IdentityandAccessManagement Engineer page is loaded IdentityandAccessManagement Engineer Apply locations London, United Kingdom time type Full time posted on Posted Yesterday job requisition id R-016129 Main Purpose: IdentityandAccessManagement (IAM) Engineer is responsible for … designing, implementing and managing identityandaccessmanagement solutions that ensure secure and efficient authentication, authorization and auditing of users and systems. The IAM Engineer works to ensure that only authorised users have access to the right resources at the right time, using tools and processes to enforce security policies, compliance requirements … IAM systems and solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA) and role-based access control (RBAC). Configure and maintain identityandaccessmanagement tools. Work with IT and security teams to define and enforce security policies and user access controls. Assist in the managementMore ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk managementand incident response programmes. What you will do The IdentityandAccess Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identityandaccessmanagement (IAM … issues of non-compliance related to PAM, IAM and IGA policies and processes. Leadership & Team Development Provide leadership and structured mentorship to a team of identityandaccessmanagement staff, supporting their technical development, training & certifications, and career progression. Oversee the design andmanagement of the on-call support structure, ensuring appropriate … working with Microsoft identity products, namely Active Directory and Entra ID. Extensive experience working in architecture or information security, with a significant focuson identityandaccess management. Current Azure certifications (e.g., Azure Security Engineer Associate). Strong knowledge of security and compliance standards and frameworks, such as ISO27001, MS CAF, and WAF. Excellent communication More ❯
Job Description IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of … live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
over 50 already, these new roles will enhance our capabilities as the threat landscape continues to evolve. We are seeking a highly skilled and experienced IdentityandAccessManagement Engineer to join our IAM team at Royal London, with a core skillset in Identity Governance Administration (IGA) solutions. As an IAM Engineer … and enforcement of security policies and procedures, as well as conducting regular security assessments and audits. Additionally, you will be responsible for troubleshooting and resolving identityandaccess-related issues. The ideal candidate will have a strong background in IAM, possess excellent problem-solving skills, and be a proactive and self-driven individual with a keen … lifecycle management, and governing Joiner, Mover, Leaver processes. Combined IT and security work experience with a broad range of exposure to IdentityandAccessManagement functions and experience designing and deploying IGA solutions at the enterprise level. Demonstrated successful implementation of security control frameworks and standards such as ISO More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
AVEVA Denmark
IdentityandAccessManagement Engineer page is loaded IdentityandAccessManagement Engineer Apply locations Cambridge, United Kingdom London Cannon Street time type Full time posted on Posted 7 Days Ago job requisition id R010889 AVEVA is creating software trusted by over 90% of leading industrial companies. Job … Title: IdentityandAccessManagement Engineer Location: Cambridge/London Employment Type: Full Time (Hybrid) The job AVEVA are looking for an IdentityandAccessManagement (IDAM) focused Engineer with a strong background in engineering hybrid Windows platforms to join our growing team. The AVEVA IT team is … and hiring process, please notify your recruiter. Determinations on requests for reasonable accommodation will be made on a case-by-case basis. Similar Jobs (1) IdentityandAccessManagement Senior Manager locations 2 Locations time type Full time posted on Posted 30+ Days Ago AVEVA is a global leader in industrial software. Our cutting More ❯
to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … similar roles including in-depth troubleshooting, mentoring and managerial skills. KEY RESPONSIBILITIES 1. Provide strong and experienced leadership. 2. Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical workshops and 1:1 coaching sessions, to ensure alignment to business strategy. 3. Creation and maintenance of technical guides to convey facts … simply and effectively to both peers and those less experienced. 4. Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. 5. Balance technical fact/opinion against business risk/delivered service to provide well thought More ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
BUSINESS ANALYST- IDENTITY& ACCESSMANAGEMENT BUSINESS ANALYST/IAM/IDENTITY & ACCESSMANAGEMENT/CYBER SECURITY/SAILPOINT IDENTITY IQ/SAP IDM/SAILPOINT ISC/CROWN JEWEL ASSET IDENTIFICATION/PROCESS MAPPING £350-400 Per Day-Umbrella 6 Months- Extensions Likely London/Remote … critical role in uncovering undocumented functionality, dependant business processes, identifying stakeholders, and translating business needs into high-quality, testable requirements. You will be supporting the Cyber Security Advisory Lead andIDAM Project Manager to take forward various activities which straddle project delivery and BAU risk reduction actions. Key Responsibilities: Lead end-to-end requirements gathering for the migration of identity … experience in being able to drive forward actions and being able to hold others accountable for actions assigned on behalf of the Lead Strong influencing and stakeholder management at senior levels Consultative approach in driving Cyber activities forward Desirable Experience: Experience in Identity & AccessManagement (IAM) or IdentityMore ❯
activities, ensuring tracking and reporting via AzureDevOps (ADO). Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccess … Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Key Responsibilities: Manage the Infrastructure and EUC change process, including identification, creation andmanagement of internal and external partner change. Ensuring maximum uptime and minimal operational impact to the business. Engage and support IT audit activities, through managementand collation … services to optimise efficiency, scalability, and security. Advocate for the adoption of automation, AI-driven security, and modern IT operations tools to enhance cloud performance. Ensure enforcement, reporting, andmanagement of vendor product lifecycles, for both legacy cloud assets and proposed cloud solutions. Provide support (technical and resource management) to the wider IT product teams. Vendor More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the IdentityandAccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management … access reconfiguration and operational handover. Deep expertise in Identityandaccessmanagement, Privileged accessmanagementand secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
