AD B2C.Solid full-stack development background (front-end + back-end integration).Proven experience designing and deploying external identity solutions for enterprise environments.Deep understanding of OAuth2, OpenID Connect, and SAML protocols.Knowledge of API security, custom policies, and user journey configuration.Excellent communication, problem-solving, and stakeholder management skills.Desirable:Experience with large-scale consumer or partner identity deployments.Familiarity with CI/CD More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
full-stack development background (front-end + back-end integration). Proven experience designing and deploying external identity solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable: Experience with large-scale consumer or partner identity deployments. Familiarity More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
managed identities, service principals, and Azure AD Connect for hybrid scenarios. Experience managing user provisioning/deprovisioning, conditional access policies, multi-factor authentication, Azure AD Application Proxy, federated authentication, SAML/OAuth integration, and implementing least-privilege access controls across Azure subscriptions and resources. Container Services - Working knowledge of Docker containerisation and Azure Kubernetes Service (AKS) for supporting containerised applications. More ❯
technical logic that enables agents to perform tasks like creating records, triggering notifications, and updating systems. Authentication and Security: Implement and manage secure authentication and authorization protocols (e.g., OAuth, SAML) to ensure that all agent actions are secure and comply with enterprise security policies. Data Flow and Transformation: Manage the real-time flow of data to and from the AI More ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
london (city of london), south east england, united kingdom
Hyerhub
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
clear, actionable operational tasks What we need from you: 4+ years' experience in IAM or cybersecurity leadership Hands-on expertise with IAM tools (Saviynt preferred) and authentication protocols (LDAP, SAML, OAuth) Cloud security experience (AWS, Azure, OCI) Knowledge of scripting/automation (PowerShell, Python) Relevant certifications desirable: CISSP, CISM, CompTIA Security+, Microsoft Identity Strong communication and stakeholder engagement skills If More ❯