Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid/Remote Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
domains • Proven background as a Solution Architect in complex enterprise environments • Strong capability in Microsoft Azure (IaaS, PaaS) and cloud-native architectures • Knowledge of enterprise integration patterns and API management • Understanding of security, compliance, and data privacy best practices • Strong stakeholder engagement and communication skills • Ability to take ownership of technical challenges and deliver solutions • Knowledge of project … change • Experience working with third-party or offshore delivery teams Technology Experience • Microsoft Azure (IaaS, PaaS, Azure AD, Azure DevOps) • Windows 365, Microsoft 365, Power Platform • Integration technologies • Identity & AccessManagement • AI capabilities • Enterprise applications (document management, case management, CRM, finance) • Networking and infrastructure fundamentals • Agile and modern delivery methodologies More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Context
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change … Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest More ❯
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) Monitoring vulnerabilities, investigating incidents and implementing corrective actions Supporting patching compliance and vulnerability remediation Ensuring security best practices are applied across networks, applications and systems Participating in change … ISO27001, Cyber Essentials+ and CAF Requirements: A solid background in IT infrastructure and/or network engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest More ❯