and execute the organisation’s Identity & AccessManagement (IDAM) strategy to improve employee experience, productivity, and cyber resilience Lead the selection, implementation, and optimisation of IDAM technology solutions, ensuring seamless integration with existing systems and infrastructure Drive and deliver a major transformation programme focused on modernising identityandaccessmanagement … lifecycle of the IDAM Product, including budget management, change control, and obsolescence planning Ensure compliance with all relevant regulations and cyber standards, maintaining a robust and secure identity environment You’ll also have people management responsibilities in this role and will be directly hiring a number of key roles … to support programme execution Your skills and experiences: Essential: Significant experience of working in an IT Function within a complex environment Significant experience of managing identityandaccessmanagement in a relevant field Experience with enhancing and developing technical capability which will be applied across a range of large, complex, high value and strategically More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
to accessing the Trust IT Applications. This includes secure password management, ensuring access is granted, modified, or withdrawn in line with service requests, and that access controls are in place to protect patient and staff data. In addition to overseeing these activities, the Supervisor will also be actively involved in carrying out the day … supporting information systems and accurately applying and maintaining access controls. Evidence of writing and implementing operational process/procedures Familiarity with access control systems andidentitymanagement protocols Desirable Administration of a Health Information Systems NHS experience Administering access to SaaS/Office 365 products Management of NHS … supervisory skills with the ability to guide a team in delivering secure and efficient IT system access services Knowledge of IT system administration processes, security practices, andaccess control policies Excellent communication skills to interact with staff across various departments and ensure effective collaboration Detail-oriented with a focus on accuracy, compliance, and documentation Problem-solving More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the IdentityandAccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management … access reconfiguration and operational handover. Deep expertise in Identityandaccessmanagement, Privileged accessmanagementand secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
standards. Access Control Implementation: Define and enforce role-based and attribute-based access controls (RBAC/ABAC) across data platforms, ensuring least privilege and zero standing access principles are applied. Lifecycle Management: Oversee provisioning, modification, and de-provisioning of user access in response to joiner, mover, and leaver events, integrating … the way we meet the ever-changing needs of our 26 million customers. We're growing with purpose. What you'll need: Proven experience in identityandaccessmanagement (IAM), preferably in a cloud-first or hybrid environment. Understanding of data protection principles, including GDPR, and their application in access governance. Familiarity … Locations time type Full time posted on Posted Yesterday time left to apply End Date: August 28, 2025 (20 days left to apply) Head of IdentityandAccessManagement Operations locations 5 Locations time type Full time posted on Posted 16 Days Ago time left to apply End Date: August 9, 2025 (1 day More ❯
IAM (IdentityAccessManagement) Analyst We are urgently require a detail-oriented and security-focused IAM (IdentityandAccessManagement) Analyst to work for our prestigious client. The IAM Analyst will be part of the team that is responsible for access governance of their IT estate … provisioning and de-provisioning of system accessand also performing User Access & Privileged Access Reviews. Key Responsibilities: Administer user provisioning, de-provisioning, andaccess changes across various systems and applications. Provision IT systems access to users in accordance with the joiner process and within agreed Service Level Agreements (SLAs) De … provision users IT systems access in accordance with the leaver process and within agreed policy requirements. Troubleshoot access issues and work with internal teams to resolve user access problems. Collaborate with IT Security, HR, and business units to support onboarding, offboarding, and changes to user access. This is an umbrella only contract and requires More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
Business Analyst – Identity & AccessManagement (IAM) Migration Programme Location: Sheffield (Hybrid working model, 3 days in the office) Contract Duration: 6 Months, Initially Job Type: Contract Start Date: October 2025 Interview Schedule: Interviews will be conducted in September We are seeking three experienced Business Analysts to join a strategic migration project for a prestigious … client. This role involves transitioning from legacy identity systems to a unified platform, enhancing cybersecurity and operational efficiency. Day-to-Day Responsibilities: Lead end-to-end requirements gathering for the migration from SailPoint IIQ and SAP IDM to SailPoint Identity Security Cloud (ISC). Conduct thorough stakeholder analysis and engagement to uncover undocumented users, processes, and … and data flows. Translate business needs into high-quality, testable requirements and develop corresponding test cases. Work autonomously to advance analysis and support the testing lifecycle. Facilitate change management by helping stakeholders understand the benefits and strategic goals of the migration. Required Skills & Qualifications: Extensive business analysis experience in complex enterprise environments. Demonstrated ability to produce detailed, testable More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oliver James
