enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We’re excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
Brighton, England, United Kingdom Hybrid / WFH Options
Anson McCade
a new chapter of bold, strategic growth. With deep expertise across Financial Services, Insurance, and Utilities, this business is investing heavily in its Cyber Resilience practice—focusing on Identity & AccessManagement, Cloud Enablement, DORA readiness, and network security at the edge. The Role As Cybersecurity Director, you’ll play a pivotal role in scaling … delivery team Working Practices are aligned to SAFE Participating in Agile Ceremonies – Daily Stand Ups, delivering work over 2 weekly sprints Ensuring workloads are reflected within our project management toolset. Primarily working on the clients Security Infrastructure/Firewall Estate Triage of Customer Requirements into actionable engineering deliverables Supporting work out of typical business hours from time to … much demonstrable knowledge and experience in as many of the following areas as possible. Enterprise grade next generation firewalls – Primarily PAN and Forti Net Experience with using related management platforms – SCM, Panorama, Forti Managers Secure Access Service Edge Platforms Expert Troubleshooting and Analytical Approach to problems Good working knowledge of Security Architecture concepts & experience with Security More ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Security Architect. Key Responsibilities Architect secure cloud environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identityandaccessmanagement strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat … focus on Google Cloud Platform (GCP). Extensive experience in the financial services industry including banking, insurance, or capital markets. Hands-on expertise with GCP security tools (e.g., Identity Aware Proxy, BeyondCorp Enterprise, VPC SC, Cloud Armor). Proven experience with Zero Trust Architecture and secure design principles for cloud and hybrid systems. Proven experience with DevSecOps methodologies More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
The Nottingham
across systems. Access Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits andaccess reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication … Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), andidentity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation andidentitymanagement processes. Incident Response: Help with incident response and troubleshooting of identity-related issues. About you: Tool Proficiency: Working … process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identityandaccessmanagement, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+, ITIL, or vendor-specific credentials. More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
opportunity available with a leading organisation in the financial services industry. They are currently seeking a skilled PAM Test Analyst to support ongoing initiatives within identityandaccessmanagement systems. Essential skills: • Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). • Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. • Strong understanding of IAM principles, privileged account security, and least privilege access. • Hands-on experience with API testing tools (e.g., Postman, SoapUI). • Proficiency in test management tools such as JIRA • Strong problem-solving skills and attention to More ❯
Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
privilege access, identity governance, and periodic access reviews Assist with overseeing the lifecycle management of identities, including providing, de-provisioning, andaccess modifications Monitor cloud security events, logs and alerts to detect and respond to potential threats Create, configure and maintain automated security playbooks to respond to incidents Identify and … cloud environment Work with cross-functional teams to ensure secure architecture, policies, controls and practices in cloud environment that maintains a high level of security Assist with implementation andmanagement of data security policies including data loss prevention, privileged accessmanagement, insider risk management, etc Assist with the design, engineering andmanagement … computer science, information systems, cybersecurity, or a related field Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps. Experience in one or more areas: identityandaccessmanagement, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics Experience with open standards such as SAML, OAuth or Open ID More ❯
Vallum Associates Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD More ❯
Synechron is looking for an experienced Test Analyst with specific recent PAM experience, to join a dynamic and global team. Essential: Proven experience in software testing within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM) Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM Strong … understanding of IAM principles , privileged account security , and least privilege access Hands-on experience with API testing tools (e.g., Postman, SoapUI ) Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment Knowledge of CI/ More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
PAM or IAM experience) - SHEFFIELD 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Sign in to access AI-powered advices Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with Google Continue with … Google Synechron is looking for an experienced Test Analyst with specific recent PAM experience, to join a dynamic and global team. Proven experience in software testing within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM) Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM Strong … understanding of IAM principles , privileged account security , and least privilege access Hands-on experience with API testing tools (e.g., Postman, SoapUI ) Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment Knowledge of CI/CD More ❯
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
