic analysis.

Identity Management Operations
  • Support identity management cleanup initiatives, including process review, requirement documentation, user acceptance testing (UAT), and ongoing Day 2 IAM operations.
  • Collaborate with technical teams to implement identity governance improvements and automation opportunities to enhance operational efficiency.
  • Participate in the design and implementation of identity management solutions that align with enterprise security architecture and compliance requirements.

Compliance and Risk Management
  • Ensure all identity and access management activities comply with internal policies, regulatory requirements, and industry best practices.
  • Identify and assess identity-related risks, developing mitigation strategies and working with stakeholders to implement appropriate controls.
  • Support internal and external audits by providing comprehensive documentation and evidence of access management controls and processes.
  • Conduct risk-based access assessments to prioritise remediation efforts and resource allocation.

Process Improvement and Documentation
  • Continuously evaluate existing IAM processes to identify opportunities for automation, streamlining, and efficiency improvements.
  • Develop and maintain detailed process documentation, standard operating procedures, and training materials for IAM activities.
  • Collaborate with cross-functional teams to implement process improvements and technology solutions that reduce manual effort whilst maintaining security and compliance standards.
This advertiser has chosen not to accept applicants from your region.

Core Java/J2EE Application Developer (Oracle Identity Governance)

Singapore, Singapore D L RESOURCES PTE LTD

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities
Analyse, develop, enhance, debug, support, maintain, test applications (Oracle Identity & Access Management IAM)
The primary work comprises of requirement analysis, mapping design, technical specification, programming, code review, job scheduling, perform unit test and SIT, support UAT, deploy to production, post implementation support, and technical documentation.
Requirements
Strong experience in Customization of ADF UI and SOA workflows.
Experience on XML, XSD, SOAP, WSDL, SOA BPEL process, Oracle Business Rule and Human Workflows for request approvals in Approval policy.
Strong experience in integrating OIM with AD, Exchange, RACF, AS400 connectors
Must have Core Java/J2EE knowledge for customizations.
Strong experience in developing connectors, approval workflows, and custom event handlers, custom scheduled tasks and reconciliation.
Good command on UI customization and UDF’s and lookup fields in the design console to extend the connector functionality.
Expertise on Flat File, Directory server reconciliation, Bulkload utility .
Integrated and Implemented Role based Access Control products with Identity and Access Management solutions.
Hands on experience on SSL configuration
Have knowledge on WebLogic application server, WebSphere, OHS, JBoss and apache servers
Strong understanding of Agile Scrum and Waterfall SDLC methodologies.
Application of latest Bundle Patches
Key Domain/ Technical Skills
Oracle Identity Governance (12 C) ,Java,SQL,SOA,Linux scripting, WebLogic
#J-18808-Ljbffr

This advertiser has chosen not to accept applicants from your region.

Information Security

Singapore, Singapore $40000 - $60000 Y Scoot Tigerair Pte Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Internship

Summary

Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.

Job Description

Responsibilities:

Application Security

  • Research web and mobile application security best practices

  • Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure

  • Assist in tracking and resolving penetration test and threat modelling findings

  • Perform internal security testing using Burp Suite and Kali Linux, etc.

Security Compliance

  • Work closely with various IT teams to identify, assess and manage information security risks

  • Assist to coordinate with application and various IT teams on various compliance controls.

  • Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.

MAS Technology Risk Management Guidelines

-Assist to collect and compile security related statistics, assess the information and prepare management reports.

  • Assist in conducting regular phishing campaigns and compile the results for analysis.

Risk Management

  • Assess and enforce the security controls of IT projects

Projects

  • Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.

  • Assist the project manager and liaise with vendor

  • Provide internal support during the implementation

Requirements:

  • Pursuing a degree with specialization in Information Security

  • Interest in cyber security

  • Good trouble-shooting and analytical skills

  • Independent and resourceful

  • Good interpersonal skills

This advertiser has chosen not to accept applicants from your region.

Information Security

$60000 - $180000 Y Scoot

Posted today

Job Viewed

Tap Again To Close

Job Description

Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.

Job Description
Responsibilities:
Application Security

  • Research web and mobile application security best practices
  • Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
  • Assist in tracking and resolving penetration test and threat modelling findings
  • Perform internal security testing using Burp Suite and Kali Linux, etc.

Security Compliance

  • Work closely with various IT teams to identify, assess and manage information security risks
  • Assist to coordinate with application and various IT teams on various compliance controls.
  • Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.

