london, south east england, united kingdom Hybrid / WFH Options
TalentHawk
Based Access Control (RBAC) and least privilege principles across enterprise and industrial systems. Identity Governance & Administration (IGA) – SailPoint: Implement and manage automated provisioning, deprovisioning, andaccess certifications via SailPoint. Build workflows for user lifecycle management, identity reconciliation, and compliance reporting. Integrate SailPoint with Active Directory, Entra ID, SAP, ServiceNow, and … Work closely with cybersecurity, risk, and compliance teams to align IAM strategies with regulatory requirements. Collaboration & Documentation: Partner with OT, cybersecurity, compliance, and risk teams to define policies andaccess controls. Develop IAM runbooks, playbooks, and conduct user access reviews. Provide IAM training and awareness for employees and technical teams. Technical Skills & Experience: Directory Services: Active … , session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: IdentityandAccess Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified IdentityandAccess Manager (CIAM More ❯
slough, south east england, united kingdom Hybrid / WFH Options
TalentHawk
Based Access Control (RBAC) and least privilege principles across enterprise and industrial systems. Identity Governance & Administration (IGA) – SailPoint: Implement and manage automated provisioning, deprovisioning, andaccess certifications via SailPoint. Build workflows for user lifecycle management, identity reconciliation, and compliance reporting. Integrate SailPoint with Active Directory, Entra ID, SAP, ServiceNow, and … Work closely with cybersecurity, risk, and compliance teams to align IAM strategies with regulatory requirements. Collaboration & Documentation: Partner with OT, cybersecurity, compliance, and risk teams to define policies andaccess controls. Develop IAM runbooks, playbooks, and conduct user access reviews. Provide IAM training and awareness for employees and technical teams. Technical Skills & Experience: Directory Services: Active … , session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: IdentityandAccess Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified IdentityandAccess Manager (CIAM More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TalentHawk
Based Access Control (RBAC) and least privilege principles across enterprise and industrial systems. Identity Governance & Administration (IGA) – SailPoint: Implement and manage automated provisioning, deprovisioning, andaccess certifications via SailPoint. Build workflows for user lifecycle management, identity reconciliation, and compliance reporting. Integrate SailPoint with Active Directory, Entra ID, SAP, ServiceNow, and … Work closely with cybersecurity, risk, and compliance teams to align IAM strategies with regulatory requirements. Collaboration & Documentation: Partner with OT, cybersecurity, compliance, and risk teams to define policies andaccess controls. Develop IAM runbooks, playbooks, and conduct user access reviews. Provide IAM training and awareness for employees and technical teams. Technical Skills & Experience: Directory Services: Active … , session monitoring, compliance reporting. Security & Compliance: CAF, eCAF, NIST frameworks; IAM controls for critical infrastructure; incident response and threat detection. Preferred Certifications: Microsoft Certified: IdentityandAccess Administrator Associate Okta Certified Administrator/Professional SailPoint IdentityNow/IdentityIQ Engineer CyberArk Defender/Guardian CISSP or Certified IdentityandAccess Manager (CIAM More ❯
cheltenham, south west england, united kingdom Hybrid / WFH Options
IMT Resourcing Solutions
and technology group, is seeking an Identity & AccessManagement (IDAM) Specialist to take ownership of the organisation's identity, authentication andaccess control systems. This is a key position within the global IT function — ensuring secure, compliant, and efficient access to critical systems and information across the business. … The Role As the IDAM Specialist, you'll be responsible for the management, optimisation and continuous improvement of identityandaccessmanagement systems across a global infrastructure. You'll support the organisation's digital security objectives by delivering reliable authentication, enforcing access control policies, and enhancing compliance across cloud and … entitlement reviews across cloud and on-premise environments. Maintain accurate and auditable documentation of configurations, policies and processes. Provide end-user support for access requests, password issues andIDAM-related incidents. Collaborate with Infrastructure, Cloud and Cybersecurity teams to ensure cohesive identity governance. Stay current with emerging technologies and best practice, recommending improvements to strengthen security More ❯
