Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Thorpe, Yorkshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Shadwell, Leeds, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Manor Park, Cheshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, andidentity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One IdentityMore ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
cyber capabilities to support delivery of a key cybersecurity programme focused on securing and modernising the application estate. This role will play a vital part in helping the Identityand Authentication team drive change across hundreds of applications, ensuring alignment with modern security practices, including Microsoft Entra ID and SailPoint, Microsoft Sentinel, Privileged AccessManagement … to: Engage with stakeholders across the airline to gather, refine and prioritise business and technical requirements. Own and manage the project backlog in JIRA, working closely with the Identityand Authentication Lead and product stakeholders. Conduct workshops with application owners and technical teams to extract key information and drive decision-making. Translate business requirements into technical stories suitable … knowledge of JIRA and backlog management. Excellent stakeholder engagement skills with the ability to communicate at all levels. Experience working on cybersecurity projects – particularly around IdentityandAccessManagement (IAM), PAM or Security Monitoring. Ability to translate non-technical input into structured technical requirements. Comfortable running workshops and engaging stakeholders in high-pressure environments. More ❯
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
warrington, cheshire, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
bolton, greater manchester, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
warrington, cheshire, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
bolton, greater manchester, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged AccessManagement (PAM) solution as part of a wider Identity & AccessManagement transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click to find out more about our Key Information Documents. More ❯
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged AccessManagement (PAM) solution as part of a wider Identity & AccessManagement transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click here to find out more about our Key Information More ❯
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing IdentityandAccessManagement (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. IdentityandAccessManagement (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. IdentityandAccessManagement (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
premise hosted infrastructure that supports our end user devices and applications. You will be responsible for maintaining the integrity, security, and availability of domain services, ensuring seamless connectivity andaccess for all users to deliver a secure workspace, calling on your strong knowledge of Active Directory, DNS, Group Policy, and related technologies. Demonstratable experience of VDI, EDR, and … Thin Client management is also essential. You will work closely with cross-functional teams to ensure that the tailored solutions are delivered in line with the needs of the business, proactively recommending new working practices and adhering to current best practices. This role offers the opportunity to work with the latest technologies, contribute to digital transformation initiatives, and … for the product and its users to meet performance targets and KPIs. Within your first 6 months you will: Work as a team to enable identityandaccessmanagement services Define process and identify tooling that will help the team to deliver future capability repeatedly and reliably What are BAE Systems looking for from More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. IdentityandAccessManagement (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