IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable for investigating incidents, recommending corrective … actions, and training users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM landscape. Prepare responses to … create and maintain the IAM strategy and roadmap. What you will bring: Minimum of 10 years of experience in IT or Security, with at least 5 years in a management role overseeing IAM programs. Professional certification such as Certified Identity and Access Manager (CIAM) or Certified IdentityManagement Professional (CIMP), CISSP, or CISM is highly desirable. More ❯
SME Level) Location: Remote Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft Identity and Access Management expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer - Entra ID SME to join our high-performing … technical support team. You'll be at the frontline of innovation, providing world-class support and guidance to Microsoft customers using Microsoft Entra ID and associated identity solutions. What You'll Do: Act as a trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and … resolve identity and access issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. What You'll Bring: 5+ years in technical support or enterprise identity solutions roles. Deep expertise in Microsoft Entra ID (Azure AD) , Hybrid Identity , SSO More ❯
place covered by both technical and service desk teams. Main responsibilities Cloud Knowledge and Services: Manage and troubleshoot cloud services, preferably Azure. Understanding of SaaS, PaaS, and IaaS. SaaS Management: deploying and managing SaaS solutions. Networking: knowledge of IP networking, routers, switches, and firewalls. Windows: deployment, management, and troubleshooting of Windows clients and servers. Data Protection: must have … principles and best practices, including secure system design and AI security implications. Cloud Services: Microsoft 365: configuring Microsoft 365 services like Exchange Online, SharePoint Online, OneDrive, and Power Platform. IdentityManagement: knowledge of Microsoft Entra and Active Directory, including user authentication and authorisation. Networking Details: understanding of IPV4 subnetting and VLANs, preferably Cisco infrastructure. Virtualisation: knowledge of VMware More ❯
SC clearance is required We're working with a client that is looking for an M365 IAM Specialist who will play a key role in securing and optimising our identity infrastructure of the organisation. The ideal candidate will possess extensive expertise in Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth … knowledge of Conditional Access, Azure Active Directory (Azure AD), and identity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, and access reviews. Monitor and respond … to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identity and access issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
SC clearance is required We're working with a client that is looking for an M365 IAM Specialist who will play a key role in securing and optimising our identity infrastructure of the organisation. The ideal candidate will possess extensive expertise in Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth … knowledge of Conditional Access, Azure Active Directory (Azure AD), and identity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, and access reviews. Monitor and respond … to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identity and access issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on More ❯
Identity and Access Management Senior Manager page is loaded Identity and Access Management Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to apply) Job requisition id: R010049 AVEVA is creating software trusted … by over 90% of leading industrial companies. Position: Identity and Access Management Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the norm paid vacation, contributions to retirement investment plans or pensions, insurances and many other memberships and perks designed to enhance … the workplace experience, your health, and wellbeing. The job We are looking for an Identity and Access Management (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with More ❯
the business - someone who can lead with clarity, build with empathy, and bring a mix of technical depth and sound judgment. There's loads to get stuck into, from identitymanagement and scripting to device management and scalable tooling, areas where most of our work sits and where we need thoughtful, sustainable solutions. You'll play an … experience across all areas of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in Identity and Access Management, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture … SaaS and hardware. Lead and manage complex technical projects with multiple stakeholders from around the business. Examples of some TechOps projects include Rollout of, and migration to, a new identity provider mac OS and Windows MDM migration Rollout of a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office More ❯
About Us FlexTrade Systems is a provider of customized multi-asset execution and order management trading solutions for buy- and sell-side financial institutions. Through deep client partnerships with some of the world's largest, most complex and demanding capital markets firms, we develop the flexible tools, technology and innovation that deliver our clients a competitive edge. Our globally … protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS Control Tower, Azure, and Microsoft O365. Conduct or coordinate regular security assessments, penetration tests, and vulnerability scans to identify … Experience (5+ years) in a security engineering role, focusing on designing and implementing security solutions and managing security infrastructure, both on-premise and cloud. Experience working with privilege and identitymanagement solutions. Experience with operating system security and system hardening. Knowledge of network security principles, protocols, and technologies. Strong analytical and problem-solving skills, with the ability to More ❯
