load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI development teams More ❯
load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI development teams More ❯
load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI development teams More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI development teams More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI development teams More ❯
Hull, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
uptime, performance, and stability, including load testing and infrastructure issue resolution. Security Management: Manage server security aspects, including patching, upgrades, penetration testing, vulnerability scanning, security protocols, and authentication methods (SSO - SAML and OAuth). User Support: Provide technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration: Work with BI development teams onMore ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
LTIMindtree
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Impact Team
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
handsworth, yorkshire and the humber, united kingdom
Impact Team
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management-SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows-to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management: Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … with Kubernetes RBAC (Role Bindings, Cluster Role Bindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Vallum Associates
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
handsworth, yorkshire and the humber, united kingdom
Vallum Associates
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. -Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and … . Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
handsworth, yorkshire and the humber, united kingdom
eTeam
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). 5. SaaS Application Identity Management o Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). o Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding … . • Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). • Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). • Strong gap-analysis skills, able to pinpoint missing or weak access controls. • Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
eTeam
RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments. … IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). 5. SaaS Application Identity Management o Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). o Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding … . • Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). • Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). • Strong gap-analysis skills, able to pinpoint missing or weak access controls. • Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/ More ❯
Portsmouth, yorkshire and the humber, united kingdom
TalentHawk
technical solutions aligned with company policies and security standards. Entra ID Integration: Implement and manage Entra ID solutions, including user provisioning, access management, and singlesign-on (SSO) configurations. Collaboration: Work with cross-functional teams including IT, security, and business units to support identity-related projects and initiatives. Documentation: Develop and maintain detailed documentation More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vanloq
bindings, and policy auditing at scale. Kubernetes RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM, or Governance. Prior More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vanloq
bindings, and policy auditing at scale. Kubernetes RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM, or Governance. Prior More ❯
resolving security issues from identification to resolution. Supporting IAM technologies by monitoring and enhancing identity, access, and data protection activities. Managing user roles, permissions, and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth). Designing and enforcing policies on least privilege access, identity governance, and access reviews. Overseeing identity lifecycle management, including provisioning, de-provisioning, and access modifications. Monitoring More ❯
systems Experience with networking systems including Wireless, Switches, Firewalls, Routers, etc. Aruba, HP, Cisco Meraki and Ubiquiti experience is advantageous Experience supporting typical enterprise security technologies such as SingleSignOn, EDR, spam filtering & phishing controls. Crowdstrike skills are advantageous Experience supporting & administering Mobile Device Management Solutions JumpCloud experience is advantageous Experience in implementing More ❯
Office package and CRM, ERP, online project management tools, and collaborative networking tools. Experience with LMS platforms, APIs, and integrations. Good knowledge of enterprise technologies and systems like LDAP, SSO, CRM, ERP, or HRIS. Understanding of user/platform administration and technologies in e-learning environments: LMS, SCORM/xAPI, LRS, LXP for example. Personal Attributes: Willingness to travel Time More ❯
Office package and CRM, ERP, online project management tools, and collaborative networking tools. •Experience with LMS platforms, APIs, and integrations. •Good knowledge of enterprise technologies and systems like LDAP, SSO, CRM, ERP, or HRIS. •Understanding of user/platform administration and technologies in e-learning environments: LMS, SCORM/xAPI, LRS, LXP for example. Personal Attributes: •Willingness to travel •Resilience More ❯
bradford, yorkshire and the humber, united kingdom
Netex Learning
Office package and CRM, ERP, online project management tools, and collaborative networking tools. •Experience with LMS platforms, APIs, and integrations. •Good knowledge of enterprise technologies and systems like LDAP, SSO, CRM, ERP, or HRIS. •Understanding of user/platform administration and technologies in e-learning environments: LMS, SCORM/xAPI, LRS, LXP for example. Personal Attributes: •Willingness to travel •Resilience More ❯