Northampton, England, United Kingdom Hybrid / WFH Options
eTeam
IAM trends and contribute to architecture evolution. Requirements: Experience with IAM tools such as IBM Security Identity Manager, Ping Identity, or Microsoft Identity Manager. Knowledge of IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration, user provisioning, role management, and access reviews. Proficiency in Java and frameworks like Spring and Hibernate. Familiarity with cloud More ❯
implementation, andongoing optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged Identity Management (PIM) in Entra. Access Control & Security: Establish and enforce security … registrations, zones, and redirects. Manage certificate lifecycles. Required Skills and Experience: Minimum of 5 years' experience with Microsoft Azure/Entra ID and services. Expertise in identity federation protocols (SAML, OAuth, OpenID Connect) and Single Sign-On (SSO) configurations. Experience with Microsoft Active Directory. Experience with Privileged Identity Management, MFA, and Conditional Access Policies. Working knowledge of all aspects of More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
LTIMindtree
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Impact Team
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
handsworth, yorkshire and the humber, united kingdom
Impact Team
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management-SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows-to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management: Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … Familiarity with Kubernetes RBAC (Role Bindings, Cluster Role Bindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
handsworth, yorkshire and the humber, united kingdom
Vallum Associates
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Vallum Associates
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS … bindings). Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
eTeam
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). 5. SaaS Application Identity Management o Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). o Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major … bindings). • Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). • Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). • Strong gap-analysis skills, able to pinpoint missing or weak access controls. • Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
handsworth, yorkshire and the humber, united kingdom
eTeam
groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. Cloud-Specific … IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). 5. SaaS Application Identity Management o Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). o Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major … bindings). • Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). • Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). • Strong gap-analysis skills, able to pinpoint missing or weak access controls. • Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform More ❯
cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication & Authorisation mechanisms (e.g. SAML, OIDC, OAuth2) for internal and customer facing applications Work closely with IAM Engineering colleagues, DevOps, and secure teams to integrate IAM into CI/CD pipelines and Infrastructure-as-Code … vaulting, session monitoring, credential rotation, and application onboarding Deep understanding of Active Directory, Entra ID schema design, federation services and group management strategies. Familiarity with IAM protocols and standards: SAML, OIDC, OAuth2, SCIM, Kerberos, etc Experience integrating IAM with cloud platforms (Azure, AWS, GCP), SaaS applications and enterprise infrastructure Excellent stakeholder management, with the ability to translate security requirements into More ❯
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
kettering, midlands, united kingdom Hybrid / WFH Options
undisclosed
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
milton keynes, south east england, united kingdom Hybrid / WFH Options
undisclosed
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
cloud environments Provide guidance and architectural support for directory service modernisation ensuring security and role modelling across hybrid IT estates Lead the secure integration of Authentication & Authorisation mechanisms (e.g. SAML, OIDC, OAuth2) for internal and customer facing applications Work closely with IAM Engineering colleagues, DevOps, and secure teams to integrate IAM into CI/CD pipelines and Infrastructure-as-Code … vaulting, session monitoring, credential rotation, and application onboarding Deep understanding of Active Directory, Entra ID schema design, federation services and group management strategies. Familiarity with IAM protocols and standards: SAML, OIDC, OAuth2, SCIM, Kerberos, etc Experience integrating IAM with cloud platforms (Azure, AWS, GCP), SaaS applications and enterprise infrastructure Excellent stakeholder management, with the ability to translate security requirements into More ❯
the evolution of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with More ❯
with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g. … roles/bindings) Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE) Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning) Strong gap-analysis skills, able to pinpoint missing or weak access controls Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