IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Lead IAM/PAM TesterUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong IAM/PAM Tester who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU … to Project Managers and Test Leads throughout the testing lifecycle In addition to the above responsibilities, the IdAM Test Analyst must have proven experience testing IdentityandAccessManagement (IdAM) systems. This includes the ability to validate: User Authentication: Login/logout flows, password policies, MFA, and account lockout User Authorisation: Correct access … Role Management: Creating, editing, and deleting user roles and their associated permissions Policy Enforcement: Testing correct application of access policies under varied conditions Experience with IdAM tools is required , including (but not limited to): Microsoft Entra CyberArk SailPoint ServiceNow Savyint Candidates will ideally show evidence of the above in their CV in order to be considered.Please More ❯
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised More ❯
PAM Business Systems AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong PAM Systems BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … Vendors. Please only apply if you have delivered a PAM implementation. In full: PAM (Privileged AccessManagement) System Analyst is an IT security professional who analyses, designs, and implements solutions to control, monitor, and secure privileged accounts, which are accounts with elevated access to an organisation's critical systems and data. This role involves … analyse business needs and translate them into technical requirements. Communication: Excellent verbal and written communication skills for interacting with diverse stakeholders. Technical Knowledge: Understanding of identityandaccessmanagement (IAM), security principles, and potentially specific PAM tools (Cyberark, TPAM, BeyondTrust) Project Management: Ability to work on project deliverables and manage requirements through More ❯
The Role This role involves the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security … scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: * Design, Implementation and Deployment: o Install, configure, and deploy ForgeRock and PingOne AIC components in various environments (on-premise, cloud, hybrid). o Develop custom workflows, authentication/authorization policies, and integrations using … with the IAM platforms. o Automate deployment and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. * Managementand Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to identify and resolve More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Robert Walters
of systems Hands on, automation, cross-functional collaboration Manage Azure and M365 Cloud Platforms Oversee enterprise application stack - M365, Azure, Atlassian, Telephony, IT Service tools Manage/Develop IdentityandAccessManagement solutions Identity/Automate tasks - streamline workflows Implement/Manage monitoring tools Troubleshoot and Incident Response: Investigate, Resolve issues Security … systems procedures CI/CD Support: Implementation of Continuous Integration/Deployment pipelines Provide tech config on cyber security controls Lead tech implementation of enterprise solutions Provide daily management of digital workplace tech stack Act as senior escalation point Tech Ops Engineer: Technical Skills Networking, Azure Cloud Platforms, AVD Virtualization, M365 Collaboration solutions Experience to Azure and M365 More ❯
You’ll work both autonomously and collaboratively, gaining exposure to a wide range of services and technologies including: Microsoft Azure Active Directory (Azure AD) for identityandaccessmanagement Microsoft Intune for device managementand endpoint security Microsoft Configuration Manager (ConfigMgr/SCCM) for software deployment and patching Jamf Pro for managing … Apple macOS and iOS devices Virtualisation platforms and mobile device management tools Main Accountabilities: Deliver excellent customer service with strong communication skills Act as a first point of contact on the Service Desk, handling IT-related issues via telephone, email, and desktop support Build relationships and collaborate with teams across the business Support and manage critical business applications … Passionate about technology and eager to learn Strong analytical and troubleshooting skills Ability to work independently and as part of a team Interest in enterprise IT environments and modern device management The placement will be for 1 year, starting in the summer of 2026. To be considered for this Student Placement, please apply to this advert and submit More ❯
Derbyshire, Burton upon Trent, Staffordshire, United Kingdom
Amtis Professional Ltd
logging systems (e.g. Datadog, Logic Monitor, SolarWinds) Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform Ensure compliance with security policies; manage IAM, PIM and RBAC access controls Respond to incidents and contribute to root cause analysis and post-mortem reviews Create and maintain comprehensive documentation and runbooks Collaborate with cross-functional teams to align … Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secrets management for containerized applications Azure Policy for Kubernetes: Implement … governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid grasp of cloud security best practices, identityandaccessmanagement, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
Burton-On-Trent, Staffordshire, West Midlands, United Kingdom
Amtis Professional Ltd
logging systems (e.g. Datadog, Logic Monitor, SolarWinds) Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform Ensure compliance with security policies; manage IAM, PIM and RBAC access controls Respond to incidents and contribute to root cause analysis and post-mortem reviews Create and maintain comprehensive documentation and runbooks Collaborate with cross-functional teams to align … Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secrets management for containerized applications Azure Policy for Kubernetes: Implement … governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid grasp of cloud security best practices, identityandaccessmanagement, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
and platform capabilities Design and implement scalable, secure security architectures for Microsoft Azure-based services and applications Define and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, and monitoring Collaborate across teams to ensure consistent implementation of security controls and governance frameworks Lead risk assessments, threat modelling exercises, and … Experience working in hybrid and multi-cloud environments Knowledge of DevSecOps practices and Infrastructure-as-Code (IaC) security tools (e.g., Terraform, Bicep) Why join us Career coaching, mentoring andaccess to upskilling throughout your entire FDM career Assignments with global companies and opportunities to work abroad Opportunity to re-skill and up-skill into new areas, develop non More ❯