Privileged Identity Management Jobs in the UK excluding London

10 of 10 Privileged Identity Management Jobs in the UK excluding London

Senior Cloud Identity Administrator

Winchester, Hampshire, United Kingdom
BENTLEY SYSTEMS, INC
Select how often (in days) to receive an alert: Position Summary: We are seeking a skilled Senior Cloud Identity Administrator to join our Digital Identity team. The ideal candidate will be responsible for ongoing activities related to identity and authorization of our various cloud services and applications. This role requires familiarity with concepts related to identity, such as multifactor authentication and single sign-on. Key Responsibilities: Cloud Identity & Access Management: Lead and manage the design, implementation, andongoing optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure … and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged Identity Management (PIM) in Entra. Access Control & Security: Establish and enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Specialist

Sheffield, UK
Hybrid / WFH Options
LTIMindtree
Cybersecurity Specialist Location: UK - Sheffield (Hybrid) BA Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service More ❯
Posted:

Business Analyst

Sheffield, UK
Impact Team
contract Hybrid – 3 days per week in Sheffield Up to £600 per day Job role: Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service More ❯
Employment Type: Full-time
Posted:

Business Analyst

Handsworth, West Midlands, UK
Impact Team
contract Hybrid – 3 days per week in Sheffield Up to £600 per day Job role: Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service More ❯
Employment Type: Full-time
Posted:

Cybersecurity Business Analyst-Banking

Sheffield, England, United Kingdom
Vallum Associates
Location: Sheffield (3day/week onsite) Duration: 06+ Months Banking Client Experience Required Job Description -Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analyzing IAM logs and evaluating risk. -On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally … Directory & Azure RBAC Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. GCP IAM Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service More ❯
Posted:

Cloud IAM BA

Sheffield, England, United Kingdom
eTeam
Duration: 28/11/2025 Rate: 406GBP/Day(Inside IR35) Role Description: BA - Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … RBAC o Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. o Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. 3. GCP IAM o Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined More ❯
Posted:

Cloud IAM BA

Handsworth, West Midlands, UK
eTeam
Duration: 28/11/2025 Rate: 406GBP/Day(Inside IR35) Role Description: BA - Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data … driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally … RBAC o Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. o Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation. 3. GCP IAM o Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined More ❯
Employment Type: Full-time
Posted:

Identity and Access Management (IAM) Specialist – M365

South East London, England, United Kingdom
Hybrid / WFH Options
Xcede
SC clearance is required We're working with a client that is looking for an M365 IAM Specialist who will play a key role in securing and optimising our identity infrastructure of the organisation. The ideal candidate will possess extensive expertise in Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth … knowledge of Conditional Access, Azure Active Directory (Azure AD), and identity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, and access reviews. Monitor and respond … related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged Identity Management (PIM), and role-based access control (RBAC). Troubleshoot complex identity and access issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best More ❯
Posted:

Infrastructure Security Engineer - Microsoft Entra

Cheadle, Staffordshire, United Kingdom
Hybrid / WFH Options
Pets at Home
Infrastructure Security Engineer - Microsoft Entra (Identity & Access) Hybrid role, 2-3 days in the office in Handforth, 1-2 days WFH Type: 12 months Contract Reports into Infrastructure Manager Overview: We are seeking a skilled Infrastructure Engineer with a strong focus on Microsoft Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play … a critical role in architecting, deploying, and maintaining secure identity and access solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure AD), Entra Permissions Management, Verified ID, and Conditional Access. Configure and maintain identity synchronization (e.g., Azure AD … scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active Directory. Experience with Conditional Access, Privileged Identity Management (PIM), and identity lifecycle workflows. Hands-on experience with Azure AD Connect, hybrid identity management, and Active Directory. Familiarity with scripting and automation tools (e.g., PowerShell, Graph API More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

R&D OT Network Security Engineer

Stevenage, Hertfordshire, United Kingdom
Hybrid / WFH Options
GlaxoSmithKline
the necessary operational knowledge to specify network changes, assuring continued network availability. The OT Network Security Engineer will support Site Focal Point with technical insight necessary for secure file management according to policies and have a role in new system implementation and incident response. It is key for the OT Network Security Engineer to have in-depth understanding of … the implementation of key network controls such as segmentation to isolate different parts of the OT environment, zoning to secure conduits for communication between zones and firewall management. Change Management: Implement change control processes to ensure that network changes are appropriate tested and approved without disruption to critical OT operations. Incident Management: Support the technical response to operational … technology-related incidents, ensuring rapid resolution to minimize downtime and operational disruption. Device Management: Harden devices such as switches, routers, firewalls by partnering and coordinating with the R&D OT Security Team and other key stakeholders aligned to GSK standards and proportionate to risk. Wireless Security: Support the security of OT communication protocols by enabling encryption, authentication or using More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Privileged Identity Management
the UK excluding London
25th Percentile
£44,000
Median
£46,000
75th Percentile
£48,000
90th Percentile
£58,375