SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
incident response. Youll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
of IAC tools and best practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology Ability to write technical documentation More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
processes. What youll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity Verification Product Owner needs a … and make informed decisions. Here's a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including … Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk management principles and the More ❯
pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & AccessManagement (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially available IAM tools such … is proficient in directory services like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. The consultant is also proficient in developing scripts to automate the provisioning and migration of identities across … Cloud, OT, IOT and enterprise IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in IdentityandAccessManagement (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high-level and low-level design More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton. Hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
s critical information and relevant information systems, assuring the integrity, availability, authentication, confidentiality and non-repudiation. As well as the protection of information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Role Responsibilities Key responsibilities for this role may include: Lead and Manage all … the completion of IT Health Checks (ITHC) Co-ordinate and support with MOD and other authority assurance activities To support the Development and maintenance of our Information Security Management System (ISMS) to best support the Company's activities, including Risk Managementand Accreditation Document Sets (RMADS) and Company Security Policies. To examine any risks to the … Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, encryption, identityandaccessmanagement (IAM), and security information and event management (SIEM) systems. Strong understanding of security frameworks, standards, and regulations, including ISO 27001, NIST Cybersecurity Framework More ❯
Role: IdentityandAccessManagement (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement : Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business : Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement: Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business: Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Grantham, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
WOODLAND TRUST
successful completion of technology projects. Lead the delivery of technology infrastructure and its associated projects. Support with the Trusts technology governance process and takes ownership of the creation andmanagement of policies and procedures. Lead cloud solution design for new systems and migrations through implementation phase. Assess technical challenge and risks to identify and communicate solutions that resolve … and Azure Solutions Architect Expert. Youll have experience evaluating, designing and migrating on-prem servers and applications to the cloud. Youll have good knowledge in IdentityandAccessManagement (IAM) practices and solutions including Privileged Identify managements, Authentication policies and Network Security policies. Youll have experience in Azure including, Azure governance, Azure IaaS design … Azure PaaS design, Azure Resource Management, Azure Backup and Azure Site Recovery. Youll have effective communication skills with the ability to communicate complex ideas to stakeholders in the organisation. Benefits & Wellbeing: Joining our team means you'll be a big part of tackling environmental and climate issues. We take good care of our staff, offering support and training More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
Hays
ll need to succeed Extensive understanding of Azure, Sentinel, MS Defender, Autopilot and Intune Success in leveraging traditional best practices such as ITIL Experience of identityandaccessmanagement, and end user device management Experience of delivering against cyber security roadmaps Experience building threat intelligence and horizon scanning tools Strong communication skills More ❯
Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays
ll need to succeed Extensive understanding of Azure, Sentinel, MS Defender, Autopilot and Intune Success in leveraging traditional best practices such as ITIL Experience of identityandaccessmanagement, and end user device management Experience of delivering against cyber security roadmaps Experience building threat intelligence and horizon scanning tools Strong communication skills More ❯
architecture solution designs that meet business requirements and leverage cloud-native patterns including microservices, containerization, event-driven architecture, and serverless. Design and integrate shared platform services such as Identity & AccessManagement (IAM), API Gateways, Master Data Management (MDM), observability tooling, and payment integration. Develop and maintain solutions architecture artefacts including reference architecture More ❯
good code and software architecture. Work Ethic: Hands-on mentality. Preferred requirements Cloud Computing: Strong experience with AWS services, particularly ECS, EC2, Lambda, and AWS IdentityandAccessManagement (IAM). Governance Understanding: Understanding of governance for cloud-based and AI solutions (e.g., SOC2, ISO 42001, EU AI Act). ML Frameworks: Experience with More ❯
NHS Spine-enabled Electronic Patient Records (EPR), as well as key components of the Electronic Staff Record (ESR). Our work is essential in managing user identities and ensuring secure access to both trust and national resources, alongside the ongoing maintenance and configuration of NHS Spine applications. We are seeking two team-oriented individuals with a strong desire … Customer Care/Service Desk Service to users. Knowledge Essential Working knowledge of Microsoft Office applications. Awareness of Data Protection and Confidentiality legislation. Awareness of IdentityandAccess Management. Awareness of Digital Service Management processes/procedures/methodologies. Desirable An understanding of NHS Information Governance standards. An understanding of NHS Cyber Security principles. … Awareness of IdentityandAccessManagement within the NHS. Awareness of Project Management principles. Skills Essential Confidence to challenge inappropriate practices or breaches of policy/procedure with integrity, tact and sensitivity. Ability to plan, prioritise and re-organise conflicting workload whilst helping to support the rest of the team, during times More ❯
certification activities related to ISO 27001:2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification andmanagement with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure organizational compliance. Orchestrate continual improvement … deficiencies or opportunities for improvement and facilitate development of pragmatic solutions. Work with the DPO to ensure appropriate security is applied to data and provide reports/subject access requests. Design and deliver continual education and training to our colleagues to support them in identifying risks in their day-to-day operations, using Phishing Simulations and awareness campaigns. … promote security best practices across the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Managementand IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of Three Lines of Defence Model More ❯
week) Duration: 6 Months Engagement: Umbrella Only Overview: We are seeking a Service Designer to join a Government programme, a major cross-government initiative aimed at simplifying and securing access to public services. This role is ideal for an experienced service designer with strong collaboration, communication, and design thinking skills who thrives in complex, fast-paced environments. Key … non-technical audiences. Desirable: Experience working on public sector or government digital services programmes. Familiarity with GDS (Government Digital Service) standards and principles. Understanding of identityandaccessmanagement services or similar secure user systems. All profiles will be reviewed against the required skills and experience. Due to the high number of applications we More ❯
across digital platform (iOS, Android, APIs, Multi Channel Authentication)./li li Security and Compliance Testing Awareness, deep understanding of security risks related to identityandaccessmanagement including vulnerability validation for data masking, encryption and authentication failures)./li/ul p Some other highly valued skills may include:/p … ul li Test Data Management & Service Virtualization (Experience with Service Virtualization tools to simulate third party APIs (Onfido, Equifax, FraudNet) and creating reusable, compliant test data sets)./li li CI/CD & DevSecOps Alignment (Understanding of integration pipelines, role in quality gates (Sonar, mutation testing) and supporting team with deployment readiness metrics (stability, defect leak rate More ❯