Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable for investigating incidents … recommending corrective actions, and training users on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM landscape. … communication to users on IAM policies and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. Manage multi-factor authentication (MFA More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to apply) Job requisition id: R010049 AVEVA is creating software trusted … by over 90% of leading industrial companies. Position: Identity and AccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the norm paid vacation, contributions to retirement investment plans or pensions, insurances and many other memberships and perks designed to enhance … the workplace experience, your health, and wellbeing. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with More ❯
collaboration with internal teams and third-party partners to ensure seamless integration and operation of identity services, with a focus on improving current environments and processes. Key Responsibilities Identity Management: Lead support for transitioning identity services from Active Directory to Entra ID environments, ensuring optimal performance, security, and reliability. Assist with implementing an industry-leading Identity Governance and Administration … management. Experience in Microsoft technical administration and troubleshooting. Familiarity with identity and accessmanagement (IAM) principles and best practices. Exposure to PrivilegedAccessManagement (PAM) tools such as CyberArk and/or IGA platforms like SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred) Microsoft Certified: Identity and Access … Migration: Collaborate with SMEs and project managers to deliver technical work packages supporting migration. CyberArk Implementation: Assist in technical delivery for a new PrivilegedAccessManagement (PAM) tool. Windows 11 Deployment: Support deployment projects involving features like Windows Hello and AutoPatch/Pilot. Identity Tooling (SailPoint ISC): Support data identity projects and tool implementation. Remediation & Process Improvements More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation’s IT operations, ensuring the stability, continuity, security, and efficiency of its technology … platforms. Manage identity and accessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … management best practices. Identity & AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking & Infrastructure Security: Understanding of firewalls More ❯
Netskope SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration management and continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement … and supporting Identity and AccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of PrivilegedAccessManagement (PAM) solutions, including policy definition, Just-In-Time (JIT) access implementation, and proactive monitoring of privileged activity for security threats Our Infrastructure Stack: Operating Systems: Windows, macOS, ChromeOS, Linux More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
Enterprise Information Technology Services Location: London, Hybrid Main Purpose: Identity is a core security component in any modern IT estate, ensuring the right people, machines, and software components have access to the correct resources at the appropriate time, while preventing unauthorised access and maintaining a secure environment. The Identity and Access Manager role heads up this crucial … security function within the Cyber Security Team and will Lead strategic development and operational management of identity services. Develop and manage identity and access related tooling and processes to ensure mature, efficient, and secure working practices. Be an advocate for best practices in Identity and Access Management. Ensure compliance and risk management standards are met. Main … Responsibilities: Lead the Identity and Access function within the Cyber Security team, including: o AccessManagement o Identity Governance and Administration o Role Based Access Control o PrivilegedAccessManagement o Identity Threat Detection and Response o Access Certification o Identity Data Management & Analytics Ensure that only authorised identities have accessMore ❯
data-informed decisions and innovations in our digital identity solutions. Key Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM, cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: Bachelor’s degree in … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Domain Knowledge: Basic understanding of digital identity concepts: SSO, MFA, RBAC and ABAC Knowledge More ❯
have extensive hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN, and Virtual Desktop Infrastructure (VDI … Zero Trust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention … Security, Cloud Security, or IT Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), and security automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi-cloud security best practices. Languages More ❯
experience. Job grade B Closing date 25/06/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our … systems remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management and optimisation of Active Directory (AD), including … management needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccess Management. (PAM) Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to address emerging cybersecurity threats. Agile Delivery More ❯
Architect with extensive hands-on experience of Active Directory and EntraID. We are also seeking an Identity Engineer with hands on experience of Active Directory, EntraID and exposure to privilegedaccessmanagement solutions. Experience of architecture, design and implementation of Identity Governance and Administration technologies such as SailPoint or equivalent is desirable for both positions. Required experience … Proven architecture and design experience with Active Directory and Entra ID (Azure Active Directory) implementation and management. Other Identity Provider experience beneficial. Strong understanding of identity lifecycle management and security principles. Hands-on experience with Conditional Access, MFA, and SSO, Group Policy, Intune and related technologies. Knowledge of protocols such as SAML, OAuth, and OpenID Connect. Experience with More ❯
