our dynamic team. The successful candidate will play a critical leadership role in delivering complex technical programs and driving key cybersecurity initiatives, particularly in the areas of Authentication, Identity and Access Management (IdAM), and overall access governance. This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms to replace … broader enterprise technology goals. Cyber Security and IdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with enterprise-wide access management systems. Ensure all programs comply with security best practices, regulatory requirements (e.g., GDPR), and internal security policies. Oversee change … Authentication and IdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identity lifecycle management, and secure architecture design. Technical Skills In-depth understanding of identity standards (e.g., OAuth2, OpenID Connect, SAML). Hands-on experience with enterprise IdAM platforms More ❯
dynamic team. The successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, Identity and Access Management (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms to replace legacy … broader enterprise technology goals. Cyber Security and IdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with enterprise-wide access management systems. Ensure all programs comply with security best practices, regulatory requirements (e.g., GDPR), and internal security policies. Oversee change … Authentication and IdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identity lifecycle management, and secure architecture design. Technical Skills In-depth understanding of identity standards (e.g., OAuth2, OpenID Connect, SAML). Hands-on experience with enterprise IdAM platforms More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £85,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with experience designing and implementing IAM frameworks, managing access governance, and improving security posture in large-scale environments. You'll combine hands-on technical … with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're seeking a senior-level Identity & Access Management (IAM) and Security specialist to take ownership of a global security roadmap and design IAM frameworks that protect operations across multiple countries. This is not a generic … level security objectives into practical, scalable solutions. Key Responsibilities: Own and deliver the Global Technology Operations security roadmap Design & implement IAM frameworks (Saviynt preferred, Okta/SailPoint/PingIdentity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Work with CISO and leadership to identify & mitigate security risks Respond to identityMore ❯
data integrity, privacy, and platform security throughout implementations What We're Looking For Strong technical background with hands-on experience in SaaS onboarding or implementation roles Proficient in identity and access management (IAM), including SAML, OAuth, and OpenID Connect Familiarity with directory services (LDAP, SCIM) and secure user provisioning practices Comfortable working with RESTful APIs, JSON, XML, and … projects and priorities in a fast-paced environment Experience supporting enterprise-level clients and managing expectations effectively Exposure to IDPs such as Azure AD/Entra ID, Okta, PingIdentity, etc. Bonus: understanding of data storage, ETL, and hands-on programming knowledge (C# a plus) Why Join Oak? A meaningful role in a mission-led SaaS More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
and on-premise infrastructure. Essential Skills & Experience Java : Proven hands-on experience building and supporting high-scale applications (e.g., FX trading systems). Authentication Systems : Direct experience with PingIdentity, with a preference for ForgeRock. Policy-as-Code : In-depth knowledge of frameworks like Styra OPA, OPAL, or Permit I.O. Cloud & Containers : Expertise in cloud environments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
and on-premise infrastructure. Essential Skills & Experience Java : Proven hands-on experience building and supporting high-scale applications (e.g., FX trading systems). Authentication Systems : Direct experience with PingIdentity, with a preference for ForgeRock. Policy-as-Code : In-depth knowledge of frameworks like Styra OPA, OPAL, or Permit I.O. Cloud & Containers : Expertise in cloud environments More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Randstad Technologies
in high-scale environments Deep understanding of AWS and hybrid cloud setups Hands-on container orchestration and deployment know-how Experience with policy-as-code and authentication systems (PingIdentity is a plus) SQL skills for data-driven engineering Why You'll Love It Work on technology used worldwide? Collaborate with skilled teams and diverse stakeholders More ❯
business - someone who can lead with clarity, build with empathy, and bring a mix of technical depth and sound judgment. There's loads to get stuck into, from identity management and scripting to device management and scalable tooling, areas where most of our work sits and where we need thoughtful, sustainable solutions. You'll play an important role … across all areas of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in Identity and Access Management, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture, UI … and hardware. Lead and manage complex technical projects with multiple stakeholders from around the business. Examples of some TechOps projects include Rollout of, and migration to, a new identity provider mac OS and Windows MDM migration Rollout of a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office More ❯