IdentityandAccessManagement Engineer page is loaded IdentityandAccessManagement Engineer Apply locations London, United Kingdom time type Full time posted on Posted Yesterday job requisition id R-016129 Main Purpose: IdentityandAccessManagement (IAM) Engineer is responsible for … designing, implementing and managing identityandaccessmanagement solutions that ensure secure and efficient authentication, authorization and auditing of users and systems. The IAM Engineer works to ensure that only authorised users have access to the right resources at the right time, using tools and processes to enforce security policies, compliance requirements … IAM systems and solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA) and role-based access control (RBAC). Configure and maintain identityandaccessmanagement tools. Work with IT and security teams to define and enforce security policies and user access controls. Assist in the managementMore ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk managementand incident response programmes. What you will do The IdentityandAccess Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identityandaccessmanagement (IAM … issues of non-compliance related to PAM, IAM and IGA policies and processes. Leadership & Team Development Provide leadership and structured mentorship to a team of identityandaccessmanagement staff, supporting their technical development, training & certifications, and career progression. Oversee the design andmanagement of the on-call support structure, ensuring appropriate … working with Microsoft identity products, namely Active Directory and Entra ID. Extensive experience working in architecture or information security, with a significant focuson identityandaccess management. Current Azure certifications (e.g., Azure Security Engineer Associate). Strong knowledge of security and compliance standards and frameworks, such as ISO27001, MS CAF, and WAF. Excellent communication More ❯
Job Description IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of … live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … similar roles including in-depth troubleshooting, mentoring and managerial skills. KEY RESPONSIBILITIES 1. Provide strong and experienced leadership. 2. Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical workshops and 1:1 coaching sessions, to ensure alignment to business strategy. 3. Creation and maintenance of technical guides to convey facts … simply and effectively to both peers and those less experienced. 4. Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. 5. Balance technical fact/opinion against business risk/delivered service to provide well thought More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
BUSINESS ANALYST- IDENTITY& ACCESSMANAGEMENT BUSINESS ANALYST/IAM/IDENTITY & ACCESSMANAGEMENT/CYBER SECURITY/SAILPOINT IDENTITY IQ/SAP IDM/SAILPOINT ISC/CROWN JEWEL ASSET IDENTIFICATION/PROCESS MAPPING £350-400 Per Day-Umbrella 6 Months- Extensions Likely London/Remote … critical role in uncovering undocumented functionality, dependant business processes, identifying stakeholders, and translating business needs into high-quality, testable requirements. You will be supporting the Cyber Security Advisory Lead andIDAM Project Manager to take forward various activities which straddle project delivery and BAU risk reduction actions. Key Responsibilities: Lead end-to-end requirements gathering for the migration of identity … experience in being able to drive forward actions and being able to hold others accountable for actions assigned on behalf of the Lead Strong influencing and stakeholder management at senior levels Consultative approach in driving Cyber activities forward Desirable Experience: Experience in Identity & AccessManagement (IAM) or IdentityMore ❯
activities, ensuring tracking and reporting via AzureDevOps (ADO). Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccess … Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Key Responsibilities: Manage the Infrastructure and EUC change process, including identification, creation andmanagement of internal and external partner change. Ensuring maximum uptime and minimal operational impact to the business. Engage and support IT audit activities, through managementand collation … services to optimise efficiency, scalability, and security. Advocate for the adoption of automation, AI-driven security, and modern IT operations tools to enhance cloud performance. Ensure enforcement, reporting, andmanagement of vendor product lifecycles, for both legacy cloud assets and proposed cloud solutions. Provide support (technical and resource management) to the wider IT product teams. Vendor More ❯
roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
per annum Are you a technically adept security engineer with active DV (Developed Vetting) clearance and a passion for designing and enforcing identity, commission, andaccess control systems within secure IT environments? If so, Morela has an exciting opportunity for you. Morela is partnering with a leading UK consultancy operating across defence, intelligence, and critical national … infrastructure sectors. They are seeking a DV-cleared Security Engineer with expertise in commission (authorization policies) andaccess control within IT systems. This role merges technical security engineering with strategic oversight, delivering high-assurance access mechanisms for mission-critical systems. You'll join a dynamic team responsible for ensuring secure and compliant access across … UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning andaccess enforcement. Incident Management & Response Participate in access-related incident response, including unauthorized access investigations, root-cause analysis, and mitigation measures. Client Engagement More ❯