Identity & AccessManagement Engineer - IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune Our global law firm client are actively looking to take on a new Identity & AccessManagement Engineer (IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune) to join their team on a permanent … staff members in the troubleshooting, diagnosis, and resolution of incidents. Occasionally provides technical support to end users. Must have excellent troubleshooting and customer service skills. Appropriately inform and advise management on incidents and incident prevention. Participate in knowledge sharing with other engineers and develop solutions efficiently. Technology/Software expertise: Proven experience in Active Directory management … Governance Tools. Veza preferred. Experienced level of understanding of Identity & AccessManagement, Single Sign-On, Multi-Factor Authentication (MFA), and Authentication, Identity Governance & Administration concepts. Experience with using PowerShell scripting and the ability to read code. Experience with Outlook/Exchange and an understanding of mail routing. Experience with Windows More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & AccessManagement (IAM), and … Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identityand data protection services. The ideal candidate will combine deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection … accountability for ensuring cyber, IAM, and DLP controls are effective, proportionate, and aligned with FCA expectations for operational resilience and financial sector stability. Maintaining robust governance, oversight, and risk management frameworks for engineering, identity, and data protection, ensuring risks are identified, escalated, and remediated in line with FCA and PRA requirements. Demonstrating reasonable steps have been More ❯
london, south east england, united kingdom Hybrid / WFH Options
Harrington Starr
IAM Engineer (Identity & AccessManagement) IAM Engineer – Process Improvement & Access Control Financial Services 💷 Contract £450–£500 per day | Inside IR35 📍 London – Hybrid working … days onsite per week) 📅 6-month initial contract (extensions expected) You’ll be joining a growing Security and IT function, taking ownership of identityandaccessmanagement across the business. This role is all about building structure, consistency, and control — centralising access requests, entitlement changes, reviews, and audits to strengthen the firm … to engage both technical teams and non-technical staff on IAM best practices You’ll be the person who brings control, clarity, and consistency to identityandaccessmanagement — freeing up the security team to focus on higher-value technical work. 📩 To apply – click the link or email barry.ansell@harringtonstarr.com for a faster response. More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Harrington Starr
IAM Engineer (Identity & AccessManagement) IAM Engineer – Process Improvement & Access Control Financial Services 💷 Contract £450–£500 per day | Inside IR35 📍 London – Hybrid working … days onsite per week) 📅 6-month initial contract (extensions expected) You’ll be joining a growing Security and IT function, taking ownership of identityandaccessmanagement across the business. This role is all about building structure, consistency, and control — centralising access requests, entitlement changes, reviews, and audits to strengthen the firm … to engage both technical teams and non-technical staff on IAM best practices You’ll be the person who brings control, clarity, and consistency to identityandaccessmanagement — freeing up the security team to focus on higher-value technical work. 📩 To apply – click the link or email barry.ansell@harringtonstarr.com for a faster response. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Harrington Starr
IAM Engineer (Identity & AccessManagement) IAM Engineer – Process Improvement & Access Control Financial Services 💷 Contract £450–£500 per day | Inside IR35 📍 London – Hybrid working … days onsite per week) 📅 6-month initial contract (extensions expected) You’ll be joining a growing Security and IT function, taking ownership of identityandaccessmanagement across the business. This role is all about building structure, consistency, and control — centralising access requests, entitlement changes, reviews, and audits to strengthen the firm … to engage both technical teams and non-technical staff on IAM best practices You’ll be the person who brings control, clarity, and consistency to identityandaccessmanagement — freeing up the security team to focus on higher-value technical work. 📩 To apply – click the link or email barry.ansell@harringtonstarr.com for a faster response. More ❯
IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+ In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Warwick, England, United Kingdom Hybrid / WFH Options
Pontoon Solutions
Analyst/BA (IGA) Utilities Predominantly remote: Occasional travel to Warwick 6 months+ In short: We’re implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across …/IGA skills. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Kent, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