the Secure by Design Lifecycle. Innovation and Adoption: Research, validate, and adopt new technologies and methodologies, contributing to the organization's broader security technology strategy. Governance, Mentorship, and Stakeholder Management: Represent the organization at governance boards, provide peer reviews and mentoring, and build strong relationships with stakeholders across the civil service, departments, suppliers, vendors, and programs. Essential Criteria … least one or many of the following cross-section of technologies and supporting security processes towards the application of technical security in real life environments: IdentityandAccessManagement Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and … and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 and NIST CSF 2.0. Technical Security within one or many of the following domains: IdentityandAccessManagement: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
DIB BVBA Heliowatt
incident response. Youll Bring Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
to solve the toughest challenges. This role is an immediate full-time position. Insight on your impact Engagement Scoping and Planning: Collaborate with client stakeholders, sales, engineering and project management to understand client needs and define scope and project timelines. Contribute to the development of accurate Level of Effort (LoE) estimates, ensuring alignment with project goals and profitability … HIPAA) and translate those requirements into actionable technical guidance. Participate in security assessments and recommend improvements to enhance the security posture of client environments on GCP. Client Relationship Management: Build and maintain strong relationships with key technical stakeholders at client organizations. Serve as a trusted advisor, providing expert guidance and recommendations on their GCP strategy and implementation. Identify … Kubernetes/GKE). Familiarity with data managementand analytics services on GCP (e.g., BigQuery, Cloud Dataflow, Cloud Storage). Strong understanding of identityandaccessmanagement (IAM) within GCP. Familiarity of different Cloud Platform like AWS, Azure is nice to have Consulting and Leadership Skills: Proven ability to lead technical engagements More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
AVEVA
AVEVA is creating software trusted by over 90% of leading industrial companies. Job Title: IdentityandAccessManagement Senior Manager Location: Cambridge/London Employment Type: Permanent full time The job We are looking for an IdentityandAccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning … access management. Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, accessmanagement (SSO, MFA), andidentity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Jersey Electricity Plc
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you’ll be doing as a Security & Identity Product Manager Active Directory Management Lead the managementand … the delivery of value. Collaborate with internal teams (IT, security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and Privileged AccessMore ❯
on SailPoint Identity Security Cloud, CyberArk Privileged Cloud, authoritative data sources, and core directory services (Active Directory, Entra ID) Design and govern identity lifecycle andaccess governance solutions for employees, contractors, vendors and service accounts Architect and oversee implementations between IAM platforms and enterprise systems including POS, ERP, e-commerce platforms and cloud workloads … Define and implement robust RBAC/ABAC models, automated provisioning/deprovisioning andidentity workflows within SailPoint Design and support the deployment of CyberArk to secure privileged accounts across critical infrastructure and cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication … specific IAM certifications Experience in the retail industry or other high-volume, customer-facing environments Knowledge of CIAM (Customer identity & AccessManagement) andIdentity Governance #J-18808-Ljbffr More ❯
threats across hybrid environments. Managing and enhancing security configurations for Windows VMs, SQL databases, and PaaS solutions like Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. … Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identityandaccessmanagement (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and existing solutions. Managing third parties delivering … IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with IdentityandAccessManagement (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems to adhere to security guidelines proactively and reactively. Job More ❯
This position involves managing security operations, implementing security measures, and leveraging Microsoft Azure’s security features to safeguard the organization’s data and infrastructure. Key Responsibilities: Security Operations Management: Be the Technical Expert to support and advance the objectives of IT Security and the wider group In conjunction with the leadership team, develop and implement security policies, procedures … Azure’s security features, including Azure Security Centre, Azure Sentinel, and Active Directory, Entra ID to enhance the organization’s security posture Implement and manage identityandaccessmanagement (IAM) solutions within Azure Monitor and respond to security alerts generated by Azure security tools Incident Response and Forensics: Coordinate the incident response process, including … certifications such as CISSP, CISM, Microsoft Certified: Azure Security Engineer Associate, or equivalent are preferred but not essential Excellent communication skills, both verbal and written Strong leadership and team management abilities Ability to carry a task to completion or engage more help to reach a conclusion Analytical and problem-solving skills Experience in a Financial Services environment would More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential: Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