IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Lead IAM/PAM TesterUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong IAM/PAM Tester who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU … to Project Managers and Test Leads throughout the testing lifecycle In addition to the above responsibilities, the IdAM Test Analyst must have proven experience testing IdentityandAccessManagement (IdAM) systems. This includes the ability to validate: User Authentication: Login/logout flows, password policies, MFA, and account lockout User Authorisation: Correct access … Role Management: Creating, editing, and deleting user roles and their associated permissions Policy Enforcement: Testing correct application of access policies under varied conditions Experience with IdAM tools is required , including (but not limited to): Microsoft Entra CyberArk SailPoint ServiceNow Savyint Candidates will ideally show evidence of the above in their CV in order to be considered.Please More ❯
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised More ❯
PAM Business Systems AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong PAM Systems BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … Vendors. Please only apply if you have delivered a PAM implementation. In full: PAM (Privileged AccessManagement) System Analyst is an IT security professional who analyses, designs, and implements solutions to control, monitor, and secure privileged accounts, which are accounts with elevated access to an organisation's critical systems and data. This role involves … analyse business needs and translate them into technical requirements. Communication: Excellent verbal and written communication skills for interacting with diverse stakeholders. Technical Knowledge: Understanding of identityandaccessmanagement (IAM), security principles, and potentially specific PAM tools (Cyberark, TPAM, BeyondTrust) Project Management: Ability to work on project deliverables and manage requirements through More ❯
The Role This role involves the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security … scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: * Design, Implementation and Deployment: o Install, configure, and deploy ForgeRock and PingOne AIC components in various environments (on-premise, cloud, hybrid). o Develop custom workflows, authentication/authorization policies, and integrations using … with the IAM platforms. o Automate deployment and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. * Managementand Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to identify and resolve More ❯