Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
experience working with Entra ID, Security best practices, Entra RBAC, Identity & Governance (PIM, PAM, JIT, Least Privileged), Domain Controllers, AD, AD Connect, Authentication, SSO (SAML/OIDC). Excellent communication skills and customer focus. Ability to plan, prioritise and complete your own work. Willingness to engage with and work in More ❯
and leadership skills. A passion for learning and staying on top of the latest tech trends. Nice to Have: Experience with modern authentication protocols (SAML, OAuth) and Identity Providers (B2C, Auth0). Ability to work across all levels, from boards to developers. Work on diverse, impactful projects in dynamic teams More ❯
and leadership skills. A passion for learning and staying on top of the latest tech trends. Nice to Have: Experience with modern authentication protocols (SAML, OAuth) and Identity Providers (B2C, Auth0). Ability to work across all levels, from boards to developers. Work on diverse, impactful projects in dynamic teams More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
backend systems, and future initiatives. About you You should have significant experience or aptitude in areas such as: Identity and Access Management (e.g., MFA, SAML, Kerberos) Networking protocols and security (e.g., IPv4/6, TLS, VPN, Wireless Security) Automation and scripting (e.g., API, Ansible, Terraform, Bash, PowerShell) Security architectures (e.g. More ❯
Be an engaging leader who ensures the Customer Identity team develops as individuals and as a function Manage the identity federation and authentication protocols (SAML, OAuth, OIDC) Ensure that both regulatory policies and security policies are adhered to in the identity governance team IAM Team Lead – Your Background The ideal More ❯
as OSCP, OSCE, OSWE, GPEN, GCIH, GWAPT, GXPN, CREST, or similar. Experience with red teaming and internal VAPT drills. Familiarity with attacks including golden SAML attacks and constraint transfer attacks. Experience with network OS, Windows/nix/MacOS, network communication protocols, virtual environments, cloud environments, mobile OS (Android/ More ❯