Identity Access Management Jobs in the North of England

1 to 25 of 31 Identity Access Management Jobs in the North of England

Design Engineer (Cybersecurity Architect)

Sheffield, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged Access Management (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
Posted:

Design Engineer (Cybersecurity Architect)

handsworth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged Access Management (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
Posted:

Lead Security Solution Architect

Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Senior IAM Developer (One Identity)

Thorpe, Yorkshire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One Identity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior IAM Developer (One Identity)

Shadwell, Leeds, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One Identity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior IAM Developer (One Identity)

Manor Park, Cheshire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver technical documentation and training materials to support platform adoption across Sky Group. What You'll Bring Extensive hands-on experience with One Identity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior IAM Developer (One Identity)

Blackburn, Lancashire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior IAM Developer (One Identity)

Thornton, Lancashire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

One Identity Manager

Blackburn, Lancashire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

One Identity Manager

Longridge, Lancashire, United Kingdom
Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Business Analyst

Waterside, Lancashire, UK
Hybrid / WFH Options
Hays
cyber capabilities to support delivery of a key cybersecurity programme focused on securing and modernising the application estate. This role will play a vital part in helping the Identity and Authentication team drive change across hundreds of applications, ensuring alignment with modern security practices, including Microsoft Entra ID and SailPoint, Microsoft Sentinel, Privileged Access Management … to: Engage with stakeholders across the airline to gather, refine and prioritise business and technical requirements. Own and manage the project backlog in JIRA, working closely with the Identity and Authentication Lead and product stakeholders. Conduct workshops with application owners and technical teams to extract key information and drive decision-making. Translate business requirements into technical stories suitable … knowledge of JIRA and backlog management. Excellent stakeholder engagement skills with the ability to communicate at all levels. Experience working on cybersecurity projects – particularly around Identity and Access Management (IAM), PAM or Security Monitoring. Ability to translate non-technical input into structured technical requirements. Comfortable running workshops and engaging stakeholders in high-pressure environments. More ❯
Posted:

Senior Infrastructure Engineer

Manchester, Lancashire, England, United Kingdom
Castlefield Recruitment
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identity and access management, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, access management, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum
Posted:

Technical Consultant

Manchester, England, United Kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & Access Management (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
Posted:

Technical Consultant

warrington, cheshire, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & Access Management (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
Posted:

Technical Consultant

bolton, greater manchester, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & Access Management (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
Posted:

3rd Line Engineer

Manchester, England, United Kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID and Identity Management AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS Identity Access Management More ❯
Posted:

3rd Line Engineer

warrington, cheshire, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID and Identity Management AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS Identity Access Management More ❯
Posted:

3rd Line Engineer

bolton, greater manchester, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID and Identity Management AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS Identity Access Management More ❯
Posted:

Security Solution Architect

Beverley, North Humberside, United Kingdom
Onyx-Conseil
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged Access Management (PAM) solution as part of a wider Identity & Access Management transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click to find out more about our Key Information Documents. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Solution Architect

North Humberside, England, United Kingdom
Computer Futures
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged Access Management (PAM) solution as part of a wider Identity & Access Management transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click here to find out more about our Key Information More ❯
Employment Type: Contractor
Rate: £525 - £600 per day
Posted:

Cloud Security Engineer

Manchester, Lancashire, United Kingdom
Vix Technology
and protection tools such as Firewalls, IDS/IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency with Windows and Linux systems , as well as network scanning and diagnostic tools (e.g., Wireshark, IP scanner … security frameworks and standards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetration testing and phishing simulations. Proficiency in programming or More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior ISP IT Security

Bradford, West Yorkshire, England, United Kingdom
Teqniq Ltd
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
Employment Type: Temporary
Salary: £504 per day
Posted:

Senior Isp It Security

Bradford, West Yorkshire, England, United Kingdom
Essential Employment
goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a … security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data … Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. More ❯
Employment Type: Temporary
Salary: £504 per day
Posted:

Endpoint Administrator - End User Product Team

Penwortham, Lancashire, United Kingdom
Matchtech
premise hosted infrastructure that supports our end user devices and applications. You will be responsible for maintaining the integrity, security, and availability of domain services, ensuring seamless connectivity and access for all users to deliver a secure workspace, calling on your strong knowledge of Active Directory, DNS, Group Policy, and related technologies. Demonstratable experience of VDI, EDR, and … Thin Client management is also essential. You will work closely with cross-functional teams to ensure that the tailored solutions are delivered in line with the needs of the business, proactively recommending new working practices and adhering to current best practices. This role offers the opportunity to work with the latest technologies, contribute to digital transformation initiatives, and … for the product and its users to meet performance targets and KPIs. Within your first 6 months you will: Work as a team to enable identity and access management services Define process and identify tooling that will help the team to deliver future capability repeatedly and reliably What are BAE Systems looking for from More ❯
Employment Type: Contract
Rate: GBP 74 Hourly
Posted:

Infrastructure Engineer - Newcastle - inside IR35

Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Opus Recruitment Solutions Ltd
cloud applications Infrastructure as Code (IaC): Experience with IaC tools like AWS CloudFormation or Terraform to automate the deployment of AWS resources securely and efficiently. Identity and Access Management (IAM): Expertise in managing access to AWS services and resources securely, using AWS IAM to control authentication and authorization. Understanding of encryption methods … and AWS services related to data encryption both at rest and in transit. Experience with AWS Key Management Service (KMS) and AWS Certificate Manager (ACM). Knowledge of compliance requirements that impact cloud security (e.g., GDPR, HIPAA, SOC 2) and experience in implementing controls to meet these requirements. Ability to design and execute incident response strategies within the More ❯
Employment Type: Contractor
Rate: £466 per day
Posted:
Identity Access Management
the North of England
10th Percentile
£32,500
25th Percentile
£46,875
Median
£50,000
75th Percentile
£64,875
90th Percentile
£79,000