IdentityandAccessManagement Senior Manager page is loaded IdentityandAccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End … left to apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: IdentityandAccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally … R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user accessMore ❯
IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent … all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. … : Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentityMore ❯
Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged accessmanagement, identityaccess governance, and incident response across my client’s banking arm and securities business under a … dual-hat arrangement. Role Responsibilities: Lead and oversee Privileged AccessManagement (CyberArk) andIdentityAccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access … and implement remediation plans. Essential Skills and Experience: Experience in cyber security operations, identityaccessmanagement, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations More ❯
london, south east england, united kingdom Hybrid / WFH Options
Intec Select
Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged accessmanagement, identityaccess governance, and incident response across my client’s banking arm and securities business under a … dual-hat arrangement. Role Responsibilities: Lead and oversee Privileged AccessManagement (CyberArk) andIdentityAccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access … and implement remediation plans. Essential Skills and Experience: Experience in cyber security operations, identityaccessmanagement, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations More ❯
IG and DS Strong experience in PingOne Advanced Identity Cloud with experience in designing implementing and managing scalable identityandaccessmanagement IAM solutions Should have experience in integrating PingOne Advanced Identity cloud with existing Applications and infrastructure in place … Identity Cloud and Ping Gateway ForgeRock IG Minimum 5 years experience in Design development and implementation of ForgeRock IdentityandAccessManagement solutions using both on Prem and ForgeRocks Identity Cloud Suite Must have done multiple implementation IntegrationMigration projects in … the Vendor side Strong experience with ForgeRock Identity Platform components including Identity Gateway IdentityManagementandAccessManagement Indepth knowledge on ForgeRock Identity Platform Identity Manager Access Manager Java JavaScript Groovy Scripts More ❯
south west london, south east england, united kingdom
InfinityQuest Ltd,
IG and DS Strong experience in PingOne Advanced Identity Cloud with experience in designing implementing and managing scalable identityandaccessmanagement IAM solutions Should have experience in integrating PingOne Advanced Identity cloud with existing Applications and infrastructure in place … Identity Cloud and Ping Gateway ForgeRock IG Minimum 5 years experience in Design development and implementation of ForgeRock IdentityandAccessManagement solutions using both on Prem and ForgeRocks Identity Cloud Suite Must have done multiple implementation IntegrationMigration projects in … the Vendor side Strong experience with ForgeRock Identity Platform components including Identity Gateway IdentityManagementandAccessManagement Indepth knowledge on ForgeRock Identity Platform Identity Manager Access Manager Java JavaScript Groovy Scripts More ❯
IG and DS Strong experience in PingOne Advanced Identity Cloud with experience in designing implementing and managing scalable identityandaccessmanagement IAM solutions Should have experience in integrating PingOne Advanced Identity cloud with existing Applications and infrastructure in place … Identity Cloud and Ping Gateway ForgeRock IG Minimum 5 years experience in Design development and implementation of ForgeRock IdentityandAccessManagement solutions using both on Prem and ForgeRocks Identity Cloud Suite Must have done multiple implementation IntegrationMigration projects in … the Vendor side Strong experience with ForgeRock Identity Platform components including Identity Gateway IdentityManagementandAccessManagement Indepth knowledge on ForgeRock Identity Platform Identity Manager Access Manager Java JavaScript Groovy Scripts More ❯
in helping to shape our client's transformation journeys. What you'll be doing: You will use your background in IdentityandAccessManagement, and … Privileged AccessManagement to support our clients by: Working within agreed timelines on the design & implementation phases to identify and unpack IDAM requirements, evaluate client IDAM solutions, define IDAM designs, support integration, configuration and testing of IDAM solutions and platforms. Leveraging core competence and industry standards … frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low Level). User Profiles More ❯
Identity & AccessManagement (I&AM) Analyst | Permanent London/Southampton | Hybrid | Competitive Salary VIQU are partnering with a transformative wealth management organisation. They're seeking an Identity & AccessManagement (I&AM) Analyst to join their Technology … ll drive efficient I&AM processes while identifying and implementing innovative solutions. Key Responsibilities: - Design and administer frameworks for managing user identities, accounts andaccess privileges - Execute and enhance Joiners, Movers & Leavers (JML) processes - Manage automated approval workflows and periodic recertification processes - Develop I&AM systems alongside IT … and training to fulfilment teams Required Skills & Experience: - Proven experience in I&AM process development and fulfilment - Strong knowledge of IT Security and Service Management best practices - Proficiency with Microsoft AD, Entra, and ServiceNow - Outstanding analytical and problem-solving capabilities - Excellent stakeholder managementand communication skills More ❯
IdentityAccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an IdentityAccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in … big plus Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privileged access management. Understanding of broader Information security principles Experience leading small teams More ❯
IdentityAccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an IdentityAccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in … big plus Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privileged access management. Understanding of broader Information security principles Experience leading small teams More ❯
EITHER CDE Certification within Privileged Cloud or the Guardian Cert. key responsibilities are as follows: Providing subject matter expertise in IdentityandAccessManagement (IAM), specifically in CyberArk Leading transformations in areas such as identity governance, privileged accessmanagement, accessmanagementand customer identityaccessmanagement Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback If this is of interest, please submit More ❯
