Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
international repute and one of the largest employers in Liverpool. They are looking to an IT Applications Support Manager to join their established IT Services team.This is a management role that combines operational oversight, technical strategy, and hands-on delivery across a broad portfolio of business-critical applications. Reporting into senior IT leadership, you will guide the development … design authority, leading on product configuration, integrations, service upgrades and best-practice processes. You will bring deep knowledge of IT support functions, with experience across tools such as IdentityAccessManagement, ITSM, and Microsoft enterprise technologies . Whilst not essential, knowledge of SailPoint or ServiceNow would be highly advantageous. You will also ensure effective … design to implementation and support- Experience leading multi-disciplinary teams and developing technology strategies and roadmaps- Experience working with ServiceNow, SailPoint, Atlassian tools and Microsoft platforms- Knowledge of Identity & AccessManagement technologies (highly desirable)- Ability to produce high-quality documentation and manage complex data flows and API integrations This is an outstanding opportunity for More ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
Manchester, Lancashire, United Kingdom Hybrid/Remote Options
Deloitte LLP
cybersecurity. Perform business requirement studies, evaluate technology options to address business needs, and improve operational efficiency. Work with multiple levels of our clients, from C-level executives, senior andmanagement staff, to on-the-ground professionals. Establish governance frameworks for our clients, including strategies, organisation, policies, processes, standards and guidelines. Review and analyse client IT and Cyber environments … following domains: M&A transactions Information security Cyber security IT service management IT optimisation Information management Digital transformation Cyber/disaster recovery, incident and crisis management Specific industry experience will be an advantage (e.g. banking and finance, aviation, transportation, property development, pharmaceuticals, etc.). Familiarity with any of the following technologies would be an … encryption IOT/Mobile technologies and related security best practices Cloud technologies (Amazon Web Services ("AWS"), Azure, etc.) and their operation and security best practices Identityandaccessmanagement solutions SIEM CASB SOC design, build and operation Strong analytical mind and problem-solving skills. Excellent project managementand interpersonal skills. Consulting experience More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … front-end technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. IdentityandAccessManagement (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Atom Bank
consulting experience within a security context. Security Domain Expertise: Proven practitioner experience in one or more of the following: Cloud Security Application Security Data Security IdentityandAccessManagement (IAM) Network Security Modern Architecture: Understanding of securing modern architectural patterns such as microservices, event-driven architecture, and serverless computing. Experience with DevSecOps practices, including More ❯
suite of business-critical applications, including but not limited to: Atlassian suite (Jira, Confluence) Developer and product tools such as TeamCity, Bitbucket, Stoplight, Cucumber Studio, WebDMS, FEC, Document Management Systems CRM & ERP tools like HubSpot and SAGE Google Workspace (Admin Console) and other SaaS platforms Analyse existing application usage and workflows to identify inefficiencies, recommend improvements, and implement … assess needs, propose solutions, and improve workflows. Maintain accurate IT documentation, configuration records, and knowledge base articles for supported applications. Manage onboarding and offboarding processes related to application accessand user provisioning. Support local tech teams with day to day support on an ad-hoc basis Provide input into the deployment of customer-facing IT requirements aligned to … to work independently onsite while collaborating effectively with global teams. Desirable (but not essential) ITIL Foundations Certification Experience supporting Mac and Windows environments Familiarity with identityandaccessmanagement, SSO, and federation technologies Experience with scripting or automation tools (e.g., PowerShell, Python, Google Apps Script) Industry certifications (e.g., CompTIA A+, Google Workspace, Microsoft) What More ❯
newcastle-upon-tyne, tyne and wear, north east england, united kingdom Hybrid/Remote Options
Oak Engage
platform security throughout implementations Requirements What We're Looking For Strong technical background with hands-on experience in SaaS onboarding or implementation roles Proficient in identityandaccessmanagement (IAM), including SAML, OAuth, and OpenID Connect Familiarity with directory services (LDAP, SCIM) and secure user provisioning practices Comfortable working with RESTful APIs, JSON, XML … and priorities in a fast-paced environment Experience supporting enterprise-level clients and managing expectations effectively Exposure to IDPs such as Azure AD/Entra ID, Okta, Ping Identity, etc. Bonus: understanding of data storage, ETL, and hands-on programming knowledge (C# a plus) Benefits Why Join Oak? A meaningful role in a mission-led SaaS company with More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Burberry
Technical Architect, DW, EUC & IDAM Department: INFORMATION TECHNOLOGY Location: GB INTRODUCTION JOB PURPOSE Technically hands on and delivery focused Technical Architect to support the design, implementation, and continuous improvement of Digital Workplace, EUC andIDAM solutions. This role is ideal for someone with strong technical knowledge in device managementand end user computing, who can work collaboratively with … engineering teams, vendors, and internal stakeholders to enhance user experience and security. This role will provide architectural assurance and delivery across Burberry's Digital Workplace andIDAM domains, ensuring secure, scalable, and user centric technology solutions and aligning with the strategic roadmap and fully documented according to governance principles. RESPONSIBILITIES Define and evolve the technical architecture for Digital Workplace and … IDAM platforms, ensuring alignment with enterprise architecture principles and security frameworks. Complete the technical design and implementation of solutions including Microsoft 365, JAMF, Okta, and conditional access policies. Collaborate with internal teams and vendors to deliver integrated solutions that support both tactical and long term goals. Ensure all solutions meet compliance, security, and design assurance standards, particularly in More ❯