develop, and maintain a high-performing, secure, and scalable data platform, leveraging Databricks Corporate Lakehouse and Medallion Architectures. Utilise our metadata-driven data platform framework combined with advanced cluster management techniques to create and optimise scalable, robust, and efficient data solutions. Implement comprehensive logging, monitoring, and alerting tools to manage the platform, ensuring resilience and optimal performance are maintained. … professional knowledge through continual development, and advocate best practices within a Centre of Excellence. Skills, knowledge and expertise: Deep expertise in the Databricks platform, including Jobs and Workflows, Cluster Management, Catalog Design and Maintenance, Apps, Hive Metastore Management, Network Management, Delta Sharing, Dashboards, and Alerts. Proven experience working with big data technologies, i.e., Databricks and Apache Spark. … of programming languages, including Python, SQL, PowerShell, PySpark, Spark SQL. Good working knowledge of data warehouse and data mart architectures. Good experience in Data Governance, including Unity Catalog, Metadata Management, Data Lineage, Quality Checks, Master Data Management. Experience using Azure DevOps to manage tasks and CI/CD deployments within an Agile framework, including utilising Azure Pipelines (YAML), Terraform More ❯
skilled Cyber Security Specialist to join the team. The company offers comprehensive IT support and cloud solutions to businesses across London. Specialising in day-to-day IT support, project management, and cloud services, they deliver expert solutions for everything from server installations to individual desktops and laptops, ensuring businesses operate efficiently. With a commitment to delivering high-quality IT … of security frameworks and standards such as ISO 27001 and GDPR. Expertise in Microsoft 365, SharePoint, Azure architecture, security, and Entra. Proficiency in security tools and technologies, including firewalls, identitymanagement, and layered security stacks. Experience in incident response and forensic analysis. Excellent problem-solving, analytical, and communication skills. Relevant certifications (e.g., CISSP, CEH, CompTIA Security+) are advantageous. More ❯
the onboarding and off-boarding workflow, collaborating with PeopleOps (HR) and Security for a seamless process Demonstrate advanced knowledge of enterprise systems including JAMF, Intune/AutoPilot, Tanium endpoint management software, ServiceHub, Okta, O365, Zoom and Slack. Demonstrate knowledge of enterprise Audio/Video systems troubleshooting Collaborate with other technicians around the Globe, providing both technical peer review and … years of experience in IT Support or Systems Administration roles Advanced experience with enterprise tools such as JAMF, Intune, Okta, O365, Zoom, ServiceNow, Slack and advanced endpoint management Demonstrated ability to collaborate in cross-functional projects/activities and introduce scalable IT solutions Background in ITSM or ITIL-based support frameworks Excellent written and verbal communication skills Proven ability … to de-escalate high-pressure technical incidents with professionalism and efficiency Familiarity with networking fundamentals and identitymanagement (e.g., DNS, DHCP, SSO, MFA) Preferred Qualifications Bachelor's degree in information technology, Computer Science, or related field Certifications such as Microsoft Certified: Modern Desktop Administrator, JAMF 300/400, CompTIA Security+/CySA+, or equivalent Scripting ability in PowerShell More ❯
horsepower to deliver outcomes that endure. The Position The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and … mitigation planning/implementation, identitymanagement, network security, privacy, and compliance. In the Cyber Defense Security Analyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well as its associated holdings. You will report to the Manager, Cyber Defense Operations and will be responsible for monitoring, detecting, analyzing More ❯
horsepower to deliver outcomes that endure. The Position The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and … mitigation planning/implementation, identitymanagement, network security, privacy, and compliance. In the Cyber Defense Security Analyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well as its associated holdings. You will report to the Manager, Cyber Defense Operations and will be responsible for monitoring, detecting, analyzing More ❯
Sr Engineer - GCP (Identity) Job Description: We are seeking a highly motivated and experienced Sr. Engineer to join our team focused on developing and maintaining Cloud Identity solutions. You will play a key role in designing, implementing, and scaling systems that enable secure and seamless user authentication across various platforms and applications. As a senior engineer you will … GCP services, along with excellent problem-solving skills and the ability to work in a fast-paced environment. Key Responsibilities: Design, develop, and implement core functionalities of Google's Identity platform. Collaborate with cross-functional teams (engineering, product, security) to understand user needs and translate them into technical requirements. Work on integrating Google's identity solutions with various … external identity providers (IdPs) and relying parties (RPs) using industry standards like SAML, OIDC, and OAuth. Build robust and scalable systems that can handle high volumes of authentication requests while ensuring security and performance. Implement strong security measures to protect user data and prevent unauthorized access. Actively participate in code reviews, identify potential issues, and suggest improvements. Stay up More ❯
RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged IdentityManagement) best practices for just-in-time elevation GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and … how they map to Kubernetes API groups Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application IdentityManagement Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure … AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365) EXPERIENCE: 5+ years as a Business Analyst focused on IT security, governance, or IAM Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP Practical knowledge of AWS IAM (users/roles More ❯
RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged IdentityManagement) best practices for just-in-time elevation GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and … how they map to Kubernetes API groups Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application IdentityManagement Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure … AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365) EXPERIENCE: 5+ years as a Business Analyst focused on IT security, governance, or IAM Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP Practical knowledge of AWS IAM (users/roles More ❯