IDAM Solution … Architect - Outside IR35 - London - Financial Services/Insurance We're working with a leading financial services and insurance client who are looking for an experienced IdentityandAccessManagement (IDAM) Solution Architect to join them on a long-term Outside IR35 contract. This is a hybrid role, with 1-2 days a week onsite … You'll work closely with stakeholders, technical teams, and vendors to ensure solutions meet business needs and align with security best practices. Key Experience: Strong background in IAM/IDAM architecture and delivery. Understanding of accessmanagement, identity lifecycle, and governance. Experience with application onboarding and migration. Exposure to hybrid and multi-cloud environments. More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Frontier Agriculture Limited
working locations. The successful candidate will be concerned with the shaping, directing and day to day running of Frontiers IAM processes including internal/external audit support and MI (Management Information) reporting to the IT Senior Leadership Team. At Frontier, the Technology Team strive to deliver brilliant experiences for customers and colleagues. We want to hear from passionate … Active Directory, Entra AD, SSO, MFA, Secret Server) Knowledge of IAM processes (e.g. SLIM, RBAC, SoD, Compromised Access) Problem solving and reasoning skills Communication, collaboration and stakeholder management skills Leading others and prioritising workloads Facilitating access related audit requirements Experience of Microsoft products (e.g. Office, Teams, SharePoint, Outlook) Effective team player, taking ownership, sharing … Manager, your role will involve shaping, implementing and directing the day-to-day IAM processes. (leading where necessary, doing when required): Establishing controls for authentication, authorisation and user management, including: Provisioning of unique identities digitally tied to individuals (SSO, SAP, ERP etc) Maintaining policy compliance for privileged accessand service accounts Maintaining user compliance across More ❯
Employment Type: Permanent, Work From Home
Salary: Competitive + Benefits + 25 Days Holiday + Employee Assistance Program
Job title: Data Products Access Governance Manager Location: Leeds, Bristol or Edinburgh Salary: Pay Group 4E Hours: Full time Working Pattern: Our work style is hybrid, which involves spending at least two days per week, or 40% of our time, at one of our office sites. About this opportunity: We're looking for a dynamic, motivated, forward-thinking … standards. Access Control Implementation: Define and enforce role-based and attribute-based access controls (RBAC/ABAC) across data platforms, ensuring least privilege and zero standing access principles are applied. Lifecycle Management: Oversee provisioning, modification, and de-provisioning of user access in response to joiner, mover, and leaver events, integrating … training materials and guidance to promote awareness of accessmanagement responsibilities across the organisation. What you'll need: Proven experience in identityandaccessmanagement (IAM), preferably in a cloud-first or hybrid environment. Understanding of data protection principles, including GDPR, and their application in access governance. Familiarity More ❯
the team. Reporting to the Head of IT Security, the Security Access Analyst role is integral to the managementand integrity of network and system access within the group. You will be responsible for ensuring that access rights are granted according to role-based access control (RBAC) principles and are … and adjustments under guidance Assist in utilising automated tools or mechanisms to facilitate periodic access reviews within specific operational domains Aid in defining RBAC roles, permissions, andaccess levels aligned with business needs The ideal candidate for the role of Security Access Analyst will have: A Level or higher qualification in Computer Science, Information … increasing responsibility Possess an analytical mind-set, enabling the assessment of security risks and formulation of appropriate mitigation strategies Knowledge of accessmanagement solutions andidentitymanagement protocols Good analytical skills to interpret access data and identify security risks Awareness of regulatory requirements affecting access controls, such as More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
changes in cybersecurity and IAM improvements in technologies. Build and maintain methodology and technology used to implement Identity Governance and Administration (IGA) andIdentityandAccessManagement (IAM) systems including SSO. MFA, Provisioning/Reconciliation, Federations, Access reviews. In-depth knowledge of multifactor authentication (MFA) architectures, Role-based Access … of a team when required. Work collaboratively within Infrastructure Services and other IT functions to ensure effective managementand delivery of Security andIdentityandAccessManagement services. Provide a clear documentation for services and projects. You will need to demonstrate the following skills and experience; Minimum of 3 years of experience … in IT/Cyber Security roles. Microsoft Security Stack experience, i.e, Entra ID, Defender Suite or Sentinel, Azure Security. Good understanding of Microsoft identityandaccessmanagement (IAM) concepts and technologies, including EntraID and MFA. Experienced with Zero Trust Security. Experience with security frameworks and standards such as CyberEssentials Plus. Microsoft Azure experience. Experience More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Reed Professional Services
