An excellent opportunity has arisen for an Identity & Access Management Analyst to join us. This role will help to support the operational Identity & Access Management activities; Recertifications, Joiners, Movers, Leavers (JML), Access Provisioning and IAM Monitoring, in addition to driving continuous improvements and supporting our strategic … change projects as our IAM function matures and grows. The role reports directly to the Identity & Access Management Lead. The role holder will work closely with our colleagues in Cyber Security Operations team, Risk & Compliance, HR and Infrastructure Teams, as well as L&Q business teams. You will … This would suit someone technical and an analytical problem solver who enjoys working as part of a team in an evolving environment. As an Identity & Access Management Analyst, you will be part of the team thats driving Identity as the new security perimeter. The Identity & Access more »
Essential Functions Take a lead role in the delivery of BAU Identity and Access management operations. Participate in the design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory/Entra ID : Analyze, design … Support synchronization and federation between on-premises AD, Azure AD, and Entra ID. Troubleshoot and optimize synchronization processes to maintain consistency across environments. Privileged Management (PIM, PAM, and Endpoint Privilege Management) : Implement time-based and approval-based role activation to mitigate risks associated with privileged accounts. Administer PAM … and manage role-based access control (RBAC) for various systems and applications. Define and enforce group-based access policies to elevate privileges when necessary. Identity Governance and Administration (IGA) : Contribute during phases of design, configuration, deployments, and operations in the area of IAM. Work on access management, identitymore »
IAM Systems Security Engineer (digital) ABJ6891 South East c £49 to £61K + Bonus As an Identity and Access Management (IAM) engineer working a with a global digital technology you will support the planning, design, development, and deployment of centralized IAM solutions for the organization. As an IAM … systems engineer you will support the planning, architecture, and delivery of the enterprise-level Privileged Access Management program. The global digital technology team manages the entire IT business landscape from research and development through procurement, supply chain, manufacturing, HR and finance capabilities, Project Management, Application Maintenance and Support … Infrastructure Management, Cyber Security, and a range of enablement functions for IT including Budgeting, Finance, Vendor Management and Governance. The company are embarking on an ambitious transformation programme which will see the deployment of many innovative technologies covering everything from SAP S4/HANA, Software Defined Networking, Cloud more »
have experience in running global teams, across a number of timezones in a heavily regulated environment. Role: Provide technical leadership and guidance to the identity and access control team. Define and implement the enterprise identity strategy and operating models. Ensure compliance with relevant regulations and audit requirements. Oversee … implementation and management of identitymanagement systems. Drive identity and access control projects to timely completion. Develop and enforce identity and access control policies. Collaborate across departments to align identity services with business needs. Champion continuous improvement in identitymanagement practices. Requirements … Strong understanding of identity and access management (IAM) principles. Technical expertise in IAM solutions, network security, and cloud security. Proven leadership skills with the ability to motivate teams and build relationships. Excellent communication and project management abilities. Business acumen aligned with organizational goals and compliance frameworks. more »
journey into shaping the future of IAM capabilities, our next IAM Director will establish the foundation for which the company will operate from for Identity and Access Management in the future! * Flexible location * Position Purpose Responsible for the planning, building, delivery, and support of the Identity and … Access Management (IAM) program for both Brambles enterprise users and customer facing services. This encompasses a wide range of current systems and solutions managed by disparate teams, against various standards and approaches in which this leader will work to consolidate, update, and ensure best practices and standards are introduced … architecture, as well as provide in-depth technical consultation to the business units and IT management. Drive initiatives to transform IAM provisioning and lifecycle management, leveraging self-service and automation capabilities to enable a frictionless user experience. Knowledgeable of Information Security best practices and regulatory and compliance requirements that more »
Bristow Holland are seeking an experienced and dedicated Identity Access Management Specialist to join our dynamic IT team. This role involves developing processes and procedures to ensure our managed environments maintain the highest levels of availability, security, and quality. You will play a critical role in capacity forecasting … Automate AD health checks and lifecycle management. Administer Quest Change Auditor and AD Certificate Services. Troubleshoot AD replication and MS Entra Connect sync issues. IdentityManagement: Design/manage Identity Lifecycle Management systems. Implement lifecycle processes and support user provisioning. Define access control and support governance …/compliance. Automate identity lifecycle processes. MS Entra Connect: Setup connectors, develop sync rules, and resolve conflicts. Configure password sync, writeback, SSO, and more. O365/MS Entra: Setup/troubleshoot Conditional Access policies. Configure Privileged Identity Manager and Multifactor Authentication. Manage O365 licenses and enterprise app SSO. more »