per annum Are you a technically adept security engineer with active DV (Developed Vetting) clearance and a passion for designing and enforcing identity, commission, andaccess control systems within secure IT environments? If so, Morela has an exciting opportunity for you. Morela is partnering with a leading UK consultancy operating across defence, intelligence, and critical national … infrastructure sectors. They are seeking a DV-cleared Security Engineer with expertise in commission (authorization policies) andaccess control within IT systems. This role merges technical security engineering with strategic oversight, delivering high-assurance access mechanisms for mission-critical systems. You'll join a dynamic team responsible for ensuring secure and compliant access across … UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning andaccess enforcement. Incident Management & Response Participate in access-related incident response, including unauthorized access investigations, root-cause analysis, and mitigation measures. Client Engagement More ❯
per annum Are you a technically adept security engineer with active DV (Developed Vetting) clearance and a passion for designing and enforcing identity, commission, andaccess control systems within secure IT environments? If so, Morela has an exciting opportunity for you. Morela is partnering with a leading UK consultancy operating across defence, intelligence, and critical national … infrastructure sectors. They are seeking a DV-cleared Security Engineer with expertise in commission (authorization policies) andaccess control within IT systems. This role merges technical security engineering with strategic oversight, delivering high-assurance access mechanisms for mission-critical systems. You'll join a dynamic team responsible for ensuring secure and compliant access across … UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning andaccess enforcement. Incident Management & Response Participate in access-related incident response, including unauthorized access investigations, root-cause analysis, and mitigation measures. Client Engagement More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Role Title: IdentityandAccessManagement (IDAM) Solutions Specialist/Architect Duration: contract to run until 28/11/2025 Location: Sheffield, Hybrid 3 days in the office is mandatory Rate: up to £552 p/d Umbrella inside IR35 Role purpose/summary Big Bank Funding. FinTech Thinking. Our Technology teams work … estates in the industry. We're redefining IDAM on a global scale and launching a transformational programme to bridge modern IDAM technology and solutions with big bank scale and complexity. The IDAM Transformation program is forecast to be 5 years plus with significant change to be designed, planned and implemented globally. The transformation encompasses all aspects of IDAM from Authentication … up to C level. Be responsible for the successful delivery of relevant parts of IDAM transformation that you are architecting The role requires effective communication across the workstreams andmanagement of their inter-dependencies including oversight of any risks and issues arising. Risk and Issue Management - proactively identifies and manages risks and issues against the architecture More ❯
Sheffield, South Yorkshire, United Kingdom Hybrid / WFH Options
Experis
Role Title: IdentityandAccessManagement (IDAM) Solutions Specialist/Architect Duration: contract to run until 28/11/2025 Location: Sheffield, Hybrid 3 days in the office is mandatory Rate: up to £552 p/d Umbrella inside IR35 Role purpose/summary Big Bank Funding. FinTech Thinking. Our Technology teams work … estates in the industry. We're redefining IDAM on a global scale and launching a transformational programme to bridge modern IDAM technology and solutions with big bank scale and complexity. The IDAM Transformation program is forecast to be 5 years plus with significant change to be designed, planned and implemented globally. The transformation encompasses all aspects of IDAM from Authentication … up to C level. Be responsible for the successful delivery of relevant parts of IDAM transformation that you are architecting The role requires effective communication across the workstreams andmanagement of their inter-dependencies including oversight of any risks and issues arising. Risk and Issue Management - proactively identifies and manages risks and issues against the architecture More ❯
business analysis within the Identity & AccessManagement domain. The ideal candidate willbe a Subject Matter Expert (SME) in analysing and helping deliveridentity andaccessmanagement solutions,acrosssome ofthe following areas: Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally withgood conceptual/practical knowledge … of: AccessManagement (inc.Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged AccessManagement (PAM) Consumer Identity (CIAM) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM Knowledge ofintegrationsof IAM … technologieswould be beneficial but not compulsory. Comfortable w orking both as part of a team, orindividually, and familiar with the relevant non-technicalproject activities(i.e.,project planning,stakeholder management,changemanagement, schedule management, qualityassurance, etc) Detailed understanding of business processes and how they contribute to enterpriserisks Strong written and verbal communication skills Ability to act as an More ❯
Security Engineer, IdentityandAccessManagement (IAM) Meta's security team is the central engine driving data and systems security at the company, supporting Meta and all of its family of apps. The security organization is responsible for inhibiting malicious actors from compromising our environment, preventing, detecting and responding to them before they do … company, from the corporate infrastructure to production to external services, interfacing with nearly every team in the company.The Security Engineer should have prior experience with security policy, risk, andaccessmanagement disciplines and be experienced in collaborating with cross-functional teams. This position will be responsible for identifying and enforcing solutions to control access … our internal IAM solutions. This role requires a broad mix of security, technical, coding and communication skills coupled with a desire to learn. Security Engineer, IdentityandAccessManagement (IAM) Responsibilities Directly contribute to experiments, including designing experimental details, authoring reusable code, running evaluations, and organizing results Contribute to publications and open-sourcing efforts More ❯
Identity & AccessManagement domain. The Role This role will entail being involved in the analysis, design and delivery of identityandaccessmanagement solutions, strategy & process improvement, with a focus on areas such as : Identity Governance and Administration (IGA) IdentityManagement (IDM … Ideally with good conceptual/practical knowledge of: AccessManagement (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM We are looking ideally for someone with the … IAM technologies, as described above Comfortable working both as part of a team or individually, and familiar with the relevant non-technical project activities (i.e. project planning, stakeholder management, change management, schedule management, quality assurance, etc.) Strong written and verbal communication skills Basic understanding of risk and control principles and how processes are implemented More ❯
The successful candidate will play a critical leadership role in delivering complex technical programs and driving key cybersecurity initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance. This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