AI ENGINEER Intragen are a leading Identity and Access Management partner in Europe. With solutions spanning IAM, PAM, IGA and CIAM, utilising tools from One Identity, United Identity, Okta, SailPoint, CyberArk and Workato, Intragen are a trusted partner for securing identities for businesses. To support our internal innovation and enhance our IAM offerings, we're looking … Fluent English Key Responsibilities: Drive the development of AI/ML features to improve internal tools and automate business workflows across the business. Assist in adding AI functionality to identity security solutions (such as detecting unusual login patterns or automating access control suggestions). Collaborate with engineers, IAM consultants, and architects to learn and contribute to real-world AI … use cases in cybersecurity. Help collect, clean, and prepare data for model training and analysis. Stay curious and up to date with developments in AI, identity, and security fields. Participate in internal research and proof-of-concept projects. Requirements: You must be an AI enthusiast that can bring innovative ideas to our exciting business. 12 months to 3 years More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation and management of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud infrastructure … design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the transition of … legacy applications and infrastructure to cloud. Cloud Administration & Management : Administer and manage cloud services, and others to optimize cloud infrastructure. Oversee the monitoring and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identity and access management (IAM), network security, encryption, and More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation and management of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud infrastructure … design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the transition of … legacy applications and infrastructure to cloud. Cloud Administration & Management : Administer and manage cloud services, and others to optimize cloud infrastructure. Oversee the monitoring and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identity and access management (IAM), network security, encryption, and More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation and management of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud infrastructure … design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the transition of … legacy applications and infrastructure to cloud. Cloud Administration & Management : Administer and manage cloud services, and others to optimize cloud infrastructure. Oversee the monitoring and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identity and access management (IAM), network security, encryption, and More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … friendly platforms. Key Responsibilities: Platform Design & Development: Design, develop, and maintain the core platform infrastructure on Azure, including networking, compute, storage, security, and identity management. Implement infrastructure-as-code (IaC) using tools like Terraform, ARM templates, or Bicep to automate infrastructure provisioning and management. Develop and maintain platform components, such as APIs, CLIs, and web interfaces, to provide self … Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerability management processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration & Communication: Collaborate More ❯
critical for our Monetary Analysis, Forecasting, and Modelling activities. The Platform Engineer will focus on creating a self-service, scalable, and reliable platform that streamlines development workflows, simplifies infrastructure management, and enhances overall productivity. This role requires a strong understanding of cloud computing (specifically Azure), infrastructure-as-code (IaC), DevOps practices, containerisation, orchestration, and a passion for building developer … friendly platforms. Key Responsibilities: Platform Design & Development: Design, develop, and maintain the core platform infrastructure on Azure, including networking, compute, storage, security, and identity management. Implement infrastructure-as-code (IaC) using tools like Terraform, ARM templates, or Bicep to automate infrastructure provisioning and management. Develop and maintain platform components, such as APIs, CLIs, and web interfaces, to provide self … Compliance: Implement security best practices and controls within the platform infrastructure and CI/CD pipelines. Ensure compliance with relevant security standards and regulations. Implement security scanning and vulnerability management processes. Documentation & Support: Develop and maintain comprehensive documentation for the platform, including API documentation, user guides, and troubleshooting guides. Provide support to users of the platform. Collaboration & Communication: Collaborate More ❯
compliance. Translate emerging threats and technology trends into actionable strategies. Guide clients through compliance with DORA, NIS2, and UK regulatory frameworks. Design comprehensive cyber security architectures that integrate cloud, identity, data, and threat protection. Build actionable implementation roadmaps considering business objectives and constraints. Evaluate and integrate partner technologies (e.g., Microsoft, AWS, GCP) for optimal client outcomes. Deliver reusable frameworks … and methodologies across common cyber challenges. Lead C-level workshops on cyber strategy, risk management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO 27001, and industry-specific standards. Facilitate threat and risk workshops tailored to client environments. Showcase innovation through demos of emerging technologies like … activities including webinars, events, and publications. Build internal capabilities through methodologies, training, and delivery standards. Technical Focus Areas Secure architecture across Azure, AWS, and GCP Zero Trust frameworks and identitymanagement Cloud posture management and threat protection Security automation and DevSecOps integration Security Operations SOC transformation and cloud-native security ops Threat detection with XDR, NDR, and More ❯
We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant to lead the secure migration of privileged accounts into their existing Privileged Access Management (PAM) and Account Lifecycle Management (ALM) environment. This contract is offered at £500 per day, outside IR35, for an initial 6 month term with strong potential for extension. … existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into ALM, ensuring controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such … as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identitymanagement is required, alongside scripting skills (PowerShell, Python or similar) to support automation and integration tasks. You must demonstrate excellent communication, documentation, analytical and troubleshooting skills, with the ability to work independently while coordinating across More ❯