Cheltenham, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
and technology group, is seeking an Identity & AccessManagement (IDAM) Specialist to take ownership of the organisation’s identity, authentication andaccess control systems. This is a key position within the global IT function — ensuring secure, compliant, and efficient access to critical systems and information across the business. … The Role As the IDAM Specialist, you’ll be responsible for the management, optimisation and continuous improvement of identityandaccessmanagement systems across a global infrastructure. You’ll support the organisation’s digital security objectives by delivering reliable authentication, enforcing access control policies, and enhancing compliance across cloud and … entitlement reviews across cloud and on-premise environments. Maintain accurate and auditable documentation of configurations, policies and processes. Provide end-user support for access requests, password issues andIDAM-related incidents. Collaborate with Infrastructure, Cloud and Cybersecurity teams to ensure cohesive identity governance. Stay current with emerging technologies and best practice, recommending improvements to strengthen security More ❯
gloucester, south west england, united kingdom Hybrid / WFH Options
IMT Resourcing Solutions
and technology group, is seeking an Identity & AccessManagement (IDAM) Specialist to take ownership of the organisation’s identity, authentication andaccess control systems. This is a key position within the global IT function — ensuring secure, compliant, and efficient access to critical systems and information across the business. … The Role As the IDAM Specialist, you’ll be responsible for the management, optimisation and continuous improvement of identityandaccessmanagement systems across a global infrastructure. You’ll support the organisation’s digital security objectives by delivering reliable authentication, enforcing access control policies, and enhancing compliance across cloud and … entitlement reviews across cloud and on-premise environments. Maintain accurate and auditable documentation of configurations, policies and processes. Provide end-user support for access requests, password issues andIDAM-related incidents. Collaborate with Infrastructure, Cloud and Cybersecurity teams to ensure cohesive identity governance. Stay current with emerging technologies and best practice, recommending improvements to strengthen security More ❯
Cheltenham, Gloucestershire, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
the UK Excellent pension, healthcare and hybrid working Our client, a leading international engineering group, is seeking an IDAM Specialist to manage and enhance their identityandaccessmanagement environment. This role plays a key part in ensuring secure access to systems and maintaining compliance with global security standards. What you’ll … do Administer and optimise IDAM systems, including identity provisioning andaccess control. Design and implement secure authentication mechanisms such as SSO and MFA. Develop and maintain role-based access control (RBAC) policies. Monitor systems for security incidents and resolve vulnerabilities. Ensure compliance with organisational and regulatory requirements. Deliver training and support to users on … infrastructure, security and application teams to improve IDAM processes. What we’re looking for Proven experience managing IDAM systems in a complex environment. Strong understanding of authentication, authorisation, andaccess control principles. Experience implementing RBAC and MFA solutions. Excellent communication and problem-solving skills. Relevant certifications such as CISSP, CIAM, or CISM preferred. Passion for continuous improvement andMore ❯
Contract Solution Architect – Identity & AccessManagement (DV Cleared) Location: Wiltshire Duration: 9 months initial Rate: £700 per day Clearance: Active and transferable DV clearance required Nationality Requirement: Sole British nationals only Overview We are seeking a highly experienced Solution Architect or Technical Architect to lead the design and delivery … of a greenfield, on-premise identity solution for a secure environment. This is a hands-on leadership role focused on architecting a robust IdentityandAccessManagement (IAM) platform using Microsoft technologies. Key Responsibilities Architect and lead the implementation of an on-premise identity solution using Windows Server 2022, Active … networking fundamentals (DNS, routing, firewalls, load balancing). Demonstrated leadership and mentoring of technical teams. Excellent communication and documentation skills. Desirable Skills Microsoft certifications (e.g., IdentityandAccess Administrator Associate, Solutions Architect Expert). Experience with hybrid identity environments. PowerShell scripting for identity automation. Delivery of identity solutions in regulated More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. Key Duties and Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments." Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure. Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. Key Duties and Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments." Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure. Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. This position requires strong leadership in both solution design and technical execution, working closely with engineering teams to ensure successful delivery and ongoing … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments. Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure." Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
growing IT team in Bournemouth. This is an excellent opportunity for someone early in their career who’s keen to develop hands-on experience in identityandaccessmanagement within a supportive environment. Key Responsibilities: Administer and maintain Identity & AccessManagement (IAM) systems Manage Active Directory and Azure … processes Assist with user support, troubleshooting, and documentation Key Requirements: 6 months to 2 years of IT experience, preferably in IAM, AD, or Azure AD Familiarity with permissions management , MFA , SSO , and JML processes Strong attention to detail and willingness to learn Good communication skills and ability to work in a team Apply now to speak with VIQU More ❯
