Identity Access Management Jobs in the UK

51 to 75 of 196 Identity Access Management Jobs in the UK

HEAD OF INFORMATION SECURITY OPERATIONS- CONTRACT

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Responsibilities Creation and maintenance of Information Security processes and … procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be more »
Employment Type: Contract
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the SEIM and SOC partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … products o LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP o Identity and access management systems Active Directory, GPO Configuration o Citrix/VMWare 🌳 Ideally the candidate will be CISSP certified and be certified in … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement 🌳Understanding of Identity and Access Management function and technology in order to drive improvement of the function This role is inside IR35 and will be initially more »
Posted:

Identity and Access Management Architect - £625 Inside IR35 - Accounting

London Area, United Kingdom
Harrington Starr
Identity and Access Management Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office … Identity … migration expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The more »
Posted:

Security Engineer

Greater London, England, United Kingdom
RBW Consulting
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identity and access management, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identity and access management, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Posted:

Identity Management Consultant

Bristol, England, United Kingdom
DiverseJobsMatter
JOB DESCRIPTION ABOUT THE ROLE As an Identity Governance Analyst, you play a pivotal role in ensuring the security and compliance of our digital assets. Your main responsibilities include managing user identities and access, supporting secure collaboration, and staying current with the latest technologies. You'll … testing and quality assurance efforts to ensure that solutions meet the specified requirements. Manage user identities throughout their lifecycle, including provisioning, deprovisioning, and access modifications. Implement role-based access control (RBAC) and ensure appropriate access levels for all users. Investigate and resolve access-related issues and violations. Assist in preparing for and participating in audits related to identity and access management. Generate and examine reports to demonstrate compliance. Monitor IGA systems for suspicious activities and security breaches. Maintain comprehensive documentation of IGA processes, policies, and configurations. Provide more »
Posted:

IAM Developer

Staines-Upon-Thames, England, United Kingdom
Fairmont Recruitment
Role | IAM Developer 💫 Company | Healthcare 📏 Size | 10k+ 🪜 Level | Mid Level ✨Skills | Forgerock Access Management, IAM Solutions, SSO, OAuth 📍 Based | Staines or Manchester 💻 Hybrid | Once a week in either Staines or Manchester 💰 Offer | up to £60K A global international healthcare service provider is currently expanding their Identity Access Management team by bringing on an additional 2 Forgerock Developers to assist with the development of their technology roadmap in the Identity arena. What you'll be doing: Developing IAM solutions that deliver measurable benefit to their 32 million members worldwide. … a environment with mixed teams including contractors and outsourced vendors What you'll need: Experience with ForgeRock or IAM products such as Ping Identity, Sailpoint, Microsoft B2C or Azure AD Experience in ForgeRock Access Management Experience with Single Sign On, LDAP, SAML2, OAuth, OpenID more »
Posted:

IAM Architect

United Kingdom
Hybrid / WFH Options
Vallum Associates
contract IAM Architect role summary: Our client is an enterprise business in the Utilities industry. They are looking for an Identity and Access Management (IAM) Architect to design and guide the implementation of IAM solutions across their UK business. This role involves creating architectural … and leavers, access reviews, and security requirements Support procurement exercises for IDAM solutions (e.g. PAM and IGA) Collaborate with Enterprise Architecture and the IDAM SMEs to elaborate our IDAM Strategies and Frameworks and use that to inform future direction Support tactical initiatives, such as Active Directory and Group … and access management principles and technologies. Strong architectural and design skills, with the ability to develop scalable and secure IDAM solutions. Excellent problem-solving abilities and a strategic mindset, capable of anticipating future needs and trends in IDAM Experience of supporting IDAM-related procurement more »
Posted:

IAM Project Manager - IAM, PAM, NIST, Okta, CyberArk, Security - 100% Remote

United Kingdom
Hybrid / WFH Options
MRP-Global
months contract with the opportunity for multiple extensions. The position can be worked 100% remotely. Key Skills/Deliverables: Proven Project management experience Ability to manage projects in a large scale environment Demonstratable delivery experience of Identity Access management projects PAM project … delivery experience Strong knowledge of NIST framework and compliance Excellent understanding and previous experience delivering Cyber Security projects Strong understanding of Identity Access management Experience working with CyberArk Strong communication skills Delivery focused mindset Excellent stakeholder management more »
Posted:

CRM Technical Architect

Luton, England, United Kingdom
Intec Select
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer Identity Access Management (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Posted:

CRM Technical Architect

Wembley, London, United Kingdom
Intec Select
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer Identity Access Management (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £95,000
Posted:

CRM Technical Architect

Luton, Tokyngton, Greater London, United Kingdom
Intec Select Ltd
Technical Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP) as our client integrates a new … CRM is essential. Previous experience designing solutions for large corporations that utilise CRM platforms is essential. Recent experience in architecting solutions across Customer Identity Access Management (CIAM), Customer Data Platform (CDP), and Customer Engagement Platform (CEP) is essential. TOGAF or similar architecture framework experience more »
Employment Type: Permanent
Salary: £90000 - £95000/annum 20% bonus + excellent corporate bene
Posted:

🌳🌳🌳Head of Information Security Operations – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Areti Group
efforts in safeguarding information systems, ensuring confidentiality, integrity, and availability of data for our customers, corporate stakeholders, and third parties. Responsibilities: Process and Procedure Management: Create and maintain robust Information Security processes and procedures aligned with business policies. Leadership and Team Management: Lead and manage Information … Checks: Establish and maintain a schedule of operational checks to uphold data confidentiality, integrity, and availability. Escalation Point: Handle Information Security incidents, changes, and problems. IDAM Management: Take responsibility for Identity and Access Management (IDAM). Risk Landscape Documentation: Collaborate with Information … and endpoint protection technologies Vulnerability Security Scanning (e.g., Nessus) Microsoft Windows Server family of products Operational experience of PCI DSS Citrix XenApp and remote access products LAN & WAN networking using Cisco routers and switches Why Join? Exciting Growth: Be part of a rapidly expanding tech company. Impactful Role more »
Posted:

Microsoft Security Engineer - Hybrid

East London, London, United Kingdom
Hybrid / WFH Options
RiverSafe Ltd
Lead security remediation efforts following audits against an identified list and extend this list as suitable to provide a rounded security posture. Privilege Management: Strategically manage and reduce standing privileges to minimise risks and ensure compliance with industry best practices and regulatory requirements. Attack Surface Reduction: Identify vulnerabilities … and Compliance: Formulate and document/diagram process and enforce policies for access control, identity management and device management based on Microsoft security protocols and tools. Skills Minimum of 5 years of experience in a security engineering role with a focus on … Microsoft technologies, including Active Directory, Entra, Intune and Autopilot. Expertise in Microsoft Active Directory, Microsoft Entra & Conditional Access Policies, Azure Key Vault and Microsoft Certificate Authority. Experience with Bloodhound/Pingcastle/Azurehound or similar testing tools. CIS SecureSuite and application of CIS Benchmarks across the enterprise. Microsoft more »
Employment Type: Contract
Posted:

Senior Security Engineer

London Area, United Kingdom
Silicon Logic UK Ltd
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and access management initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and access management strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
Posted:

Cyber Security Project Manager (CTC cleared)

West Sussex, England, United Kingdom
83zero
Security and Infrastructure domain. The Project Manager will be overseeing critical security projects covering multiple areas, including user access, network and device management, and event monitoring. You will also lead the transition of their in-house SOC to a Managed Security Service Provider (MSSP), incorporating Microsoft … Administration, or related field. years working experience as a Project Manager within the IT sector, with a strong background in cybersecurity projects. managing identity access management and elements of AD migration understanding of project management principles, methodologies, and tools (e.g., PMP, PRINCE2 … certification preferred) with user and privileged access management, network security, device management, backups and recovery strategies, and event monitoring. Please apply now to discuss the opportunity in more detail more »
Posted:

IAM/IGA Technical Lead

England, United Kingdom
SPG Resourcing
time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with Identity and Access Management with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more Identity Management solution suite, depth of understanding in Identity Management and Governance use cases etc. Solutioning and Architecture experiences more »
Posted:

Senior DevOps Engineer (Go/Kotlin) - Identity

United Kingdom
Hybrid / WFH Options
Rapinno Tech Solutions GmbH
from Office) Project Type: Contract Job Summary: We are seeking an experienced Senior DevOps Engineer to join our team, specializing in building and maintaining identity and security solutions using Active Directory/Microsoft Entra ID. The ideal candidate will … have a strong background in Go or Kotlin programming languages and the ability to develop and deploy automated solutions that streamline user provisioning and access control. If you have a passion for DevOps, security, and identity management, and a keen interest in cloud technologies … using Go or Kotlin for IAM tasks. • Implement and manage SCIM provisioning for automated user lifecycle management • Integrate identity and access management systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. • Configure and manage access more »
Posted:

Technical Architect – Digital Identity

Reading, England, United Kingdom
Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identity and access management capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identity and access management domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Posted:

Digital Experience Engineer

United Kingdom
Hybrid / WFH Options
Confidential
Brett Marshbanks - Senior Tooling Specialist Sponsorship: Unfortunately we are unable to offer sponsorship for this role. This role in 3 words: Secure Frictionless Access Top 3 qualities for this role: Passionate, Collaborative, Thorough Where you'll work: At OVO, we understand that a one size fits all approach … including SCIM Software Asset Management Administration and Analysis (Flexera) SaaS platform management and security posture monitoring Identity and Access Management and Privileged Access Management platforms (including Google Workspace and Entra ID) Allowlisting (application control) Endpoint Detection … and Response and SIEM Issue and Project Tracking (Jira) Cyber Asset and Attack Surface Management Scripting languages such as Bash and PowerShell You'll be a successful Digital Experience Engineer at OVO if you Are a challenger: guiding our enablement strategy will benefit from an analytical mindset, strong more »
Posted:

Cloud Engineer

City Of London, England, United Kingdom
Eames Consulting
. Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform, Ansible) to streamline provisioning and management of cloud resources. Monitor, optimize, and troubleshoot cloud infrastructure performance, security, and costs, utilizing monitoring tools and logging frameworks (e.g., CloudWatch, Stackdriver, ELK … Stack). Implement and enforce cloud security best practices, including identity and access management (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC). Collaborate with IT security teams to conduct regular security assessments, vulnerability scans, and penetration tests of … virtual private clouds (VPCs), subnets, routing, load balancing, and security groups in cloud environments. Knowledge of cloud security best practices, identity and access management (IAM), encryption mechanisms, and regulatory compliance requirements in financial services (e.g., SEC, GDPR). Excellent analytical, problem-solving, and troubleshooting more »
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
who has hands on experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment … knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure … frameworks. Skills Required: In depth knowledge of: • Firewall: Juniper/Cisco/PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell more »
Posted:

Senior Information Security Manager - Multi Award Winning Money Saving App! - London , City - Hybrid - up to £100K base + package

United Kingdom
Hybrid / WFH Options
Honor Search Ltd
Information Security, NIST Cyber Security Framework (CSF), Identity and access management, SIEM, remote working and cloud technologies, CISSP, CISM, CRISC, financial tech) Perm role Hybrid Salary Neg (tbc) + share and great package! Multi award winning money saving & Investment App Company: An award-winning … well-prepared to respond to and recover from security incidents Oversee the implementation of vulnerability management processes, including regular scanning and patch management to address potential vulnerabilities Evaluate and manage the security risks associated with third-party vendors and partners Develop and maintain security metrics to … , ideally with the NIST CSF Have a good practical knowledge of security technologies and wider business solutions including Identity and access management, SIEM, remote working and cloud technologies It’s desirable to have one of the following qualifications: CISSP, CISM, CRISC Have more »
Posted:

Principal Engineer - Cloud Platform

London Area, United Kingdom
Hybrid / WFH Options
Tata Consultancy Services
scalability, security, and performance requirements. Implement infrastructure as code (IaC) principles using tools like Terraform, or Azure Resource Manager to automate the provisioning and management of cloud resources. Deploy and configure cloud services and platforms, such as Azure, or Google Cloud Platform (GCP), based on best practices and … architectural principles. Implement security controls, identity, and access management (IAM), encryption, and compliance standards to ensure the security and integrity of cloud environments. Optimise cloud infrastructure and services for performance, reliability, and cost-effectiveness, utilising monitoring, logging, and analytics tools to identify and address … CircleCI. Ability to implement infrastructure testing, deployment automation, and monitoring solutions. Security and Compliance: Knowledge of cloud security best practices, identity, and access management (IAM), encryption, and data protection. Experience implementing security controls, compliance standards, and security monitoring in cloud environments. Understanding of regulatory more »
Posted:

Senior Cyber Security Analyst

Norwich, England, United Kingdom
Workday
Security Management System frameworks and standards and their application. Partnered with knowledge of governance processes and practices, including ISMS monitoring and control management frameworks such as, ISO, ISF and COBIT, their relationships to other frameworks and the application within a financial services environment. Good working … knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identity and access management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls … WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of a proposal or design and deliver a comprehensive, easy consumable report targeted to audience and stakeholders. What more »
Posted:

Business Analyst (IAM)

United Kingdom
Hybrid / WFH Options
Transition Partners
Transition Partners are excited to be working with a growing global cyber security consultancy to recruit a Business Analyst IAM (Identity and Access Management) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … Do you dare to disrupt the status quo? This is the role for you! Skills and Experience: Strong experience with Identity and access management (IAM) experience Excellent communication skills as will be working collaboratively with clients Familiar with technologies such as Sailpoint, CyberArk and more »
Posted:
Identity Access Management
10th Percentile
£41,325
25th Percentile
£55,000
Median
£72,500
75th Percentile
£90,000
90th Percentile
£105,000