Sheffield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
LTIMindtree
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
Vallum Associates
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Vallum Associates
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
Impact Team
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
handsworth, yorkshire and the humber, united kingdom
eTeam
side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should More ❯
assess risks. Understand IAM constructs across cloud platforms: AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), Alibaba Cloud (RAM users, groups, roles, policies), and Kubernetes RBAC (roles, bindings). Identify gaps and over-privileged accounts in SaaS identity management, including SSO … as a Business Analyst or similar, focused on IT security, governance, or IAM. Hands-on experience with IAM processes in AWS, Azure, GCP, and Alibaba Cloud. Proficiency with cloud consoles, CLIs, and reviewing Infrastructure as Code (Terraform, CloudFormation) for IAM issues. Excellent stakeholder management and facilitation skills. #J More ❯
understanding of cloud security principles, compliance frameworks (e.g., CIS, NIST), and risk management. Experience with cloud platforms such as AWS, Azure, Google Cloud, or Alibaba Cloud. Cybersecurity experience managing large cloud-based asset estates. Experience ensuring cloud projects adhere to security policies and standards. This position is based in More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
as a Business Analyst or similar role focused on IAM, IT Security, or Cloud Governance. Proven experience with IAM in AWS, Azure, GCP, and Alibaba Cloud. Practical exposure to Kubernetes access management and SaaS identity integrations. Experience with IAM tools or platforms (SailPoint, Okta, CyberArk, etc.) Knowledge of cloud … compliance standards (CIS benchmarks, NIST, ISO 27001) Hands-on experience with Alibaba Cloud RAM policies and access model. Key Skills: AWS/Azure/GCP/IAM/Cloud compliance/Kubernetes/SaaS identity/CyberArk #J-18808-Ljbffr More ❯