enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We’re excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance #J-18808-Ljbffr More ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance We know our colleagues work tirelessly to make JD Sports the success it is today and in turn, we offer them some amazing benefits including staff Discount More ❯
years of experience in cybersecurity, with at least 2 years in a Security Architect or equivalent role. In-depth understanding of network and system security, identityandaccessmanagement (IAM), encryption, and secure software development practices. Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform (GCP). Familiarity with security tools More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lonza
that’s the kind of work we want to be part of. The IAM Engineer for directory services at Lonza, you will be responsible for the design, implementation, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) across the organization's global infrastructure. Your role will involve ensuring the security, availability, and scalability of these … directory services, which are critical to the company's identityandaccessmanagement framework. You will work closely with cybersecurity, IT operations, and business units to develop and enforce access control policies, manage user identities, and support seamless integration with both cloud and on-premises applications. Additionally, you will ensure that the … while continuously evaluating and adopting emerging technologies to enhance the organization's security and operational efficiency. Key responsibilities: Design and Implementation of Directory Services: Lead the design, deployment, andmanagement of Active Directory (AD) and Azure Active Directory (Azure AD) environments, ensuring they are secure, scalable, and optimized for performance. Develop and implement policies for directory services that More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer – Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … the following technologies: • Entra Collaboration Solutions (B2B, B2C) • Identity Models: Managed (PHS/PTA) vs Federated • Hybrid Identity Solutions • Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: • Active Directory Federation Services (ADFS) or third-party federation • Privileged IdentityMore ❯
Design and implement security solutions to mitigate identified risks Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc Respond to security events and incidents Perform regular security audits and risk assessments Maintain security controls, identify risks and propose treatment plans Conduct regular vulnerability scans and penetration … years of experience in Information Security Strong understanding of security principles, technologies, and best practices Experience in networking, infrastructure (on-prem and in the cloud), vulnerability and incident management Familiarity with application/device security monitoring (e.g. Firewalls, IDS/IPS, XDR etc.) Experience … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions Experience with implementation of identityandaccessmanagement (IAM) solutions Ability to work in a team to deliver project outcomes within timeframes and objectives Self-directed work experience, including planning and organising tasks More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration … with SIEM/CNAPP/Log collection platforms (e.g. CrowdStrike, Lacework etc.) and capability to design, implement and manage such solutions. Experience with implementation of identityandaccessmanagement (IAM) solutions. Ability to work in a team to deliver project outcomes within timeframes and objectives. Self-directed work experience, including planning and organising tasks. … PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC highly desirable. Running phishing campaigns. Personal Attributes: Excellent problem-solving skills and attention to detail Collaborative and team More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JIM - Jobs In Manchester
to £70,579 per annum depending on experience Faculty/Organisational Unit: Professional Services Location: Oxford Road Employment type: Permanent Division/Team: Information Security, IdentityandAccessManagement Hours Per Week: Full Time (1 FTE) Closing date (DD/MM/YYYY): 09/07/2025 Contract Duration: Permanent School/Directorate … IT Services. We’re seeking someone with the vision, depth and pragmatism to lead secure design across a complex, constantly evolving environment, where research data, intellectual property, and personal identity must be protected with care and foresight. This role is about embedding security into the foundation of how a world-leading university operates. Why this Role? As a … people that drive innovation across the University. As a University we are investing in security as a strategic priority including new capabilities in secure cloud adoption, automation and threat detection, identity governance, Zero Trust architecture, and real-time risk awareness. You will play a central role in shaping the future of these capabilities and helping colleagues across the More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯
Senior Software Engineer – Client Identity 2 weeks ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless … of the Enterprise Security & Fraud (ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). Implement secure authentication mechanisms such … as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive continuous improvement of engineering practices, coding standards, and deployment processes. Collaborate with Product Owners to More ❯
and partners, providing collective experience from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer facing role. You will be required … more sensitive workloads to AWS. You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site to customers to deliver projects … of enterprise risk management methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations - Significant experience in IT security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios - Understanding architectural implications of meeting More ❯
Social network you want to login/join with: Senior Consultant – Customer Identity & AccessManagement (CIAM), chester col-narrow-left Client: Ampstek Location: chester, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: About the Role: As a … Senior Consultant in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity solutions, with a particular … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯
Social network you want to login/join with: Senior Consultant – Customer Identity & AccessManagement (CIAM), stockport col-narrow-left Client: Ampstek Location: stockport, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: About the Role: As a … Senior Consultant in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity solutions, with a particular … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯
Social network you want to login/join with: Senior Consultant – Customer Identity & AccessManagement (CIAM), preston, lancashire col-narrow-left Client: Ampstek Location: preston, lancashire, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 6 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: About the Role … As a Senior Consultant in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity solutions, with … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯
Social network you want to login/join with: Senior Consultant – Customer Identity & AccessManagement (CIAM), warrington, cheshire col-narrow-left Client: Ampstek Location: Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 6 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: About the Role: As a Senior Consultant … in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity solutions, with a particular focus on … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯
Social network you want to login/join with: Senior Consultant – Customer Identity & AccessManagement (CIAM), bolton, greater manchester col-narrow-left Client: Ampstek Location: bolton, greater manchester, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 5 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: About … the Role: As a Senior Consultant in Customer Identity & AccessManagement (CIAM), you will play a strategic and technical leadership role in shaping Roche’s digital customer experience. Positioned within our CIAM Product Line, you will be responsible for guiding the end-to-end architecture, implementation, and evolution of enterprise-scale identity … and trends in CIAM, identity protocols, and cybersecurity—proactively proposing enhancements to future-proof the platform. Your Profile: 6+ years of experience in identityandaccessmanagement, with a strong track record in delivering customer-centric solutions. Deep hands-on expertise with SAP Customer Data Cloud (Gigya) and associated CIAM capabilities. Strong More ❯