Employment Type: Permanent
Salary: £65000 - £75000/annum - Offering 100% Work From Home
Bristow Holland are seeking an experienced and dedicated Identity Access Management Specialist to join our dynamic IT team. This role involves developing processes and procedures to ensure our managed environments maintain the highest levels of availability, security, and quality. You will play a critical role in capacity forecasting … Automate AD health checks and lifecycle management. Administer Quest Change Auditor and AD Certificate Services. Troubleshoot AD replication and MS Entra Connect sync issues. IdentityManagement: Design/manage Identity Lifecycle Management systems. Implement lifecycle processes and support user provisioning. Define access control and support governance …/compliance. Automate identity lifecycle processes. MS Entra Connect: Setup connectors, develop sync rules, and resolve conflicts. Configure password sync, writeback, SSO, and more. O365/MS Entra: Setup/troubleshoot Conditional Access policies. Configure Privileged Identity Manager and Multifactor Authentication. Manage O365 licenses and enterprise app SSO. more »
Employment Type: Permanent
Salary: £65000 - £75000/annum - Offering 100% Work From Home
high-quality product on time and within budget Interact/coordinate with customers as required Key skills/knowledge/experience: Extensive experience with Identity and Access Management with such tools a Saviynt IGA, SailPoint IDN and OKTA Experience as an IAM architect Application, data and infrastructure governance … on-premises or modern cloud IGA offerings Leadership exposure managing teams of developers, hands on development, customization, and solution experience on one or more IdentityManagement solution suite, depth of understanding in IdentityManagement and Governance use cases etc. Solutioning and Architecture experiences more »
scale current systems System integration with the Cloud and and using your experience with Active Directory to build scalable/reliable and secure systems Identity issues and liaise with development and management teams to collaboratively overcome both workflow and security issues Perform integration, configuration, and customization of SailPoint … design/implementation and support (IGA/PAM etc) will be a key aspect of the role Troubleshoot and resolve technical issues related to identitymanagement systems. Provide technical expertise and guidance to support ongoing projects and initiatives. Be the champion for company wide access compliance and cybersecurity … will need for this position: CISSP certification is a must have for this role Proven experience as a Systems Engineer, with a focus on identity and access management. Hands-on experience with SailPoint IdentityNow, including implementation and administration. If you have a background of working Linux systems and have more »
Ready to utilise your developer skills in Integration and Identitymanagement? Are you passionate about delivering high quality solutions using the Microsoft Azure platform? Join us as an Azure .Net Identity and Integration Developer ! Careers at TCS: It means more TCS is a purpose-led transformation company … products to life. with customers and identify opportunities to support their strategy and improve their processes across functions. The Role As an Azure .Net Identity and Integration Developer , you will be responsible for the design and development of solutions, leveraging your .NET, C# developer knowledge on Azure platform; your … skills in Integration and Identitymanagement; and your experience in Azure DevOps and API building. Key Responsibilities: Design and develop solutions using Authentication and authorization protocols e.g., OpenID, and OAuth. Ensure development in C# and Microsoft .NET. Build and consume APIS (REST, SOAP). Design and develop cloud more »
Reading, England, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
company. You should have a genuine interest in solving IT issues and empathetic to customer needs and requirements. Day to day tasks include expert management and troubleshooting of Azure, Dev environments and Active Directory services and issues within a complex locked down System structure. You should possess good written … Layers and Role Based Access Control • Azure Networking Experience • Azure Firewalls Experience • Azure Security including Conditional Access Policies and Multi Factor Authentication and Privileged IdentityManagement • Azure Virtual Machine Management • Azure Storage Experience • Azure Monitoring and log analytics • Azure Enterprise and ADFS Application Provisioning • Active Directory Connect … Federation Services • Azure PowerShell scripting • Microsoft Windows Server 2016, 2019 and 2022 experience • Comfortable working with a Hybrid Joined Active Directory environment • Group Policy Management and Conditional Access Policy Management Experience • DNS, DHCP Experience • Working knowledge and understand of PKI Services • Scripting experience using BAT, PowerShell, C# and more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
