Identity Access Management Jobs in the UK

1 to 25 of 895 Identity Access Management Jobs in the UK

Security Engineer - 12 month FTC

London, England, United Kingdom
Walkers
number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal candidate will have worked within a … by-design principles into development processes . Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect … such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with Identity Access and Management (IDAM) solutions. CyberArk and ENTRA ID Familiarity with conditional/remote access toolsets. ENTRA, DUO SSO & MFA gateway. Good knowledge in Network (Routing and Switching, WAN More ❯
Posted:

Senior Identity Access Management Engineer

Manchester, Lancashire, United Kingdom
Roku, Inc
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identity and access management (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure and identity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identity and access management and securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional Access More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Identity Access Management Engineer

Manchester, England, United Kingdom
Roku, Inc
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identity and access management (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We’re excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure and identity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identity and access management and securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional Access More ❯
Posted:

IAM Architect

London, England, United Kingdom
Alight Solutions
and Workday, aligning with zero-trust principles, automation, and regulatory compliance. Role Overview The IAM Architect will lead the design, implementation, and optimization of enterprise identity and access solutions, ensuring seamless integration across cloud, SaaS, and on-prem systems. This role will focus on Entra ID (Azure AD), Entra B2C, SAP, and Workday integrations, balancing security … by aligning IAM controls with security frameworks. Design and enforce privileged access management (PAM) solutions, securing admin accounts and critical systems. Support security audits and identity risk assessments, addressing access anomalies and reducing attack surfaces. Enhance identity threat detection and response capabilities in collaboration with SOC and SIEM teams. Required … to collaborate with IT, HR, DevOps, and security teams to align identity solutions with business needs. Preferred Qualifications Certifications such as Microsoft Certified: Identity and Access Administrator, CISSP, GIAC-GIAM, or Okta Certified Architect. Experience with Azure AD Conditional Access, Defender for Identity, and Entra Permissions Management. Knowledge of Identity More ❯
Posted:

Principal Infrastructure Engineer

London, England, United Kingdom
Markerstudy Group
servers (Windows Server, Linux). Develop and implement infrastructure strategies that align with organizational goals and service expectations. Drive the adoption of tools and processes for effective operational management and delivery. Infrastructure Design and Implementation: Design and implement robust architectures, ensuring scalability, security, and performance. Oversee the configuration and deployment of infrastructure components, including servers, storage solutions (SAN … such as Windows, Linux, and Unix. Problem-Solving and Analytical Skills Strong troubleshooting skills, with the ability to diagnose and resolve complex infrastructure issues. Experience with infrastructure monitoring and management tools (e.g., System Center, vRealize, Nagios). Automation and Scripting Proficiency in scripting languages (e.g., PowerShell, Python) and experience with automation tools (e.g., Ansible, Puppet). Ability to … Conditional Access policies to enforce security requirements and control access to resources. Experience with Entra ID (formerly Azure AD) for secure identity and access management, including multi-factor authentication (MFA) and single sign-on (SSO) configurations. Automation and Orchestration: Strong knowledge of modern automation and orchestration technologies, including Azure Automation More ❯
Posted:

Cloud Security Engineer

London, England, United Kingdom
Kurt Geiger
AWS, Azure) and SaaS platforms to identify risks and ensure compliance with internal policies and industry standards (ISO 27001, CIS, NIST). Manage and enforce Identity and Access Management (IAM) controls, including conditional access, MFA policies, role-based access control (RBAC), and least-privilege enforcement across Microsoft Entra and AWS … Windows/macOS), and mobile devices via Microsoft Intune, Jamf, or Meraki. Implement and support endpoint and network-level security controls: FortiGate, Cisco Meraki, and Zero Trust Network Access (ZTNA) principles. Provide technical documentation, runbooks, and SOPs for security operations and system configurations. Skills Required Previous experience in a technical IT security, cloud engineering, or InfoSec-focused role. …/SOAR platforms. Basic scripting for automation and reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of patch management, application control, and vulnerability remediation. Desirable Qualifications Certifications such as CISSP, CISM, Security+, AWS Security Specialty, AZ-500, or MS-500 . Experience working in or with a Security More ❯
Posted:

Senior Information Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity … and implement the companys overall cybersecurity strategy. • Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. • Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. • Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. • Actively … are resolved within assigned SLAs. • Evaluate and implement CIS critical security controls where necessary. • Will provide input into cybersecurity strategic roadmap and annual budget. • Adhere to applicable change management policy and procedure. Qualifications: • Bachelors degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training in Cybersecurity, Information Systems, Computer Science More ❯
Posted:

Director of Cyber Security

Brighton, England, United Kingdom
Hybrid / WFH Options
Anson McCade
a new chapter of bold, strategic growth. With deep expertise across Financial Services, Insurance, and Utilities, this business is investing heavily in its Cyber Resilience practice—focusing on Identity & Access Management, Cloud Enablement, DORA readiness, and network security at the edge. The Role As Cybersecurity Director, you’ll play a pivotal role in scaling … delivery team Working Practices are aligned to SAFE Participating in Agile Ceremonies – Daily Stand Ups, delivering work over 2 weekly sprints Ensuring workloads are reflected within our project management toolset. Primarily working on the clients Security Infrastructure/Firewall Estate Triage of Customer Requirements into actionable engineering deliverables Supporting work out of typical business hours from time to … much demonstrable knowledge and experience in as many of the following areas as possible. Enterprise grade next generation firewalls – Primarily PAN and Forti Net Experience with using related management platforms – SCM, Panorama, Forti Managers Secure Access Service Edge Platforms Expert Troubleshooting and Analytical Approach to problems Good working knowledge of Security Architecture concepts & experience with Security More ❯
Posted:

Security Delivery Senior Analyst

London, United Kingdom
Accenture
Identity and Access Management Consultant - London Security Delivery Senior Analyst Early Career Full time Identity and Access Management Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically … live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identity and access governance (IAG) strategies. Develop and maintain the architecture for identity management, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identity and access management and recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track access and identity-related activities. Stakeholder Collaboration More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud / Cyber Security Solutions Architect (Visa Sponsorship Available)

Liverpool, Lancashire, United Kingdom
Techwaka
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identity and access management, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & Access Management : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder management and communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Security Architect

London Area, United Kingdom
iXceed Solutions
Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Posted:

Cloud Security Architect

City of London, London, United Kingdom
iXceed Solutions
Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
iXceed Solutions
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from iXceed Solutions Talent Acquisition | Account Management | Client Partner Cloud Security Architect – Financial Services Certification: Google Cloud Professional Architect (Mandatory) and Google Cloud Professional … Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Posted:

IT Operations Platforms and Security Lead

London, England, United Kingdom
Jas Gujral
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
Posted:

IT Operations and Security Lead

London
Nexus Jobs Limited
roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
Employment Type: Permanent
Posted:

Senior Information Security Analyst

London, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating … environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security … PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning and budgeting. Follow change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Solution Architect

London, England, United Kingdom
Hybrid / WFH Options
Hastings Direct
developing comprehensive remediation strategies. Your responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identity and access management, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends will be essential. You will … of Azure services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), and identity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience with SIEM tools, ideally Azure … proud to provide you with an AWARD WINNING package which includes – discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme – At Hastings Direct we understand that mental health cannot not be scheduled, that’s why we have a range of support More ❯
Posted:

Head of Identity & Access Management London, Agile

London, United Kingdom
Enstar Group
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable … corrective actions, and training users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM … to users on IAM policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. Manage multi-factor authentication (MFA More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Identity Management Expert

London, England, United Kingdom
Sportradar
OVERVIEW: As a Senior Identity Management Expert , you will take a role in driving the design, implementation, and governance of robust identity and access management (IAM) solutions across our global technology landscape. You will be embedded in the Information Security team and report directly to the Head of Security Advisory. … The Identity Management function will contain two Senior Experts in total. Your mission is to ensure that identity services are scalable, secure, and seamlessly integrated into our infrastructure, while also supporting the development of governance frameworks and compliance controls. From hands-on implementation of authentication protocols to guiding identity lifecycle policies, your … non-technical stakeholders. Monitor, troubleshoot, and report on IAM system performance, security events, and incidents. YOUR PROFILE: Minimum 5 years of hands-on experience in Identity and Access Management, including governance and technical implementation. Strong experience in configuring and managing authentication flows with Okta , Azure AD, or similar platforms. Proficient with SAML , OAuth2 , OIDC More ❯
Posted:

Identity Governance Access Analyst

Nottingham, England, United Kingdom
Hybrid / WFH Options
The Nottingham
across systems. Access Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits and access reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication … Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), and identity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation and identity management processes. Incident Response: Help with incident response and troubleshooting of identity-related issues. About you: Tool Proficiency: Working … process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identity and access management, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+, ITIL, or vendor-specific credentials. More ❯
Posted:

Identity and Access Management Consultant - London

London, England, United Kingdom
Accenture UK & Ireland
Identity and Access Management Consultant - London Join to apply for the Identity and Access Management Consultant - London role at Accenture UK & Ireland Identity and Access Management Consultant - London Join to apply for the Identity and Access Management … live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identity and access governance (IAG) strategies. Develop and maintain the architecture for identity management, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identity and access management and recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track access and identity-related activities. Stakeholder Collaboration More ❯
Posted:

Senior Cloud Identity Administrator

Winchester, Hampshire, United Kingdom
BENTLEY SYSTEMS, INC
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged Identity Management (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identity and access management practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Infrastructure Operations and Security Lead

London, England, United Kingdom
Nexus Jobs
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
Posted:

IT Infrastructure Operations and Security Lead

London, England, United Kingdom
Nexus Jobs
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identity management, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
Posted:

IAM and PAM Analyst - Nottingham City

United Kingdom, UK
Hybrid / WFH Options
Nottingham Building Society
across systems. Access Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits and access reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication … Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), and identity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation and identity management processes. Incident Response: Help with incident response and troubleshooting of identity-related issues. About you: - Tool Proficiency: Working … process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identity and access management, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+, ITIL, or vendor-specific credentials. More ❯
Posted:
Identity Access Management
10th Percentile
£45,000
25th Percentile
£52,000
Median
£75,000
75th Percentile
£88,125
90th Percentile
£115,000