so that we're able to interact and collaborate in person. About the Role As an IAM Engineer you will be designing and implementing identity solutions across a variety of … SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identityandaccessmanagement team and act as a liaison to the wider business, providing SME knowledge on identityandaccess … including authentication protocols, Identity Lifecycle Management, Privileged AccessManagement, Role Based Access Control andIdentity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using tools such as Terraform Experience of More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with … in: Identity Governance Privileged AccessManagement (PAM) AccessManagement Customer IdentityandAccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently - both written and verbal - to deliver More ❯
external services, interfacing with nearly every team in the company. Position Overview The Software Engineer should have prior experience with security policy, risk, andaccessmanagement disciplines and be comfortable collaborating with cross-functional teams. This position will be responsible for identifying and enforcing solutions to … the security of Identity & AccessManagement Systems Build and maintain tools that improve the IdentityandAccessManagement posture. Conduct design and code reviews, analyze and improve efficiency, scalability, and stability for assigned product area and/or … Participate in cross-functional, team, and status review meetings Recommend process improvement and strategic initiatives as related to security. Preferred Qualifications Program and project management skills Experience in the IAM domain in a cloud-based infrastructure environment Good grasp of SOX, SOC2, NIST, PCI, ISO, and other security More ❯
Position: Senior IdentityandAccessManagement (IAM) Specialist Experience: 15+ Years (10+ Years with ForgeRock/PingOne Identity Cloud) Location: [London, Hybrid] Role Overview: We are seeking a highly experienced Senior IdentityandAccessManagement (IAM … Specialist with over 15 years of professional experience, including 10+ years specializing in ForgeRock and PingOne Identity Cloud solutions. The ideal candidate will possess deep technical expertise, strong leadership capabilities, and a passion for delivering secure and scalable identity solutions. Key Responsibilities: Lead the design, setup … and support to team members. Required Skills and Qualifications: 15+ years of experience in IT with a strong focus on IdentityandAccess Management. 10+ years of hands-on experience with ForgeRock and PingOne Identity Cloud. Proficiency in configuring and administering ForgeRock OpenAM, OpenDJ More ❯
london, south east england, united kingdom Hybrid / WFH Options
KBC Technologies Group
Position: Senior IdentityandAccessManagement (IAM) Specialist Experience: 15+ Years (10+ Years with ForgeRock/PingOne Identity Cloud) Location: [London, Hybrid] Role Overview: We are seeking a highly experienced Senior IdentityandAccessManagement (IAM … Specialist with over 15 years of professional experience, including 10+ years specializing in ForgeRock and PingOne Identity Cloud solutions. The ideal candidate will possess deep technical expertise, strong leadership capabilities, and a passion for delivering secure and scalable identity solutions. Key Responsibilities: Lead the design, setup … and support to team members. Required Skills and Qualifications: 15+ years of experience in IT with a strong focus on IdentityandAccess Management. 10+ years of hands-on experience with ForgeRock and PingOne Identity Cloud. Proficiency in configuring and administering ForgeRock OpenAM, OpenDJ More ❯
the Cyber and Resilience landscape including cyber threat management, cyber program management, strategy development, cyber transformation, identityandaccessmanagement, maturity assessments, data protection, privacy, and operational Resilience. EY's EMEIA Cyber Practice is rapidly growing and the UK team … of almost 8,000 professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identityandaccessmanagement, security architecture, data protection and privacy, and resilience services. At EY, we have large scale plans to expand our already … combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identityandaccessmanagement, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable solutions and translate security andMore ❯
responsible for protecting the organization's workforce and systems through proactive security engineering, governance, and monitoring. Within this team, the IdentityandAccessManagement (IAM) function focuses on securing employee access to enterprise systems, enforcing governance policies, and reducing identity … infrastructure, with a strong emphasis on SailPoint and zero trust principles. Your Impact: Design, implement, and manage identity lifecycle andaccess governance processes to support a secure and scalable IAM capability across the organization. Develop and configure SailPoint IdentityNow workflows, rules, connectors, and integrations … function within a growing team, with opportunities to shape its long-term direction and scalability. Your Qualifications: Solid experience in identityandaccessmanagement, ideally within a large or enterprise-scale organization. Extensive experience implementing and supporting SailPoint IdentityNow, including workflow development and connector More ❯
Analyst will sit in the PAM Governance sub-function in Cyber A&E. This role is responsible for designing and maintaining automated and manual privileged access controls for all aspects of privileged access including non-human accounts and privileged human accounts. Our work requires us to … guidance for onboarding their privileged access to CyberArk and/or Hashicorp. Respond to lines of defense queries about controls and privileged accessmanagement policies and procedures. Maintain documentation for privileged access policies and procedures. Attend vendor training and customer support events … Windows and Linux and accounts management on these systems are preferred. Cybersecurity Training: Experience with or knowledge of IdentityandAccessManagement/Privileged AccessManagement concepts and best practices. Required Qualifications: Candidates should have a BS/ More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … risk requirements. Technical Skills: Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Framework Expertise: Strong knowledge More ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all … on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or … and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