cheltenham, south west england, united kingdom Hybrid / WFH Options
IMT Resourcing Solutions
and technology group, is seeking an Identity & AccessManagement (IDAM) Specialist to take ownership of the organisation's identity, authentication andaccess control systems. This is a key position within the global IT function — ensuring secure, compliant, and efficient access to critical systems and information across the business. … The Role As the IDAM Specialist, you'll be responsible for the management, optimisation and continuous improvement of identityandaccessmanagement systems across a global infrastructure. You'll support the organisation's digital security objectives by delivering reliable authentication, enforcing access control policies, and enhancing compliance across cloud and … entitlement reviews across cloud and on-premise environments. Maintain accurate and auditable documentation of configurations, policies and processes. Provide end-user support for access requests, password issues andIDAM-related incidents. Collaborate with Infrastructure, Cloud and Cybersecurity teams to ensure cohesive identity governance. Stay current with emerging technologies and best practice, recommending improvements to strengthen security More ❯
Identity & AccessManagement Engineer - IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune Our global law firm client are actively looking to take on a new Identity & AccessManagement Engineer (IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune) to join their team on a permanent … staff members in the troubleshooting, diagnosis, and resolution of incidents. Occasionally provides technical support to end users. Must have excellent troubleshooting and customer service skills. Appropriately inform and advise management on incidents and incident prevention. Participate in knowledge sharing with other engineers and develop solutions efficiently. Technology/Software expertise: Proven experience in Active Directory management … Governance Tools. Veza preferred. Experienced level of understanding of Identity & AccessManagement, Single Sign-On, Multi-Factor Authentication (MFA), and Authentication, Identity Governance & Administration concepts. Experience with using PowerShell scripting and the ability to read code. Experience with Outlook/Exchange and an understanding of mail routing. Experience with Windows More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
innovation, embedding security and privacy considerations into product development, data science, and AI initiatives AI & Data Security Design and implement policies for AI model security, data governance, and AI risk management, including model poisoning, prompt injection, data leakage, and adversarial attack prevention Establish AI model lifecycle security controls, including dataset provenance, secure training environments, and model monitoring for … to ensure ethical AI practices and compliance with emerging AI regulations (EU AI Act, NIST AI RMF). Cybersecurity Operations & Infrastructure Protection Oversee threat detection, incident response, and vulnerability management for both cloud and on-premise systems Implement and maintain on-premise security controls, including network segmentation, physical data center security, accessmanagement, and … compliance initiatives Familiarity with zero-trust architectures, hybrid cloud security, and API security Deep understanding of: Network and application security Cloud security (AWS, Azure, GCP) Identityandaccessmanagement (IAM) Data protection and encryption Security architecture and engineering Knowledge of emerging threats, vulnerabilities, and mitigation techniques. Experience with security tools (SIEM, DLP, EDR, firewalls More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Basingstoke, Hampshire, South East, United Kingdom
Middle Recruitment Limited
days in office per week) middle is partnered exclusively with a leading global company to recruit an IAM Analyst Service Delivery, joining their global IdentityandAccessManagement (IAM) team within Technology Operations. This is a pivotal role acting as the bridge between engineering, delivery, projects, and vendors, ensuring the effective global operation of … team that values communication, transparency, and continuous improvement, with direct exposure to the companys wider global technology leadership. Ideal Skills and Background Strong understanding of IdentityandAccessManagement (IAM) concepts and service delivery Background in IT Project Management, Service Delivery Management, or Technical Operations Experience coordinating vendors, service providers … providing equal employment opportunities regardless of ethnic origin, gender, nationality, religion, physical ability, sexual orientation, marital status, parental status, or medical history. Keywords: IAM Analyst, IdentityandAccessManagement Analyst, Service Delivery Manager, IT Project Manager, Technical Delivery Analyst, AccessManagement Analyst, IT Operations Manager, IAM Engineer More ❯
IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of application. Accenture … live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
a dedicated resource to contribute to their mission of innovating their business and creating a superior customer experience. We are therfore actively seeking a talented IdentityandAccessManagement (IAM) Operations Engineer who will be responsible for the delivery of the core IAM products and services required to support the enterprise infrastructure and business … line applications of our client. In this role you will work as part of a global team that manages and supports the IAM services including Privileged AccessManagement, Single Sign-on/Multi-Factor Authentication, and Directory Services. You will collaborate and coordinate with other IT leaders, technologists and support staff to provide a secure, resilient … 5+ years Information Security experience, with hands on experiences in enterprise IAM platforms (e.g. CyberArk, Delinea, Okta, MS Entra SSO/MFA, MS Active Directory, MS Entra ID) AccessManagement: Single Sign-On, Multi-Factor Authentication, Federation (SAML, OIDC, OAuth) Privileged AccessManagement: Managing privileged accounts, session management, vaulting Directory More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Access Computer Consulting
I am recruiting for an Identity & AccessManagement Specialist (IAM) to work mostly remote with occasional travel to London. The role falls inside IR35 so you will need to work through an umbrella company for the duration of the contract. You will have experience of leading IAM/PAM strategy and architecture design across … enterprise IAM/PAM solution design and implementation is essential. You must have hands-on experience with identity governance, accessmanagement, and privileged access controls. Knowledge of UK data protection regulations and security standards (e.g., GDPR, ISO 27001). Professional certifications such as CISSP, CISM, or vendor-specific IAM credentials are preferred. More ❯
and Public Services. Consolidated revenues as of $13+ billion. ForgeRock Architect Key Responsibilities: Architect and implement ForgeRock Access Manager (AM) solutions for secure authentication, authorization, and session management across banking applications. Design and integrate SSO, MFA, adaptive authentication, and federation for applications using ForgeRock AM. Collaborate with application, infrastructure, and security teams to embed access controls into core banking platforms. Define and enforce accessmanagement policies aligned with regulatory standards (e.g., GDPR, PCI-DSS, SOX). Lead integration efforts with identity providers (IdPs), service providers (SPs), and third-party systems using SAML, OAuth2, OpenID Connect. Conduct security assessments, threat modeling, and performance tuning of ForgeRock AM components. … to IAM engineers and developers. Support critical incident response, troubleshooting, and root cause analysis for IAM-related issues. Support audit and compliance activities with documentation and evidence of access controls. Stay updated on ForgeRock product roadmap and emerging IAM trends in the banking sector. Enable and advise customer on IAM and automation opportunities and drive thought leadership conversations More ❯
Oakley, Hampshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Bilston, West Midlands, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Oakley, Hampshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Bilston, West Midlands, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Contract Solution Architect – Identity & AccessManagement (DV Cleared) Location: Wiltshire Duration: 9 months initial Rate: £700 per day Clearance: Active and transferable DV clearance required Nationality Requirement: Sole British nationals only Overview We are seeking a highly experienced Solution Architect or Technical Architect to lead the design and delivery … of a greenfield, on-premise identity solution for a secure environment. This is a hands-on leadership role focused on architecting a robust IdentityandAccessManagement (IAM) platform using Microsoft technologies. Key Responsibilities Architect and lead the implementation of an on-premise identity solution using Windows Server 2022, Active … networking fundamentals (DNS, routing, firewalls, load balancing). Demonstrated leadership and mentoring of technical teams. Excellent communication and documentation skills. Desirable Skills Microsoft certifications (e.g., IdentityandAccess Administrator Associate, Solutions Architect Expert). Experience with hybrid identity environments. PowerShell scripting for identity automation. Delivery of identity solutions in regulated More ❯
in providing assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, IdentityandAccessManagement, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Managementand Vulnerability … and Patch Management Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback SKILLS AND EXPERIENCE Functional/Technical Competencies Essential: Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks … Ability to maintain a working knowledge of cybersecurity principles and elements Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Education/Qualifications: Essential Degree educated and/or equivalent experience.Preferred: Relevant certifications (e.g. CISA, CRISC, CISM, CISSP .) PERSONAL REQUIREMENTS Personal alignment to MUFG Values + More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. This position requires strong leadership in both solution design and technical execution, working closely with engineering teams to ensure successful delivery and ongoing … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments. Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, Firewalls, and load balancing as they relate to identity infrastructure." Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. This position requires strong leadership in both solution design and technical execution, working closely with engineering teams to ensure successful delivery and ongoing … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments. Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure." Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