per annum Are you a technically adept security engineer with active DV (Developed Vetting) clearance and a passion for designing and enforcing identity, commission, andaccess control systems within secure IT environments? If so, Morela has an exciting opportunity for you. Morela is partnering with a leading UK consultancy operating across defence, intelligence, and critical national … infrastructure sectors. They are seeking a DV-cleared Security Engineer with expertise in commission (authorization policies) andaccess control within IT systems. This role merges technical security engineering with strategic oversight, delivering high-assurance access mechanisms for mission-critical systems. You'll join a dynamic team responsible for ensuring secure and compliant access across … UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning andaccess enforcement. Incident Management & Response Participate in access-related incident response, including unauthorized access investigations, root-cause analysis, and mitigation measures. Client Engagement More ❯
business analysis within the Identity & AccessManagement domain. The ideal candidate willbe a Subject Matter Expert (SME) in analysing and helping deliveridentity andaccessmanagement solutions,acrosssome ofthe following areas: Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally withgood conceptual/practical knowledge … of: AccessManagement (inc.Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged AccessManagement (PAM) Consumer Identity (CIAM) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM Knowledge ofintegrationsof IAM … technologieswould be beneficial but not compulsory. Comfortable w orking both as part of a team, orindividually, and familiar with the relevant non-technicalproject activities(i.e.,project planning,stakeholder management,changemanagement, schedule management, qualityassurance, etc) Detailed understanding of business processes and how they contribute to enterpriserisks Strong written and verbal communication skills Ability to act as an More ❯
Security Engineer, IdentityandAccessManagement (IAM) Meta's security team is the central engine driving data and systems security at the company, supporting Meta and all of its family of apps. The security organization is responsible for inhibiting malicious actors from compromising our environment, preventing, detecting and responding to them before they do … company, from the corporate infrastructure to production to external services, interfacing with nearly every team in the company.The Security Engineer should have prior experience with security policy, risk, andaccessmanagement disciplines and be experienced in collaborating with cross-functional teams. This position will be responsible for identifying and enforcing solutions to control access … our internal IAM solutions. This role requires a broad mix of security, technical, coding and communication skills coupled with a desire to learn. Security Engineer, IdentityandAccessManagement (IAM) Responsibilities Directly contribute to experiments, including designing experimental details, authoring reusable code, running evaluations, and organizing results Contribute to publications and open-sourcing efforts More ❯
Identity & AccessManagement domain. The Role This role will entail being involved in the analysis, design and delivery of identityandaccessmanagement solutions, strategy & process improvement, with a focus on areas such as : Identity Governance and Administration (IGA) IdentityManagement (IDM … Ideally with good conceptual/practical knowledge of: AccessManagement (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. SailPoint, Delinea, CyberArk, OpenText, or SAP IDM We are looking ideally for someone with the … IAM technologies, as described above Comfortable working both as part of a team or individually, and familiar with the relevant non-technical project activities (i.e. project planning, stakeholder management, change management, schedule management, quality assurance, etc.) Strong written and verbal communication skills Basic understanding of risk and control principles and how processes are implemented More ❯
The successful candidate will play a critical leadership role in delivering complex technical programs and driving key cybersecurity initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance. This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
, the Head of Privileged and Infrastructure AccessManagement, MD will lead the strategic direction, development, and implementation of the bank's Privileged and Infrastructure Access program. This role is critical in ensuring the secure management of privileged and machine identities, authentication, and authorization across all infrastructure platforms channels. The successful candidate … security functions in complex, regulated environments. Demonstrated success leading PAM in a multinational financial institution or critical infrastructure context. Deep knowledge of PAM technologies, zero trust principles, andidentity governance integration. Skills: Strong understanding of regulatory expectations in financial services related to identityand access. Ability to influence across technical and executive audiences globally. Exceptional … around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs andaccess to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. More ❯
Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role As an IAM Engineer you will be designing and implementing identity … solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identityandaccessmanagement team and act as a liaison to the wider business, providing SME knowledge on identityandaccessmanagement solutions. … of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged AccessManagement, Role Based Access Control andIdentity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to More ❯
About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privileged accessmanagement, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to … and maintain customer relationships at the executive and business decision-making level including but not limited to CISO, CIO, and other executives responsible for in IdentityandAccessManagement (IAM) and/or Identity Governance and Administration (IGA). Develop & present compelling business cases to customers, maintain expert-level knowledge of all … to penetrate new accounts and extend the reach of CyberArk's Modern IGA solution in the assigned geography. Qualifications 10+ years prior sales experience in IdentityandAccessManagement (IAM) and/or Identity Governance and Administration (IGA). In-depth knowledge on Identity Governance and Administration (IGA) best practices More ❯
Technologies: SAP Netweaver Data ManagementIdentityAccessManagement Worlflow Content Management Service Orientated Enterprise Integration Liferay JavaScipt Oracle Weblogic Jenkins Sparx Excellent contract opportunity for a Technical Architect to join an International client in the Pharmaceutical sector on an initial 3-month contract with long-term extension. The chosen candidate … and implementation of portal and workflow solutions, enterprise integration, SDLC technical standards & SDLC tools - configuration and management. Relevant professional expertise: (eg SAP (ERP, Basis, Netweaver, Portal) Master Data Management, IdentityAccessManagement, Workflow/Case management, Portal/Content Managementand Unified Communications) are desirable. Role-specific experience More ❯
number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of the firm. Essential Duties and Responsibilities for this IT Security … security-by-design principles into development processes. Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect … such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with IdentityAccessandManagement (IDAM) solutions. CyberArk and ENTRA ID Familiarity with conditional/remote access toolsets. ENTRA, DUO SSO & MFA gateway. Good knowledge in Network (Routing and Switching, WAN More ❯
Westminster, Greater London, England Hybrid / WFH Options
Parliamentary Digital Service
the security of our nation's democracy. It enables the UK Parliament to run smoothly, function efficiently and operate transparently, and when you join us as Lead Digital Identity Engineer, you'll focus on the design, implementation and maintenance of our core infrastructure platforms. We are seeking a highly skilled and experienced Lead Digital Identity Engineer … Authentication & Profiling. * Remote Access Solution such as Windows Direct Accessand/or Always On VPN. * Zero Trust Architecture concepts for IdentityandAccess Management. You provide technical direction, support developing strategy and roadmaps which strive for continuous improvement of digital identity services. You are a highly effective leader with … the Platforms Directorate that is responsible for delivering and maintaining Parliament's core digital identity services. The team plays a critical role in ensuring secure and seamless access to systems and services, supporting the identity lifecycle, access governance, authentication, and trust frameworks across a complex and high-profile environment. With a strong More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Parliamentary Digital Service
the security of our nation's democracy. It enables the UK Parliament to run smoothly, function efficiently and operate transparently, and when you join us as Lead Digital Identity Engineer, you'll focus on the design, implementation and maintenance of our core infrastructure platforms. We are seeking a highly skilled and experienced Lead Digital Identity Engineer … Authentication & Profiling. * Remote Access Solution such as Windows Direct Accessand/or Always On VPN. * Zero Trust Architecture concepts for IdentityandAccess Management. You provide technical direction, support developing strategy and roadmaps which strive for continuous improvement of digital identity services. You are a highly effective leader with … the Platforms Directorate that is responsible for delivering and maintaining Parliament's core digital identity services. The team plays a critical role in ensuring secure and seamless access to systems and services, supporting the identity lifecycle, access governance, authentication, and trust frameworks across a complex and high-profile environment. With a strong More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
INTEC SELECT LIMITED
and support of all applications across all areas of the business. You will lead and be collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical … workshops and 1:1 coaching sessions Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. Proactively initiate investigations for improvements for standard operating processes and procedures, utilising the current owned/licensed tools available, to evidence … Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package: £100,000 - £120,000 Basic Salary 20% bonus 15% Pension Excellent benefits More ❯