number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of Walkers IT. “The ideal candidate will have worked within a … by-design principles into development processes . Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect … such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with IdentityAccessandManagement (IDAM) solutions. CyberArk and ENTRA ID Familiarity with conditional/remote access toolsets. ENTRA, DUO SSO & MFA gateway. Good knowledge in Network (Routing and Switching, WAN More ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We’re excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
and Workday, aligning with zero-trust principles, automation, and regulatory compliance. Role Overview The IAM Architect will lead the design, implementation, and optimization of enterprise identityandaccess solutions, ensuring seamless integration across cloud, SaaS, and on-prem systems. This role will focus on Entra ID (Azure AD), Entra B2C, SAP, and Workday integrations, balancing security … by aligning IAM controls with security frameworks. Design and enforce privileged accessmanagement (PAM) solutions, securing admin accounts and critical systems. Support security audits andidentity risk assessments, addressing access anomalies and reducing attack surfaces. Enhance identity threat detection and response capabilities in collaboration with SOC and SIEM teams. Required … to collaborate with IT, HR, DevOps, and security teams to align identity solutions with business needs. Preferred Qualifications Certifications such as Microsoft Certified: IdentityandAccess Administrator, CISSP, GIAC-GIAM, or Okta Certified Architect. Experience with Azure AD Conditional Access, Defender for Identity, and Entra Permissions Management. Knowledge of IdentityMore ❯
servers (Windows Server, Linux). Develop and implement infrastructure strategies that align with organizational goals and service expectations. Drive the adoption of tools and processes for effective operational managementand delivery. Infrastructure Design and Implementation: Design and implement robust architectures, ensuring scalability, security, and performance. Oversee the configuration and deployment of infrastructure components, including servers, storage solutions (SAN … such as Windows, Linux, and Unix. Problem-Solving and Analytical Skills Strong troubleshooting skills, with the ability to diagnose and resolve complex infrastructure issues. Experience with infrastructure monitoring andmanagement tools (e.g., System Center, vRealize, Nagios). Automation and Scripting Proficiency in scripting languages (e.g., PowerShell, Python) and experience with automation tools (e.g., Ansible, Puppet). Ability to … Conditional Access policies to enforce security requirements and control access to resources. Experience with Entra ID (formerly Azure AD) for secure identityandaccessmanagement, including multi-factor authentication (MFA) and single sign-on (SSO) configurations. Automation and Orchestration: Strong knowledge of modern automation and orchestration technologies, including Azure Automation More ❯
AWS, Azure) and SaaS platforms to identify risks and ensure compliance with internal policies and industry standards (ISO 27001, CIS, NIST). Manage and enforce IdentityandAccessManagement (IAM) controls, including conditional access, MFA policies, role-based access control (RBAC), and least-privilege enforcement across Microsoft Entra and AWS … Windows/macOS), and mobile devices via Microsoft Intune, Jamf, or Meraki. Implement and support endpoint and network-level security controls: FortiGate, Cisco Meraki, and Zero Trust Network Access (ZTNA) principles. Provide technical documentation, runbooks, and SOPs for security operations and system configurations. Skills Required Previous experience in a technical IT security, cloud engineering, or InfoSec-focused role. …/SOAR platforms. Basic scripting for automation and reporting using PowerShell or Python. Working knowledge of network security protocols, VPNs, firewalls, and web filtering tools. Understanding of patch management, application control, and vulnerability remediation. Desirable Qualifications Certifications such as CISSP, CISM, Security+, AWS Security Specialty, AZ-500, or MS-500 . Experience working in or with a Security More ❯
London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity … and implement the companys overall cybersecurity strategy. • Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. • Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. • Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. • Actively … are resolved within assigned SLAs. • Evaluate and implement CIS critical security controls where necessary. • Will provide input into cybersecurity strategic roadmap and annual budget. • Adhere to applicable change management policy and procedure. Qualifications: • Bachelors degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training in Cybersecurity, Information Systems, Computer Science More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
Anson McCade