company. You should have a genuine interest in solving IT issues and empathetic to customer needs and requirements. Day to day tasks include expert management and troubleshooting of Azure, Dev environments and Active Directory services and issues within a complex locked down System structure. You should possess good written … Layers and Role Based Access Control * Azure Networking Experience * Azure Firewalls Experience * Azure Security including Conditional Access Policies and Multi Factor Authentication and Privileged IdentityManagement * Azure Virtual Machine Management * Azure Storage Experience * Azure Monitoring and log analytics * Azure Enterprise and ADFS Application Provisioning * Active Directory Connect … Federation Services * Azure PowerShell Scripting * Microsoft Windows Server 2016, 2019 and 2022 experience * Comfortable working with a Hybrid Joined Active Directory environment * Group Policy Management and Conditional Access Policy Management Experience * DNS, DHCP Experience * Working knowledge and understand of PKI Services * Scripting experience using BAT, PowerShell, C# and more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Reed Technology
solutions, and implement them effectively. Manage and optimize endpoint devices, ensuring integration and security through Microsoft Endpoint Configuration Manager (MEMCM) or other modern device management tools. Implement and configure Mobile Device Management (MDM) policies using Microsoft Intune or other EMS tools. Deploy and manage applications through EMS platforms … on mobile devices. Implement robust security measures to safeguard client data, devices, and communications, adhering to industry standards and best practices. Configure and maintain identitymanagement solutions, enforce secure user authentication, and deploy role-based access controls (RBAC). Required Skills & Qualifications: Experience in delivering and optimizing Microsoft … services, including Azure and Microsoft 365. Strong knowledge of EMS technologies, including Microsoft Intune, Azure Active Directory, and Conditional Access. Familiarity with mobile device management (MDM) and application management concepts. Experience with identity and access management (IAM) principles and best practices. Strong understanding of information protection more »
Identity and Access Management Architect - £625 Inside IR35 - Accounting I currently have a long term contract role looking for a highly skilled and experienced architect with recent experience in Azure and O365 Migration Projects. Key Responsibilities: The requirement is for an Azure/Office 365 Identity migration … expert, indicating a pressing need for someone with specialized skills in this domain. The contractor should possess deep expertise in Azure and Office 365 Identity management. This involves understanding the intricacies of rebranding domains, managing user identities, and navigating potential issues that arise during migration processes. The ideal candidate … Tenant Synch, and being aware of any potential limitations or caveats associated with them. The contractor is expected to have a specialization in Microsoft Identity services, indicating a comprehensive understanding of Microsoft's suite of identitymanagement solutions. Experience setting up Active Directory (AD) environments is implied more »
components that form the backbone of our digital ecosystem. Your expertise in applications, cloud technologies, COTS (Commercial Off-The-Shelf) solutions, APIs, hosting environments, identitymanagement, and security will be instrumental in shaping the future of our technological landscape. Key Responsibilities: Architectural Design : Develop and maintain comprehensive solution … Collaborative Leadership : Work closely with cross-functional teams, including software engineers, system administrators, and project managers, to translate business requirements into technical solutions. Risk Management : Identify potential risks and vulnerabilities in solution designs and implement robust security measures to mitigate them effectively. Continuous Improvement : Drive continuous improvement initiatives to … architecture principles and best practices. Strong knowledge of applications, cloud services (e.g., AWS, Azure, GCP), COTS products, APIs, hosting environments (on-premises and cloud), identitymanagement, and security protocols. Proficiency in architectural modeling tools (e.g., UML, ArchiMate) and enterprise architecture frameworks (e.g., TOGAF, Zachman). Excellent communication and more »
the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure. Firewall management Web Proxy management and CASB. Anti-Virus/Malware management Standard, third party and privilege access user management Remediation of external … will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) managementmore »
deployment of all Microsoft professional services projects and ongoing programmes across the Stridon client base including: Azure services Microsoft 365 services Infrastructure Cyber security IdentityManagement Application To be the subject matter expert on all matters related to Microsoft Solutions including Azure, M365 and Windows Server related services … across the Stridon infrastructure Responsible for deployment, configuring, and management of deliverables across all client solution implementations including ADDS, Certificates, Certificate Authorities, DNS, DHCP, DFS, File System, Group Policy, Radius, Exchange, SharePoint, Federation, Web Services and SQL Provide subject matter expertise and manage Stridon internal applications Manage Remote Management and Monitoring tools to respond to and remediate problems where they have been escalated Deploy vulnerability management tools such as Microsoft Defender to scan for and remediate vulnerabilities across client infrastructure Provide expertise and mentoring to Managed Services engineers in problem management of Microsoft solutions and service more »
appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within Identity and Access Management, in particular deep technical knowledge of identitymanagement and privilege escalation within a Microsoft Environment (Windows Operating Systems … Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience more »
appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within Identity and Access Management, in particular deep technical knowledge of identitymanagement and privilege escalation within a Microsoft Environment (Windows Operating Systems … Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience more »
driving revenue growth by managing and expanding our relationships with our partners. The ideal candidate will have a strong background in sales and channel management, with a strong skillset in working with people and building relationships and an eagerness to travel to partner events, both inside the UK & abroad. … in total) Flexible working Competitive salary Social fund ---------------------- About CyberIAM CyberIAM is a fast-growing, highly reputable Cyber Security Company that specialises in Identity Access Management and Privileged Access Management. At CyberIAM we work with some of the largest organisations in the world ranging from Global Banks, Law … People. Our company starts and ends with our employees, our vendor partners, and our customers. With the best employees, designing and delivering the best Identitymanagement services to the best customers is where our passion lies. more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Certes IT Service Solutions
with collaboration suites i.e. Atlassian products (Jira, Confluence) * Hands on with any of Azure, AWS or GCP Services * Automating cloud services * Exposure towards Infrastructure Management, Data Migration. * Scripting with one or more of the following: Powershell, Python, Go * SecOps experience. * Automating delivery of Infrastructure as Code (IaC) via Terraform. … Deep understanding of CI/CD pipeline * Code Repository Management (e.g. Gitlab, GitHub, Bitbucket) * Architecture awareness and experience around enterprise scale applications and distributed systems * Has a DevOps mind-set towards Automation. * Understanding of Security Compliance PCI DSS, ISO, Cyber Essentials, NIST. Desirable Criteria * Experience with container technologies using … Docker and Kubernetes * Experience with Cloud Best Practices, Cost Optimisation and Architecture * Automating configuration management Ansible. * Knowledge around IdentityManagement, DNS, SAML 2.0. Successful candidate should be able to demonstrate they can: * Use their extensive cloud experience to serve as a DevOps and Platform evangelist who educates more »
South East London, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
premise, AWS and Azure environments.Essential Responsibilities and Requirements:Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR)Proven experience in extending existing CyberArk technologies/practices (EPV) and … Qualifications:Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platformsFamiliarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc.Experience facilitating business process design as it … their approach to tasks.Capability to organise and prioritise tasksStrong interpersonal skills to establish/maintain relationships and interact with team membersStrong organisation and time management skillsStrong analytical and problem solving skills more »
London, England, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
AWS and Azure environments. Essential Responsibilities and Requirements: Proven "Hands on" experience and technical abilities associated with BAU support activities for CyberArk's Privileged Identity and Privileged Session Management Suites (EPV, CPM, PVWA, PSM, HTML5GW, and DR) Proven experience in extending existing CyberArk technologies/practices (EPV) and … Familiarity with major operating systems such as Microsoft Windows, UNIX, Linux and applications/middleware technologies/platforms Familiarity with Active Directory structures and IdentityManagement policies and processes Familiarity with PAM aspects for major RDBMS such as Microsoft SQL, Oracle, etc. Experience facilitating business process design as … tasks. Capability to organise and prioritise tasks Strong interpersonal skills to establish/maintain relationships and interact with team members Strong organisation and time management skills Strong analytical and problem solving skills more »
solutions and working with relevant team members to ensure they are transitioned into build activities appropriately; Cost effective and commercially aware budgetary control and management for the recommendations made/designs provided Key responsibilities The Audit Solutions Architect will take responsibility for the delivery of assigned projects as part … Online Azure Technologies such as Azure AD, Azure App Gateway, Azure SQL, Azure VMs etc Networking technologies in both on-prem and cloud contexts IdentityManagement Overall Microsoft toolsets/technologies Skills we’d love to see/Amazing Extras: Minimum 5 years in engineering roles, with solution more »
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identitymanagement, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »