personal pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & Access Management (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially available IAM tools such as ISIM/ISAM … Cloud Identity/Okta/Sailpoint/MS Entra, to provide Single Sign-On (SSO) and manage user identities effectively. The consultant is proficient in directory services like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. … migration of identities across Cloud, OT, IOT and enterprise IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in Identity and Access Management (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high-level and low-level design More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity Verification Product Owner needs a diverse skill … set, including strong technical knowledge, understanding of identitymanagement systems, and excellent communication skills. They should also possess analytical abilities to interpret data and make informed decisions. Here's a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identity and access management (IAM) solutions, including technologies like federation … assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identity and access management services. Analytical Skills: Ability to interpret complex More ❯
Azure Logic Apps: Configure and integrate Azure Logic Apps to enable seamless workflows and business process automation. Azure Security: Implement and adhere to best practices in Azure security including identitymanagement access control and threat protection. Front-End Development: Build responsive and user-friendly front-end interfaces using frameworks such as React Angular or Vue.js. Back-End Development … good in the world. IBM is proud to be an equal-opportunity employer. All qualifiedapplicants will receive consideration for employment without regard to race,color, religion, sex, gender, gender identity or expression, sexualorientation, national origin, caste, genetics, pregnancy, disability,neurodivergence, age, veteran status, or other characteristics. IBM is alsocommitted to compliance with all fair employment practices regardingcitizenship and immigration More ❯
Role: Identity and Access Management (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced Identity and Access Management (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java … development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-based access control (RBAC). • Java Development: Develop and maintain … Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. • System Integration: Integrate ISIM with third-party identity providers, enterprise applications, databases, and LDAP directories. • Security Best Practices: Enforce IAM security best practices, ensuring that solutions comply with relevant industry standards and regulations (e.g., GDPR, HIPAA). • Troubleshooting & Optimisation: Identify and resolve IAM-related issues, optimising More ❯
Sleaford, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Profectus
own vehicle are essential. Key Responsibilities: Manage and optimise a hybrid IT environment (on-prem & Azure) Architect and deploy Azure-based solutions Administer Hyper-V clusters, networking, storage and identitymanagement systems Automate tasks using PowerShell and configuration tools Implement and uphold robust security protocols Provide 3rd-line support and maintain system documentation Requirements: 34+ years in infrastructure More ❯
Integrate mobile apps with cloud services and APIs, ensuring seamless data flow. Cybersecurity & Compliance Ensure secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identitymanagement, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance … FDA software regulations, and cybersecurity best practices. Experience in unit testing, DevOps, CI/CD pipelines, and cloud security. Strong knowledge of microservices architecture, RESTful APIs, and database management (SQL/NoSQL). Preferred: Cloud certifications (e.g., AWS Certified Developer, Azure Developer, Google Cloud Professional Cloud Developer). Experience in AI/ML model integration within cloud and medical More ❯
we do. To be successful in this role you should have: Strong hands-on IAM engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identitymanagement, authentication, authorization and identity federation. Expertise with single sign on, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM … implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in partnering with security, product, engineering and compliance teams, to embed identity-first principles into the DevSecOps lifecycle You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business … will train, guide and coach less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for More ❯