a new chapter of bold, strategic growth. With deep expertise across Financial Services, Insurance, and Utilities, this business is investing heavily in its Cyber Resilience practice—focusing on Identity & AccessManagement, Cloud Enablement, DORA readiness, and network security at the edge. The Role As Cybersecurity Director, you’ll play a pivotal role in scaling … delivery team Working Practices are aligned to SAFE Participating in Agile Ceremonies – Daily Stand Ups, delivering work over 2 weekly sprints Ensuring workloads are reflected within our project management toolset. Primarily working on the clients Security Infrastructure/Firewall Estate Triage of Customer Requirements into actionable engineering deliverables Supporting work out of typical business hours from time to … much demonstrable knowledge and experience in as many of the following areas as possible. Enterprise grade next generation firewalls – Primarily PAN and Forti Net Experience with using related management platforms – SCM, Panorama, Forti Managers Secure Access Service Edge Platforms Expert Troubleshooting and Analytical Approach to problems Good working knowledge of Security Architecture concepts & experience with Security More ❯
IdentityandAccessManagement Consultant - London Security Delivery Senior Analyst Early Career Full time IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically … live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identityandaccessmanagement strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identityandaccessmanagement strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Get AI-powered advice on this job and more exclusive features. Direct message the job poster from iXceed Solutions Talent Acquisition | Account Management | Client Partner Cloud Security Architect – Financial Services Certification: Google Cloud Professional Architect (Mandatory) and Google Cloud Professional … Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identityandaccessmanagement strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating … environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security … PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning and budgeting. Follow change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge More ❯
London, England, United Kingdom Hybrid / WFH Options
Hastings Direct
developing comprehensive remediation strategies. Your responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identityandaccessmanagement, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends will be essential. You will … of Azure services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), andidentity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience with SIEM tools, ideally Azure … proud to provide you with an AWARD WINNING package which includes – discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme – At Hastings Direct we understand that mental health cannot not be scheduled, that’s why we have a range of support More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable … corrective actions, and training users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM … to users on IAM policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. Manage multi-factor authentication (MFA More ❯
OVERVIEW: As a Senior IdentityManagement Expert , you will take a role in driving the design, implementation, and governance of robust identityandaccessmanagement (IAM) solutions across our global technology landscape. You will be embedded in the Information Security team and report directly to the Head of Security Advisory. … The IdentityManagement function will contain two Senior Experts in total. Your mission is to ensure that identity services are scalable, secure, and seamlessly integrated into our infrastructure, while also supporting the development of governance frameworks and compliance controls. From hands-on implementation of authentication protocols to guiding identity lifecycle policies, your … non-technical stakeholders. Monitor, troubleshoot, and report on IAM system performance, security events, and incidents. YOUR PROFILE: Minimum 5 years of hands-on experience in IdentityandAccessManagement, including governance and technical implementation. Strong experience in configuring and managing authentication flows with Okta , Azure AD, or similar platforms. Proficient with SAML , OAuth2 , OIDC More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
The Nottingham
across systems. Access Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits andaccess reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication … Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), andidentity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation andidentitymanagement processes. Incident Response: Help with incident response and troubleshooting of identity-related issues. About you: Tool Proficiency: Working … process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identityandaccessmanagement, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+, ITIL, or vendor-specific credentials. More ❯
IdentityandAccessManagement Consultant - London Join to apply for the IdentityandAccessManagement Consultant - London role at Accenture UK & Ireland IdentityandAccessManagement Consultant - London Join to apply for the IdentityandAccessManagement … live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
across systems. Access Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits andaccess reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication … Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), andidentity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation andidentitymanagement processes. Incident Response: Help with incident response and troubleshooting of identity-related issues. About you: - Tool Proficiency: Working … process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identityandaccessmanagement, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+, ITIL, or vendor-specific credentials. More ❯