M365 IdentityManagement Consultant Our client is looking for a M365 IdentityManagement expert to start ASAP. The role can be remote working if required and has been scoped Outside of IR35. Ideally you will be able to lead an implementation and give technical guidance to the existing team. Outside IR35 Remote … working available Key skills/experience M365 IdentityManagement/IAM – IdentityAccessManagement expert MFA - Multi factor Authentication SFTP PAM - Privileged accessmanagement CyberArk is highly desirable Due to the volume of applications received for positions, it will not be possible to respond to all More ❯
client is looking for a IAM Analyst who has extensive change experience to join their team. You will enables successful technology change through execution of identityandaccessmanagement technical change processes for a portfolio of technology change initiatives ensuring solutions are fit for purpose and comply with minimum standards, controls and risk appetites. … OKRs and Provides SME assistance to enhancement of the Service Architecture & Enablement function & toolkit(s). Key Accountabilities Enable successful technology change through execution of identityandaccessmanagement activities providing technical expertise, design and implementation of agreed solutions. Work as ‘single point of contact’ (SPoC) or ‘relationship based fly-in resource’ (RBFiR) covering … required activities for a portfolio of technology change initiatives. Provide pro-active support, advice and guidance to ensure the requirements and design of identity & accessmanagement solutions are aligned to technology strategy, standards, architectures, patterns and road maps. Liaise with teams and 3rd parties involved to ensure “Path to Live” activities are completed. Design More ❯
london (city of london), south east england, united kingdom
Lorien
client is looking for a IAM Analyst who has extensive change experience to join their team. You will enables successful technology change through execution of identityandaccessmanagement technical change processes for a portfolio of technology change initiatives ensuring solutions are fit for purpose and comply with minimum standards, controls and risk appetites. … OKRs and Provides SME assistance to enhancement of the Service Architecture & Enablement function & toolkit(s). Key Accountabilities Enable successful technology change through execution of identityandaccessmanagement activities providing technical expertise, design and implementation of agreed solutions. Work as ‘single point of contact’ (SPoC) or ‘relationship based fly-in resource’ (RBFiR) covering … required activities for a portfolio of technology change initiatives. Provide pro-active support, advice and guidance to ensure the requirements and design of identity & accessmanagement solutions are aligned to technology strategy, standards, architectures, patterns and road maps. Liaise with teams and 3rd parties involved to ensure “Path to Live” activities are completed. Design More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid / WFH Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Leatherhead, England, United Kingdom Hybrid / WFH Options
Bytes Software Services
and mobile devices, including procurement, deployment, lifecycle management, and asset tracking. Define and enforce device standards, configurations, and security controls using tools such as MDM and endpoint management platforms. Drive continual service improvements through automation, self-service solutions, knowledge base development, and performance reporting. Collaborate with IT and business stakeholders, acting as the point of escalation … relationships where third-party support services are involved. Identity & AccessManagement (IAM) Oversee user lifecycle management (joiners, movers, leavers) and enforce access control policies. Ensure compliance with security standards, governance, and audit requirements. Implement and maintain IAM processes to support role-based accessand least privilege principles. Collaborate … the procurement, provisioning, deployment, and lifecycle of laptops and mobile devices. Define and enforce device standards, configurations, and security controls (e.g., MDM, encryption). Maintain accurate inventory and asset management records. Ensure timely delivery of hardware to new hires and replacement devices to existing staff. Collaborate with vendors and suppliers to manage stock, warranties, and support contracts. Leadership More ❯
guildford, south east england, united kingdom Hybrid / WFH Options
Bytes Software Services
and mobile devices, including procurement, deployment, lifecycle management, and asset tracking. Define and enforce device standards, configurations, and security controls using tools such as MDM and endpoint management platforms. Drive continual service improvements through automation, self-service solutions, knowledge base development, and performance reporting. Collaborate with IT and business stakeholders, acting as the point of escalation … relationships where third-party support services are involved. Identity & AccessManagement (IAM) Oversee user lifecycle management (joiners, movers, leavers) and enforce access control policies. Ensure compliance with security standards, governance, and audit requirements. Implement and maintain IAM processes to support role-based accessand least privilege principles. Collaborate … the procurement, provisioning, deployment, and lifecycle of laptops and mobile devices. Define and enforce device standards, configurations, and security controls (e.g., MDM, encryption). Maintain accurate inventory and asset management records. Ensure timely delivery of hardware to new hires and replacement devices to existing staff. Collaborate with vendors and suppliers to manage stock, warranties, and support contracts. Leadership More ❯