IAM Security Engineer Job Description Who we are looking for State Street cyber Identity and AccessManagement is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. A robust strategy, architecting zero trust building blocks, deployment, and a passion for effecting change across the organization. This role will … Engage with, influence all levels of the organization, drive collaboration and trust, and ensure practical strategic priorities. Project leadership Oversee implementation of multiple key initiatives, working closely with line management responsible for executing change; define associated change management imperatives and required resources. Work closely with functional areas at state street to develop plans and materials related to standardized … the organization Collaborative leadership and work style with the ability to effectively interact with and earn the trust of peers, CTO, development teams across the organization Project and process management skills, including proven ability to manage multiple projects simultaneously. Self-starter with a keen sense of ownership and commitment to work, and passion for delivering results. Education & Preferred Qualifications More ❯
areas are listed below. Responsibilities: Strategic Leadership: Develop and lead the global Infrastructure AccessManagement strategy aligned with enterprise cybersecurity, IAM, and risk management objectives. Represent PAM in internal governance forums and external regulatory engagements. Program Ownership: Own the end-to-end lifecycle of privileged and infrastructure access, including onboarding, provisioning, session management, monitoring … and deprovisioning. Drive modernization and automation initiatives, including vaulting, just-in-time (JIT) access, and zero trust implementations. Technology & Architecture: Oversee the architecture, engineering, and operations of PAM platforms. Partner with infrastructure, cloud, and DevSecOps teams to integrate PAM into hybrid and cloud-native environments. Risk & Compliance: Ensure alignment with global regulatory requirements (e.g., FFIEC, EBA, MAS, APRA, etc. … and internal policies .Manage audit readiness, response, and remediation related to privileged access. People & Stakeholder Management: Lead and develop a high-performing, globally distributed PAM team. Partner with application owners, IT operations, risk, and compliance to embed PAM controls across the enterprise. Metrics & Continuous Improvement: Define and track KPIs and KRIs for PAM effectiveness and risk reduction. Continuously More ❯
StrongDM is driven by a clear mission: Secure Access, Zero Trust. We design products and … solutions that reflect this commitment, transforming the way organizations manage privilegedaccess across their critical infrastructure. By leading with Zero Trust PrivilegedAccessManagement (PAM), we help our customers achieve secure, dynamic, and fine-grained control over access to their most sensitive resources. This focus on security has earned us an industry-leading … to master things you may know nothing about. Don't know how to kubectl now? That's fine; you will learn Experience with PrivilegedAccessManagement - PAM (Cyberark, Teleport, Delinea), SASE and related network technologies Experience with Kubernetes, Ansible, Terraform, CI/CD (Jenkins, Github, etc), Identity Providers (Okta, Ping, Azure AD/Entra ID, AWS etc. More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security … in an enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed employees to learn and develop their career with us. At Thales UK, we research, develop, and supply technology and services … suits your lifestyle and helps you reach your ambitions. We are looking for someone enthusiastic and ambitious to join our Pre-Sales team to work with our Identity and Accessmanagement portfolio. In this position, you will be working closely with the Workforce IAM sales team to respond to partner and customer needs for our solutions. The job More ❯
SC Cleared Data Analyst Responsibilities: Analyse identity and account data across secure systems to identify and detect trends, anomalies, policy violations, and access risks. Support the design, implementation, and refinement of RBAC and ABAC models aligned with defence security standards. Develop and maintain secure, auditable dashboards and reports to monitor access provisioning, deprovisioning, and entitlements. Collaborate with IAM … cybersecurity, IT, and compliance teams to define access roles, attributes, compliance metrics and policies. Conduct periodic access reviews and support audit and compliance efforts. Automate reporting processes and improve data visualization for stakeholders. Translate complex data into actionable insights to support decision-making. Requirements: Education & Experience: 2+ years of experience in a data analyst role, preferably within secure … plus. Experience with IAM platforms such as Microfocus NetIQ, Microsoft Entra ID (Azure AD), SailPoint, ForgeRock, Okta. Familiarity with identity lifecycle management, privilegedaccessmanagement (PAM), and access certification processes. Understanding of event-driven data, behavioral analytics, and anomaly detection methods. Regards Chaya More ❯
and traditional infrastructure, data, and SaaS applications to eliminate identity-related threats. With intelligent authorization, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams' adoption by deploying in weeks, not months, and makes them more productive by … MFA, RSA/SecureID, Ping, OATH, OTPs. A strong understanding of software, computer, network infrastructure, security fundamentals and best practices as it pertains to Privilege AccessManagement (PAM). Great organizational or technical project management skills. Self-starter mindset with an ongoing desire to stay current with software market and latest technologies. The ability to thrive in … environment. Bonus if you have: Administrative experience with Delinea products, such as Secret Server or Privilege Manager; Server Suite or Privilege Access Service. Experience with the administration of PAM tools like CyberArk, Beyond Trust, HashiCorp, Okta. Windows Workstation endpoint management and administration experience. Scripting skills and working knowledge of PowerShell; other languages. MS SQL or PostgreSQL experience. RabbitMQ More ❯