growing IT team in Bournemouth. This is an excellent opportunity for someone early in their career who's keen to develop hands-on experience in identityandaccessmanagement within a supportive environment. Key Responsibilities: Administer and maintain Identity & AccessManagement (IAM) systems Manage Active Directory and Azure … processes Assist with user support, troubleshooting, and documentation Key Requirements: 6 months to 2 years of IT experience, preferably in IAM, AD, or Azure AD Familiarity with permissions management , MFA , SSO , and JML processes Strong attention to detail and willingness to learn Good communication skills and ability to work in a team Apply now to speak with VIQU More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis
PL/SQL development. Oracle APEX development. Preferred Skills (Some Required) Oracle WebLogic Administration Oracle Database Administration Apache Tomcat & Webserver Administration Oracle WebCenter Content (WCC) & Portal (WCP) Oracle Identity & AccessManagement (OIG/OUD/OAM/AD) Oracle Business Intelligence Discoverer (BI) Oracle Primavera (P3M) Oracle Forms & Reports Oracle Enterprise Manager (OEM) Linux … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
look for your experience and knowledge in: Security standards and frameworks (MoD and HMG experiences helpful) Cloud-based cyber security principles and architecture points Boundary controls, network segmentation andaccess control IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), Cryptographic techniques and implementations IT asset managementand tracking Vulnerability Managementand Patching SIEM principles, products and supporting logging infrastructure Containerisation and virtual machine security Delivering secure solutions against project expectations Strong awareness of and commitment to industry best practice Driving change in a complex environment This role requires you to hold or fulfil the criteria to obtain a UK Security Clearance #LI More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO … and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
an ideal step for someone early in their IT career who wants to gain hands-on experience in a big enterprise environment and learn how identityandaccessmanagement works at scale. The Role You'll be part of the team that keeps accounts andaccess running smoothly — setting up new starters … managing leavers, updating permissions, and ensuring users have the right access across systems like Active Directory, Microsoft 365, and Entra ID (Azure AD) . It's a structured, process-led role , perfect for someone who's organised, detail-focused, and enjoys seeing things done properly. Key Responsibilities of the Junior IT Systems Admininistrator Process starter, mover, and leaver More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
architectural standards and project timelines. Specifically: Builds and configures on-premises infrastructure Deploys and integrates cloud-based services (e.g. IaaS/PaaS/SaaS, virtual machines, storage, networking, identity). Ensures systems are built in line with approved high-level and low-level designs Collaborates with solution architects, programme and project managers, and cyber security engineers. Supports risk … management with associated stakeholders. Undertakes the planning, estimation and scheduling of installation and decommissioning work. Ensures that the highest levels of IT security are maintained to protect the integrity of all NCC data. Within project delivery, uses normal operating facilities, diagnostic tools, technical manuals, test scripts and systems documentation to identify, diagnose and report on system errors. Supports … as above. Familiarity with implementing security best practices across Microsoft environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cyber security standards such as NCSC guidance More ❯
and Cybersecurity, including but not limited to Infrastructure, networking, and platforms (on-prem and cloud), Service managementand customer support, End-to-end IdentityandAccessManagement (IAM) and Cybersecurity strategy and compliance. This is a unique opportunity to make a lasting impact on the university's digital transformation journey where you More ❯
to the Head of Information Security to provide tactical technical security support. The Lead InfoSec Engineer will be responsible for technical governance to security standards, IdentityandAccessManagement expertise across multiple platforms. The role will provide ongoing technical assurance to digital systems and data to ensure that these are safe and secure. Special … Proven knowledge and experience of IT and information security policies, practices and standards. Knowledge of current technologies in the field and the ability to learn new ones. Incident management experience including investigations and response. Cloud security experience would be highly beneficial PCI and Cyber Essentials expertise would be advantageous Why us? Markerstudy Insurance Services Limited (MISL) is one More ❯
growing IT team in Bournemouth. This is an excellent opportunity for someone early in their career who's keen to develop hands-on experience in identityandaccessmanagement within a supportive environment click apply for full job details More ❯
with technical delivery and ideally Cyber Transformation programmes. The role is inside IR35 and you would be paid PAYE through us here at Opus.Skills required: - Cyber security projects- PAM, IDAM, SIEM, Data protection projects- Ideally some experience of RFP/Tendering More ❯
Cheltenham, Gloucestershire, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
objectives What we’re looking for Strong hands-on experience with Microsoft Azure (IaaS and PaaS) Skilled in virtualisation, networking, and server management Knowledge of Entra ID, IDAM practices, and Azure IAC Experience influencing cloud adoption and governance at enterprise level Microsoft certification (Azure Administrator or Architect) desirable Why join? Opportunity to shape a modern cloud-first environment More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
initiatives. Understand the risk landscape affecting IT systems and information. Prioritise risk treatment and resources based on impact, human factors, and cost-effectiveness. Assurance and compliance oversight andmanagement Manage the IT Security, Governance, Risk and Compliance team, ensuring clear direction, support, and professional development. What you'll need to succeed At least one of the following, ideally … of vulnerability management tools; enterprise IT systems, services, infrastructure, networking, applications in cloud, on-prem, and hybrid environments. Security tooling such as Mimecast and Microsoft Defender, Sentinel, IDAM services; ITSM tools such as Halo, Lansweeper. Experience leading and managing an IT/Cyber Security function and working groups. ITIL and ITSM. What you'll get in return Salary More ❯