Job Profile – Lead Security Solution Architect-106885 Location: UK - Sheffield (Hybrid Mandatory Skills: Privilege Password Management CyberArk . … Experience: 8-10 Years The information below covers the role requirements, expected candidate experience, and accompanying qualifications. Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
specialism in Identity & AccessManagement (IDAM) . This position plays a key role within the Infrastructure Engineering team, ensuring secure, efficient, and scalable identity solutions across the Microsoft 365 environment. This is an … excellent opportunity to work in a technically progressive environment, delivering identityandaccess controls that underpin a modern workplace. What you’ll do Manage and optimise IDAM systems across Microsoft 365 and Azure environments Implement and maintain identity provisioning, authentication, andaccess control policies Oversee user access, permissions, and compliance … password management solutions Monitor for and respond to security incidents, vulnerabilities, and audit requirements Collaborate with IT infrastructure and cyber teams to enhance identityandaccessmanagement capabilities Maintain accurate documentation and contribute to ongoing process improvement What we’re looking for Proven experience in IDAM engineering, ideally within Microsoft 365 andMore ❯
gloucester, south west england, united kingdom Hybrid / WFH Options
IMT Resourcing Solutions
specialism in Identity & AccessManagement (IDAM) . This position plays a key role within the Infrastructure Engineering team, ensuring secure, efficient, and scalable identity solutions across the Microsoft 365 environment. This is an … excellent opportunity to work in a technically progressive environment, delivering identityandaccess controls that underpin a modern workplace. What you’ll do Manage and optimise IDAM systems across Microsoft 365 and Azure environments Implement and maintain identity provisioning, authentication, andaccess control policies Oversee user access, permissions, and compliance … password management solutions Monitor for and respond to security incidents, vulnerabilities, and audit requirements Collaborate with IT infrastructure and cyber teams to enhance identityandaccessmanagement capabilities Maintain accurate documentation and contribute to ongoing process improvement What we’re looking for Proven experience in IDAM engineering, ideally within Microsoft 365 andMore ❯
Basingstoke, Hampshire, South East, United Kingdom
Middle Recruitment Limited
days in office per week) middle is partnered exclusively with a leading global company to recruit an IAM Analyst Service Delivery, joining their global IdentityandAccessManagement (IAM) team within Technology Operations. This is a pivotal role acting as the bridge between engineering, delivery, projects, and vendors, ensuring the effective global operation of … team that values communication, transparency, and continuous improvement, with direct exposure to the companys wider global technology leadership. Ideal Skills and Background Strong understanding of IdentityandAccessManagement (IAM) concepts and service delivery Background in IT Project Management, Service Delivery Management, or Technical Operations Experience coordinating vendors, service providers … providing equal employment opportunities regardless of ethnic origin, gender, nationality, religion, physical ability, sexual orientation, marital status, parental status, or medical history. Keywords: IAM Analyst, IdentityandAccessManagement Analyst, Service Delivery Manager, IT Project Manager, Technical Delivery Analyst, AccessManagement Analyst, IT Operations Manager, IAM Engineer More ❯
Title : Privileged AccessManagement Engineer Client : Banking Salary : £450-£550 p/d Inside IR35 … Location : London Responsibilities: Defined and executed the Privileged AccessManagement strategy, ensuring alignment with regulatory frameworks (SOX, NIST, ISO 27001, GDPR). Implemented and maintained secure access tools, integrating them with identity systems, monitoring platforms, and IT infrastructure. Automated account management processes, including credential updates, session tracking, and approval workflows. … and supported investigations of elevated access incidents. The successful candidate will have the following skills/experience Over 5 years of experience in IdentityandAccessManagement, specializing in Privileged AccessManagement solutions(e.g. CyberArk Hands-on experience with automation and scripting using PowerShell and Python to streamline More ❯