MAS Technology Risk Management Guidelines

  • Assist to collect and compile security related statistics, assess the information and prepare management reports.
  • Assist in conducting regular phishing campaigns and compile the results for analysis.

Risk Management

  • Assess and enforce the security controls of IT projects

Projects

  • Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
  • Assist the project manager and liaise with vendor
  • Provide internal support during the implementation

Requirements

  • Pursuing a degree with specialization in Information Security
  • Interest in cyber security
  • Good trouble-shooting and analytical skills
  • Independent and resourceful
  • Good interpersonal skills
This advertiser has chosen not to accept applicants from your region.

Information Security

Singapore, Singapore $13200 - $144000 Y D L Resources Pte Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Objectives

The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.

Key Responsibilities

This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:

  • Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.

  • Manage reverse third-party due diligence engagements related to GIS.

  • Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.

  • Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.

  • Execution of the GIS KRCSA (Key Risk and Control Self Assessments).

  • Management policy, procedures and standards updates and control.

  • Manage various GIS initiatives and duties as assigned.

Key Requirements

  • Communicate effectively with a variety of internal and external teams and stakeholders.

  • Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.

  • Ability to respond to any requests and issues on a timely basis.

Education

  • Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.

  • Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.

  • Knowledge of industry best practices.

Technical Skills

  • Overall experience 5+ years of experience.

  • 2+ years of relevant experience in Security/IT governance disciplines.

  • Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.

  • Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.

  • Good knowledge of Security concepts and practices.

  • Good knowledge of Security related guidelines and advisories from regulators.

  • Good with numbers for use in metrics.

Soft Skills

  • Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.

  • Process aware mindset.

  • Strong analytical and problem-solving skills.

  • Effective time management and organizational skills.

  • Strong team player.

  • Able to work independently with minimal supervision.

  • High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.

  • Willing to learn quickly.

This advertiser has chosen not to accept applicants from your region.

Information Security

Singapore, Singapore D L RESOURCES PTE LTD

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities

Job Objectives

The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.

Key Responsibilities

This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:


• Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.


• Manage reverse third-party due diligence engagements related to GIS.


• Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.


• Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.


• Execution of the GIS KRCSA (Key Risk and Control Self Assessments).


• Management policy, procedures and standards updates and control.


• Manage various GIS initiatives and duties as assigned.

Key Requirements


• Communicate effectively with a variety of internal and external teams and stakeholders.


• Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.


• Ability to respond to any requests and issues on a timely basis.

Education


• Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.


• Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.


• Knowledge of industry best practices.

Technical Skills


• Overall experience 5+ years of experience.


• 2+ years of relevant experience in Security/IT governance disciplines.


• Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.


• Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.


• Good knowledge of Security concepts and practices.


• Good knowledge of Security related guidelines and advisories from regulators.


• Good with numbers for use in metrics.

Soft Skills


• Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.


• Process aware mindset.


• Strong analytical and problem-solving skills.


• Effective time management and organizational skills.


• Strong team player.


• Able to work independently with minimal supervision.


• High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.


• Willing to learn quickly.

Tell employers what skills you have

IT Security Policies
Information Security
Security Architecture
Information Security Policies
Information Security Policy
Security Governance
Application Security
Due Diligence
Cyber Security
Information Security Governance
IT Governance
Knowledge Management
Assurance
IT Security Assessments
Operational Risk
CISA
Regulatory Requirements
IT Security Best Practices
Audit
CISSP
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Identity governance Jobs in Singapore !

Information Security

Singapore, Singapore RECRUITMENT ALLIANCE

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities

Location: CBD, Singapore

Type: 1-year contract (with possible extension)

This is a leadership n Hands on role — you'll help set the strategy, make big decisions on security, and lead responses if anything goes wrong

You are tasked with keeping the company's IT systems and data secure.

This includes making sure there are strong security policies, protecting against cyber threats, and helping the company meet regulations.

You'll work closely with top management and teams across the company to manage risks and improve cybersecurity.

When need arises. you will need to hands on to solve the problems

.

Job scope:

Leadership

  • Set and lead the company's overall IT security plan.
  • Advise top leaders on cybersecurity matters.
  • Create security rules and make sure everyone follows them.
  • Help other departments understand and support security goals

Operations

  • Manage the IT security budget carefully.
  • Track performance — like system downtime, incident handling speed, and vendor performance.
  • Make business cases to justify investments in security tools or projects.