Business Analyst – Identity & AccessManagement (IAM) Migration Programme Location: Sheffield (Hybrid working model, 3 days in the office) Contract Duration: 6 Months, Initially Job Type: Contract Start Date: October 2025 Interview Schedule: Interviews will be conducted in September We are seeking three experienced Business Analysts to join a strategic migration project for a prestigious … client. This role involves transitioning from legacy identity systems to a unified platform, enhancing cybersecurity and operational efficiency. Day-to-Day Responsibilities: Lead end-to-end requirements gathering for the migration from SailPoint IIQ and SAP IDM to SailPoint Identity Security Cloud (ISC). Conduct thorough stakeholder analysis and engagement to uncover undocumented users, processes, and … and data flows. Translate business needs into high-quality, testable requirements and develop corresponding test cases. Work autonomously to advance analysis and support the testing lifecycle. Facilitate change management by helping stakeholders understand the benefits and strategic goals of the migration. Required Skills & Qualifications: Extensive business analysis experience in complex enterprise environments. Demonstrated ability to produce detailed, testable More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
Engineer to join their IT Infrastructure team. This is an exciting opportunity to work in a complex hybrid environment, supporting and evolving enterprise-scale identityandaccessmanagement (IAM) solutions using Microsoft Entra ID (formerly Azure AD) and related Microsoft 365 technologies. You'll act as a subject matter expert (SME) for identity … practices in access control, authentication, and governance. Key Responsibilities Provide third-line support for IAM systems across hybrid cloud environments. Lead on the technical design and implementation of identity solutions. Monitor, identify, and resolve security risks and operational incidents. Improve the organisation's security posture through configuration of Microsoft Secure Score, Conditional Access, and … PIM. Manage and migrate single sign-on (SSO) integrations for third-party business applications. Automate identity processes and configurations using PowerShell. Required Skills & Experience Proven experience managing hybrid identity environments with Active Directory and Microsoft Entra ID . Strong scripting abilities using PowerShell . Expertise in multi-factor authentication (MFA) , Conditional Access, self-service More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
ideal candidate will have deep expertise in Oracle ERP and EPM products, strong proficiency in cloud technologies and hands-on experience with GitHub, API integrations, IdentityandAccessManagement (IAM) including Single Sign-On (SSO). This role will be instrumental in designing, implementing and optimising enterprise solutions that support our business operations and … APIs to integrate Oracle systems with internal and third-party applications, ensuring seamless data flow and interoperability. Implement IAM and SSO Solutions: Manage and implement IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions using tools like Azure AD, Okta, and Oracle Identity Cloud Service. Enhance DevOps and Automation: Establish … eg, Planning, Financial Consolidation). Proficiency in developing and maintaining RESTful and SOAP APIs, with strong knowledge of JSON and XML. Hands-on experience with IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions, including Azure Active Directory, Okta, and Oracle Identity Cloud Service. Proven experience in designing and managing More ❯
About the Role: We are seeking an experienced Identity & AccessManagement … Specialist with a strong background in designing, implementing and managing robust IAM strategies and solutions to safeguard our client's information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager this role is instrumental in maintaining a secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce accessMore ❯
with the potential of extension Location - Hertforshire - 4-5 days a week onsite Responsibilities Lead the end-to-end delivery of multiple IAM-related projects (e.g., role-based access control, identity lifecycle management, privileged accessmanagement, SSO/MFA implementations). Define and manage project scopes, goals, milestones, deliverables, and … and consistency with organisational standards Oversee deployment and configuration activities, ensuring security and compliance are built into IAM implementations Key Skills Proven experience as Technical Project Manager within IdentityAccessManagement Strong knowledge of IAM principles, technologies and frameworks IAM deployment experience Strong technical acumen with the ability to engage confidently with engineers, architects More ❯
to succeed Strong experience as a DevSecOps Engineer/Security/DevOps Engineer. Great programming ability with Python or Powershell - you know your languages! Deep experience in IAM (IdentityAccessManagement) or Active Directory! Some knowledge of Sailpoint o other identity products. Experienced with DevOps practices and tools - Infrastructure as Code (IaC More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
month contract to drive solutions, optimise systems, and strengthen enterprise security. Responsibilities: The IT Systems Engineer will focus on enterprise endpoint management, identityandaccess solutions, and process automation. This position is initially contract-only, with the potential for full-time conversion based on performance and business needs. Provide support and engineering expertise for … enterprise IT systems. Manage and optimise endpoint environments using VMware Workspace ONE . Administer identityandaccessmanagement using Okta and Active Directory . Develop and maintain PowerShell automation scripts to streamline IT processes. Support privileged access security initiatives leveraging CyberArk . Troubleshoot escalated issues, coordinate with internal teams, and ensure timely … Familiarity with enterprise IT security and compliance best practices. Excellent communication skills and a service-oriented mindset. Knowledge of ITIL processes or other structured support frameworks. Experience integrating identitymanagementand endpoint security solutions. Organisation: Initial 3-6 month contract with the potential to transition to a full-time role. London-based position with a hybrid More ❯