Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
supporting systems it will need to integrate with as part of the end-to-end journey. Project Overview: Our client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand … API Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end … governance processes. ? Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation. ? Present publications at technical design authorities for input, feedback, and approval. Risk and Dependency Management: ? Effectively manages and escalates both technical and project risks or issues. ? Articulates solutions and remediation steps to technical risks & issues. ? Ability to map design decisions to resultant technical More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
days in the office is mandatory End Date: 30th November (renewal end of Nov) £567 Project Overview: The client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API … Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). The client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead … to-end journey. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud. Broad background across information technology with the ability to communicate clearly with non-security More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
IdentityAccess Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identityandaccessmanagement (IAM) solutions across a large-scale enterprise environment, as part of our clients strategic migration project. Day-to-day of the role: Lead the architecture … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP IdentityManagement (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture andidentity & accessmanagement to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful … practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & AccessManagementand Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged AccessManagement (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out for a confidential discussion. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
rolling 6 months We are seeking an experienced IAM Technical Analyst to join a leading financial services organisation. This role will be part of a large-scale Cybersecurity andIdentity & AccessManagement (IAM) programme, delivering business-critical solutions across a complex and highly regulated environment. Key Responsibilities Gather requirements across the IAM stack, working … ensuring on-time, high-quality outcomes. Operate as a self-sufficient, proactive team player within a large programme environment. Key Skills & Competencies Deep understanding of IdentityandAccessManagement (IAM), including: Authentication Governance AccessManagement Privileged AccessManagement Strong analysis and requirements-gathering skills in a … technical environment. Process mapping expertise, with proficiency in MS Excel, Visio, and Confluence. Experience delivering within large-scale Cybersecurity and IAM programmes. Excellent stakeholder managementand communication skills, with the ability to engage effectively across global, cross-functional teams. Strong presentation skills, able to clearly communicate progress and delivery roadmaps. Knowledge of financial services and the regulatory environment More ❯
/10/2025 Job Type: Contract until end of the year with potential extension Role Description: Our client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API … Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to … sharing solutions at design authorities and senior leadership & stakeholders as well as working with global teams to both explain the design and agree designs related to the Password Management of new Technologies. More ❯
days weekly from office) We at Cofoge are looking for Technical Business Analyst in Sheffield. Project Overview Top bank is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement , Access Governance , Secrets Managementand API More ❯
rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering … the future direction of secrets management within the bank Enabling identity sharing and single sign-on across different organisations or domains. Securing, controlling, and monitoring access to critical systems by privileged users. Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. CISSP/CISM certification SABSA or TOGAF certified preferred If you are interested More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged AccessManagement (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments … decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & Dependency Management Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME across IT … transformation teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & AccessManagement (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQor SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level Design … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQ or SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
database, LDAP, IIS 7.x, Jboss and webservers such as apache and iplanet webserver. CHEF, IBM WebSphere application server, Inspec, Splunk, CA Wily. Sound knowledge in Identityandaccessmanagement tools, IBM Security/Tivoli Access manager, IBM Security/Tivoli directory server, RSA access manager, RSA entitlement server, Active directory More ❯
the delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethical hacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and … other regulatory frameworks. This role also involves reporting on cyber threats and performance using Power BI, supporting penetration testing, and contributing to the development of secure IT architecture andaccess control policies. What you'll need to succeed Extensive experience administering the Azure platform and Microsoft security tools (Defender, Sentinel, Intune, Autopilot). Strong understanding of cyber security … frameworks including ISO27001, Cyber Essentials+, and the Cyber Assessment Framework. Proven experience in identityandaccessmanagement, end-user device management, and working with external SOCs. Ability to deliver against cyber security roadmaps, respond to incidents, and remediate vulnerabilities. Experience in building Power BI dashboards and writing security policies and SOPs. A More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
Security Project Manager to lead governance and orchestration across our client's strategic Active Directory (AD) Resiliency Programme. This programme includes nine critical workstreams aimed at strengthening infrastructure, access controls, and overall cyber posture. Day-to-day of the role: Lead end-to-end project management across multiple AD resiliency workstreams, including Conditional Access … security standards and regulatory obligations. Required Skills & Qualifications: Proven experience delivering complex cyber security or infrastructure programmes in large enterprise environments. Understanding of Active Directory, identityandaccessmanagement, and enterprise IT architecture. Exceptional governance , planning , and stakeholder management skills . Ability to manage multiple concurrent workstreams with competing priorities . Experience More ❯
largest, most complex and technically innovative programmes in the industry. Key Skills/Experience Minimum 2 years hands-on experience with Azure cloud services, including identityandaccessmanagement, cloud networking, and security implementations. Minimum 2 years hands-on experience with Terraform and Infrastructure as Code methodologies in enterprise environments 6+ months experience with … supported as part of learning and development. A range of retail discounts to enhance your lifestyle, encompassing restaurants, supermarkets, travel, leisure activities and health and well-being services. Access to our Employee Resource Groups, our groups represent diverse backgrounds and provide a platform for colleagues to connect, learn, and support one another. Company information Join Netcompany, where we More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. IdentityandAccessManagement (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
for a Systems Engineer to join their IT team and play a key role in their shift to a cloud-first infrastructure. You'll help modernise their endpoint management, support collaboration tools & strengthen critical identityandaccess frameworks. This is a hands-on technical role, ideal for someone confident working with Microsoft 365, Intune … ideally an SME in this area), and cloud identity systems. The role is paying up to £50k + 8% bonus (flex upwards on base salary for the right candidate) and will be ideally based close enough to Durham, to commute a couple of days a month into the office (flexible). Must Haves: - Experience in a Systems Engineer … or Endpoint Management role. - Hands-on experience with Microsoft Intune and endpoint management across diverse OS/device types. - Proficiency in Microsoft Entra ID (Azure AD), identity, andaccess management. - Experience with M365 administration and configuration. - Strong problem-solving and interpersonal skills with a customer-first mindset. Nice to Haves: - Experience with More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
scripting or programming languages relevant to test automation (e.g., Python, Bash, or JavaScript). Cloud Architecture: A deep and comprehensive understanding of cloud principles, architecture, networking, security, andidentityandaccess management. Agile/DevOps Practices: A strong background in modern agile and DevOps methodologies, with a demonstrable ability to integrate and improve CI/CD … practices (e.g., GitLab CI). Communication & Leadership: Exceptional communication, collaboration, and stakeholder management skills, with a proven ability to provide technical leadership and mentor colleagues. Experience with containers and orchestration tools (e.g., Docker, Kubernetes). Extensive knowledge of monitoring and observability tools (e.g., Prometheus, Grafana). A strong background working with large-scale digital transformation projects in the More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
documentation. Document software systems, APIs, workflows, and development processes in alignment with internal style guides and standards. Create and deliver engaging PowerPoint presentations for training, stakeholder communications, andmanagement briefings. Ensure consistency, accuracy, and clarity across all written materials and presentations. Contribute to knowledge management systems and support continuous improvement in documentation practices. Review and edit … systems. Education & Experience Extensive experience in technical writing, process documentation, or software engineering-related roles. Good knowledge of cybersecurity concepts, best practices, and current industry trends. Mandatory Skills: IDAM Business Analysis . Experience: 8-10 Years . More ❯