IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+ In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Warwick, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
Analyst/BA (IGA) Utilities Predominantly remote: Occasional travel to Warwick 6 months+ In short: We’re implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across …/IGA skills. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Warwickshire, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered. Please be More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
managing CyberArk core components ( PVWA,CPM,PSM vault ),EPM and SCA solutions. Strong understanding of cybersecurity principles, privileged accessmanagement, andIdentityandAccessManagement (IAM) Proficient in configuring and managing CyberArk components. Experience with integrating CyberArk solution with other IAM tools and Infrastructure. Strong knowledge of cloud platforms such … any programming languages . Professional certifications in CyberArk and/or information security (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) Must have CyberArk Implementation hands on experience. Privileged AccessManagement tool technical certification More ❯
Coventry, England, United Kingdom Hybrid/Remote Options
WEG Tech
Delivery Manager - (IDAM) - Hybrid 12 Months FTC Salary c£50,000 - £56,535 36.5 Hours Per Week 42 Days Holidays (Including Bank Hols) Hybrid Working – (1 – 2 Days in office per week) We are seeking an experienced … Delivery Manager for an exciting 12 Month FTC position within a leading university in the Midlands. We are seeking a Delivery Manager to lead strategic IdentityandAccessManagement (IDAM) implementation, supporting secure and seamless access to systems and data across academic, student and administrative communities The post will be working within … and effective delivery of the programme. You will also manage relationships with third-party suppliers, ensuring alignment with the University’s processes and monitoring SLAs, escalation procedures, and configuration management issues. Duties and responsibilities Project Delivery & Product Release Management Lead the planning, scheduling, implementation and tracking of project activities to ensure timely delivery of project andMore ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid/Remote Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
domains • Proven background as a Solution Architect in complex enterprise environments • Strong capability in Microsoft Azure (IaaS, PaaS) and cloud-native architectures • Knowledge of enterprise integration patterns and API management • Understanding of security, compliance, and data privacy best practices • Strong stakeholder engagement and communication skills • Ability to take ownership of technical challenges and deliver solutions • Knowledge of project … change • Experience working with third-party or offshore delivery teams Technology Experience • Microsoft Azure (IaaS, PaaS, Azure AD, Azure DevOps) • Windows 365, Microsoft 365, Power Platform • Integration technologies • Identity & AccessManagement • AI capabilities • Enterprise applications (document management, case management, CRM, finance) • Networking and infrastructure fundamentals • Agile and modern delivery methodologies More ❯
performance, scalability, resiliency, and upgradeability across environments. Champion DevOps practices (branching strategies, CI/CD pipelines, ATF automation) and oversee release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), data protection, auditability, and compliance with enterprise policies (e.g., ITIL/ISO/SoX/GDPR as applicable). Stakeholder Engagement Translate business objectives into target … set technical direction within cross-functional teams. Proficiency with integration patterns (event-driven, batch, near-real-time), MID Server, scripted APIs, and platform security. Excellent communication, leadership, and stakeholder management skills; able to work independently in a distributed, remote environment. Preferred Qualifications ServiceNow certifications: CSA , CAD , and one or more CIS (e.g., CIS ITSM , CIS ITOM , CIS CSM … latest ServiceNow family releases. Hands-on with CI/CD (GitHub/GitLab/Azure DevOps), ATF , automated quality gates, and environment strategy. Familiarity with identityandaccessmanagement (SSO/SAML/OIDC, SCIM), and enterprise integration tooling (e.g., MuleSoft , Kafka/Event Bus). ITIL v4 certification or equivalent practical experience. Self More ❯
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
Setups for various OCI Services including Oracle Analytics Cloud (OAC), Autonomous Databases (ADW/ATP), Oracle Integration Cloud (OIC) Environments Configure, Manage and Support Oracle IdentityandAccessManagement (IAM) Setups, including SSO Federation with identified IDPs and SPs in the customer landscape Collaborate with Security Architects, DBAs and Application Support Leads to address … and fix the identified vulnerabilities Manage the complete infrastructure using Terraform and Ansible toolsets Your Profile Key skills/knowledge/experience: Hands-on experience with configuration andmanagement of OCI Network Services and Components covering different OCI VCN topologies, Gateways, different types of route tables, security list Hands-on experience with Oracle Enterprise Linux Administration activities including … Security Setups Proven experience in large-scale data migration projects Expertise in Terraform, Ansible tool sets Experience with Oracle SaaS Environments and PaaS Services integrations Excellent communication and stakeholder management skills Desirable skills/knowledge/experience: Analytical and problem-solving mindset Strong leadership and mentoring capabilities Ability to manage multiple priorities in fast-paced environment Rewards & Benefits More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Context
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: * Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) * Monitoring vulnerabilities, investigating incidents and implementing corrective actions * Supporting patching compliance and vulnerability remediation * Ensuring security best practices are applied across networks, applications and systems * Participating in change … Cyber Essentials Plus and CAF Requirements: * A solid background in IT infrastructure and/or network engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest More ❯
and hands-on, maintaining and enhancing existing tools and controls, monitoring vulnerabilities and ensuring systems are patched and secure. Responsibilities: Managing and optimising security tools and platforms (SIEM, XDR, IDAM policies etc.) Monitoring vulnerabilities, investigating incidents and implementing corrective actions Supporting patching compliance and vulnerability remediation Ensuring security best practices are applied across networks, applications and systems Participating in change … ISO27001, Cyber Essentials+ and CAF Requirements: A solid background in IT infrastructure and/or network engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest More ❯