IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+ In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Warwick, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
Analyst/BA (IGA) Utilities Predominantly remote: Occasional travel to Warwick 6 months+ In short: We’re implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across …/IGA skills. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered. Please be More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
with a cyber-first approach, including: Remote Managementand Monitoring (RMM) EDR/MDR solutions Microsoft 365 management (Exchange, OneDrive, SharePoint, Teams) Patch and asset management Backup and recovery SLA-driven, ticket-based support (Halo or similar) The Role As an IT Support Engineer , you’ll provide remote support to customers across the UK … deletions, and policy changes via Intune Maintain and update internal knowledge base articles Communicate clearly and confidently with customers Level 2 (Intermediate/Escalation) Handle identityandaccessmanagement (AAD/Entra ID) Investigate and resolve complex escalations Manage patching, packaging, and release updates Oversee client onboarding and backups Refine ticket workflows and documentation More ❯
with a cyber-first approach, including: Remote Managementand Monitoring (RMM) EDR/MDR solutions Microsoft 365 management (Exchange, OneDrive, SharePoint, Teams) Patch and asset management Backup and recovery SLA-driven, ticket-based support (Halo or similar) The Role As an IT Support Engineer , you’ll provide remote support to customers across the UK … deletions, and policy changes via Intune Maintain and update internal knowledge base articles Communicate clearly and confidently with customers Level 2 (Intermediate/Escalation) Handle identityandaccessmanagement (AAD/Entra ID) Investigate and resolve complex escalations Manage patching, packaging, and release updates Oversee client onboarding and backups Refine ticket workflows and documentation More ❯
Burton-On-Trent, Staffordshire, West Midlands, United Kingdom
Amtis Professional Ltd
logging systems (e.g. Datadog, Logic Monitor, SolarWinds) Automate infrastructure provisioning using Infrastructure as Code (IaC) tools such as Terraform Ensure compliance with security policies; manage IAM, PIM and RBAC access controls Respond to incidents and contribute to root cause analysis and post-mortem reviews Create and maintain comprehensive documentation and runbooks Collaborate with cross-functional teams to align … Certified: Azure Kubernetes Service (AKS) Specialist or similar container-focused Azure cert Azure Monitor for containers: Implement comprehensive monitoring for AKS workloads Azure Key Vault integration: Secure secrets management for containerized applications Azure Policy for Kubernetes: Implement … governance and compliance for container workloads Azure Arc: If relevant, managing hybrid/multi-cluster scenarios Security & Compliance: Solid grasp of cloud security best practices, identityandaccessmanagement, and compliance frameworks. Collaboration & Mentorship: Excellent communication skills with a passion for mentoring, documentation, and enabling others through knowledge sharing. For immediate consideration apply now More ❯
an ideal step for someone early in their IT career who wants to gain hands-on experience in a big enterprise environment and learn how identityandaccessmanagement works at scale. The Role You ll be part of the team that keeps accounts andaccess running smoothly setting up new starters … managing leavers, updating permissions, and ensuring users have the right access across systems like Active Directory, Microsoft 365, and Entra ID (Azure AD) . It s a structured, process-led role , perfect for someone who s organised, detail-focused, and enjoys seeing things done properly. Key Responsibilities of the Entry Level IT Systems Admininistrator Process starter, mover, andMore ❯
CI/CD pipelines . Infrastructure as Code (IaC): Familiarity with IaC tools and best practices. Security: Understanding of cloud security best practices. Competency with IdentityandAccessManagement (IAM) . Strong troubleshooting and debugging skills (incident response desirable). Experience working in Agile environments . Attention to detail when capturing test evidence or More ❯
IaC): Advanced use of IaC tools and best practices. Ability to design and implement complex infrastructure. Security: Knowledge of cloud security best practices. Familiarity with IdentityandAccessManagement (IAM) . Troubleshooting and debugging skills, including incident response. Experience working in Agile environments . Ability to write technical documentation. Configuration control using Git . More ❯
are looking for an experienced Information Security Officer to lead security strategy, operations, and compliance. This is a hands-on role combining strategic security architecture with operational security managementand regulatory compliance oversight. The successful candidate will define security standards across the business product portfolio, manage security environments, and serve as central point for ISO27001, PCI/DSS … and AWS infrastructure Coordinate security incident response and vulnerability remediation Oversee security monitoring, alerting, and detection capabilities Manage vulnerability assessment and penetration testing programs Maintain identityandaccessmanagement controls Maintain ISO27001 certification and manage audit cycles Ensure PCI/DSS compliance for payment processing systems Manage GDPR compliance across all products and operations … PCI/DSS compliance experience with payment processing systems Strong understanding of cloud security (Azure and/or AWS) Application security and secure development lifecycle knowledge Security incident managementand cross-functional response coordination Excellent communication skills - able to translate technical security for commercial and executive audiences Experience supporting tender responses and client security assurance Preferred/Nice More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯
Setups for various OCI Services including Oracle Analytics Cloud (OAC), Autonomous Databases (ADW/ATP), Oracle Integration Cloud (OIC) Environments Configure, Manage and Support Oracle IdentityandAccessManagement (IAM) Setups, including SSO Federation with identified IDPs and SPs in the customer landscape Collaborate with Security Architects, DBAs and Application Support Leads to address … and fix the identified vulnerabilities Manage the complete infrastructure using Terraform and Ansible toolsets Your Profile Key skills/knowledge/experience: Hands-on experience with configuration andmanagement of OCI Network Services and Components covering different OCI VCN topologies, Gateways, different types of route tables, security list Hands-on experience with Oracle Enterprise Linux Administration activities including … Security Setups Proven experience in large-scale data migration projects Expertise in Terraform, Ansible tool sets Experience with Oracle SaaS Environments and PaaS Services integrations Excellent communication and stakeholder management skills Desirable skills/knowledge/experience: Analytical and problem-solving mindset Strong leadership and mentoring capabilities Ability to manage multiple priorities in fast-paced environment Rewards & Benefits More ❯
Setups for various OCI Services including Oracle Analytics Cloud (OAC), Autonomous Databases (ADW/ATP), Oracle Integration Cloud (OIC) Environments Configure, Manage and Support Oracle IdentityandAccessManagement (IAM) Setups, including SSO Federation with identified IDPs and SPs in the customer landscape Collaborate with Security Architects, DBAs and Application Support Leads to address … and fix the identified vulnerabilities Manage the complete infrastructure using Terraform and Ansible toolsets Your Profile Key skills/knowledge/experience: Hands-on experience with configuration andmanagement of OCI Network Services and Components covering different OCI VCN topologies, Gateways, different types of route tables, security list Hands-on experience with Oracle Enterprise Linux Administration activities including … Security Setups Proven experience in large-scale data migration projects Expertise in Terraform, Ansible tool sets Experience with Oracle SaaS Environments and PaaS Services integrations Excellent communication and stakeholder management skills Desirable skills/knowledge/experience: Analytical and problem-solving mindset Strong leadership and mentoring capabilities Ability to manage multiple priorities in fast-paced environment Rewards & Benefits More ❯
Setups for various OCI Services including Oracle Analytics Cloud (OAC), Autonomous Databases (ADW/ATP), Oracle Integration Cloud (OIC) Environments Configure, Manage and Support Oracle IdentityandAccessManagement (IAM) Setups, including SSO Federation with identified IDPs and SPs in the customer landscape Collaborate with Security Architects, DBAs and Application Support Leads to address … and fix the identified vulnerabilities Manage the complete infrastructure using Terraform and Ansible toolsets Your Profile Key skills/knowledge/experience: Hands-on experience with configuration andmanagement of OCI Network Services and Components covering different OCI VCN topologies, Gateways, different types of route tables, security list Hands-on experience with Oracle Enterprise Linux Administration activities including … Security Setups Proven experience in large-scale data migration projects Expertise in Terraform, Ansible tool sets Experience with Oracle SaaS Environments and PaaS Services integrations Excellent communication and stakeholder management skills Desirable skills/knowledge/experience: Analytical and problem-solving mindset Strong leadership and mentoring capabilities Ability to manage multiple priorities in fast-paced environment Rewards & Benefits More ❯
include - a foundation in infrastructure - Virtual machines/compute resources, Networking (DNS, VPNs, subnets, firewalls, load balancers), Storage solutions (blob/object storage, file shares), Identityandaccessmanagement (IAM, Active Directory, Azure AD, etc.) You will act as an initial point of contact for cloud-related support requests via phone, email, chat, or … ticketing systems. Providing First and Second Line Cloud Support, diagnose and resolve common issues related to cloud infrastructure, services, and connectivity, Incident Management & Escalation, Log, categorize, and prioritize Incidents and Service Requests accurately and escalate complex or unresolved issues to senior engineers or relevant resolver groups while ensuring detailed documentation. Working in a small, cross functional teams to … follow up on outstanding vendor tickets to ensure timely resolution. Experience using ticketing and monitoring systems (e.g., ServiceNow, Jira, Datadog, Azure Monitor, CloudWatch) Understanding of ITIL principles and incident management workflows 36 hours per week - on a late and early shift pattern Out-of-Hours Incident Support Stoke on Trent Office Permanent, Full Time More ❯