Azure AD, and hybrid cloud integrations. To manage Azure Virtual Machines and cloud-based workloads and integrations with cloud-based solutions. To administer Azure Active Directory for identity and accessmanagement and associated MFA and privilegedaccessmanagement security solutions. Integrating on-premises infrastructure with Azure and other federated services in a secure and resilient … ensure compliance with industry standards and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the implementation and management of CyberSecurity controls Including compliance and a standards-based approach to systems implementation and management. Working to develop and maintain the CyberSecurity documentation, including appropriate procedures, standards and guidelines. … operations. Develop and maintain system documentation. Create detailed documentation for system configurations and processes. Maintain up-to-date records of IT assets and configurations. Participate in change and configuration management processes. Developing knowledge base articles and training materials for other colleagues and members of the data and systems team IT staff. Skills and Experience Essential Experience as a System More ❯
Azure AD, and hybrid cloud integrations. To manage Azure Virtual Machines and cloud-based workloads and integrations with cloud-based solutions. To administer Azure Active Directory for identity and accessmanagement and associated MFA and privilegedaccessmanagement security solutions. Integrating on-premises infrastructure with Azure and other federated services in a secure and resilient … ensure compliance with industry standards and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the implementation and management of CyberSecurity controls Including compliance and a standards-based approach to systems implementation and management. Working to develop and maintain the CyberSecurity documentation, including appropriate procedures, standards and guidelines. … operations. Develop and maintain system documentation. Create detailed documentation for system configurations and processes. Maintain up-to-date records of IT assets and configurations. Participate in change and configuration management processes. Developing knowledge base articles and training materials for other colleagues and members of the data and systems team IT staff. Skills and Experience Essential Experience as a System More ❯
PAM/ALM Consultant/PrivilegedAccess Engineer Outside IR35 Contract £500/day London/Remote We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant/PrivilegedAccess Engineer to lead the secure migration of privileged accounts into their existing PrivilegedAccessManagement (PAM … at £500 per day, outside IR35, for an initial 6 month term with strong potential for extension. The successful consultant will take ownership of the remaining phases of the PAM implementation, building on an existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into … ALM, ensuring controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identity managementMore ❯
PAM/ALM Consultant/PrivilegedAccess Engineer – Outside IR35 Contract – £500/day – London/Remote We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant/PrivilegedAccess Engineer to lead the secure migration of privileged accounts into their existing PrivilegedAccessManagement (PAM … at £500 per day, outside IR35, for an initial 6 month term with strong potential for extension. The successful consultant will take ownership of the remaining phases of the PAM implementation, building on an existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into … ALM, ensuring controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identity managementMore ❯
PAM/ALM Consultant - Outside IR35 Contract - £500/day - London/Remote We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant to lead the secure migration of privileged accounts into their existing PrivilegedAccessManagement (PAM) and Account Lifecycle Management (ALM) environment. This contract is offered at … per day, outside IR35, for an initial 6 month term with strong potential for extension. The successful consultant will take ownership of the remaining phases of the PAM implementation, building on an existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into ALM, ensuring … controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identity management is More ❯
PAM/ALM Consultant Outside IR35 Contract £500/day London/Remote We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant to lead the secure migration of privileged accounts into their existing PrivilegedAccessManagement (PAM) and Account Lifecycle Management (ALM) environment. This contract is offered at … per day, outside IR35, for an initial 6 month term with strong potential for extension. The successful consultant will take ownership of the remaining phases of the PAM implementation, building on an existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into ALM, ensuring … controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identity management is More ❯
PAM/ALM Consultant – Outside IR35 Contract – £500/day – London/Remote We are supporting one of our key clients in appointing an experienced PAM/ALM Consultant to lead the secure migration of privileged accounts into their existing PrivilegedAccessManagement (PAM) and Account Lifecycle Management (ALM) environment. This contract is offered at … per day, outside IR35, for an initial 6 month term with strong potential for extension. The successful consultant will take ownership of the remaining phases of the PAM implementation, building on an existing Delinea (Secret Server and ALM) deployment. The primary focus will be to design, build, test, and securely migrate outstanding privileged and service accounts into ALM, ensuring … controlled credential management, secure access, and minimal disruption to operational services throughout the process. Extensive hands-on experience with PAM platforms is essential, ideally with Delinea, though experience with other solutions such as CyberArk, BeyondTrust or similar will also be considered. A strong technical foundation in Active Directory, LDAP, SAML, Azure AD, and hybrid identity management is More ❯