Cybersecurity Incident Handling

  • Keep improving systems to detect and prevent cyberattacks.(Leadership and Hands on)
  • Monitor for threats and respond quickly if there's a breach.(Leadership and Hands on)

Compliance

  • Identify and manage cybersecurity risks (including third-party/vendor risks).
  • Ensure the company follows laws and industry standards (like MAS TRM, ISO 27001).
  • Regularly check and report on security risks and how they're being handled.

Requirement

  • A degree in Computer Science, IT with Certification :CISSP, CISM, CISA, CRISC, or CCSP.
  • 5 years in IT Security n 3years in a leadership role like IT Security Manager or CISO.

Added advantage:

Finance or insurance domain.

Other Skills

  • Strong knowledge of cybersecurity laws, risks, and standards.
  • Ability to explain technical issues to non-technical people.
  • Good leadership and teamwork skills.
  • Experience with budgeting and running IT security projects.

What You'll Be Measured On:

  • Annual cybersecurity strategy report
  • Quarterly risk reports and dashboards
  • Performance metrics (e.g: incident handling, cost efficiency)
  • Budget usage and cost tracking
  • Regular reviews of IT security performance and vendor quality

Work location :CBD

Whats on offer

(1) Attractive package

(2) Stable Management

(3) Dynamic work environment.

For better response, pls apply via job page

click job opening, click relevant position.

We regret that only shortlisted candidates will be notified.

Tell employers what skills you have

Information Security
Leadership
Security Operations
Cyber Security
Investments
ISO
ISO 27001
Compliance
Budgeting
CISA
Network Security
CISSP
This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

$90000 - $120000 Y PERSOL

Posted today

Job Viewed

Tap Again To Close

Job Description

CyberArk Engineer

We are seeking a skilled and motivated CyberArk Engineer to join our growing security engineering team. In this role, you will be responsible for designing, implementing, and supporting privileged access management (PAM) solutions using CyberArk, ensuring the highest levels of security, compliance, and operational efficiency.

The ideal candidate will hold a CyberArk Certified Delivery Engineer (CDE) certification and have experience with Sentry (preferred). You will collaborate with cross-functional teams to protect sensitive data and critical systems from unauthorized access.

Key Responsibilities:

  • Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
  • Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
  • Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
  • Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
  • Troubleshoot and remediate CyberArk Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
  • Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
  • Perform health checks and tuning of CPM components to ensure stability and optimal performance.
  • Basic understanding of custom CPM and PSM connectors for target platforms not natively supported by CyberArk.
  • Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre-production environments.
  • Leverage scripting (e.g., PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
  • Contribute to the connector certification process and maintain version control for custom components.
  • Assist with audits, documentation, and reporting of privileged access activities.
  • Work with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
  • Stay up to date with emerging threats, PAM trends, and CyberArk product updates.

Required Qualifications:

  • CyberArk Certified Delivery Engineer (CDE) certification (must-have)
  • 3+ years of experience implementing and supporting CyberArk solutions in enterprise environments
  • Proficiency with CyberArk components and architecture
  • Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs
  • Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege
  • Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals

Preferred Qualifications:

  • Experience or certification with Sentry
  • CyberArk Defender or Guardian certification(s)
  • Familiarity with cloud PAM implementations (AWS, Azure, GCP)
  • Experience with SIEM tools and security monitoring
  • Bachelor's degree in Computer Science, Information Security, or related field

Interested candidates may apply through the application system. We regret to inform only Shortlisted candidates will be notified.

By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.

PERSOLKELLY Singapore Pte Ltd
• RCB No E
• EA License No. 01C4394 
• EA Registration No. R Derrick Tiew Yong Han)

This is in partnership with the Employment and Employability Institute Pte Ltd ("e2i").

e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training, and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives.

This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Singapore, Singapore $120000 - $200000 Y TD Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Work Location :

Singapore, Singapore

Hours:

40

Line of Business:

Technology Solutions

Pay Details:

We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.

Job Description:

Responsibilities:

  • Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
  • Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
  • Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
  • Develop and Execute Test Plans: Design and execute detailed test plans
  • Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
  • Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
  • Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
  • Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.

Requirements:

  • At least 8-10 years of relevant experience
  • Technical Skills:
  • Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
  • Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
  • Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
  • Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
  • Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.

Preferred Qualifications:

  • Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
  • Familiarity with security standards and frameworks
  • Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.

Who We Are

TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.

TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing – and so will you.

Our Total Rewards Package

Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.

Additional Information:

We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.

Colleague Development

If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we're committed to helping you identify opportunities that support your goals.

Training & Onboarding

We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.

Interview Process

We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.

Accommodation

If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Identity Governance Jobs