Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. SingleSign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players … need Detailed understanding of risk and control principles and how processes are implemented and improved in an IAM system (e.g., JML, PAM, Access Request, Access Review, Adaptive Risk, RBAC, SSO, MFA, etc.) Ability to work with a client, as part of a team to deliver an IAM solution across all aspects of the SDLC (Analyse, Design, Develop/Configure, Test More ❯
Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. SingleSign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players … need Detailed understanding of risk and control principles and how processes are implemented and improved in an IAM system (e.g., JML, PAM, Access Request, Access Review, Adaptive Risk, RBAC, SSO, MFA, etc.) Ability to work with a client, as part of a team to deliver an IAM solution across all aspects of the SDLC (Analyse, Design, Develop/Configure, Test More ❯
enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and IDaaS Strong background in core security technologies such as firewalls, IDS/IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and access management (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. Experience with cloud security across multiple platforms (Azure, Google Cloud). Expertise in More ❯
If you need support in completing the application or if you require a different format of this document, please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request More ❯
design and proxy development using Apigee Edge, X, and/or Hybrid . Solid understanding of REST, JSON, XML , and modern API security patterns (OAuth2, JWT, mTLS, SAML/SSO). Experience deploying and operating applications on Kubernetes - with knowledge of pods, services, namespaces, helm, IP/CIDR planning, and cluster sizing . Proven experience working with DevOps More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Paritas Recruitment
comparison will capture which applications require changes to support shared access to SaaS applications. We are looking for an individual who understands IDPs (Okta would be best) and how SSO works, who does not need to architect or design solutions. The client is looking for somebody who will hit the ground running and will be proactive from the get go. More ❯
Design processes. SME for help when needed for infrastructure issues. Hybrid-based, covering various Office location as and when required, 3 days/week office attendance. SKILLS Must have SSO & IAM Expertise- Strong understanding of SSO protocols:- SAML 2.0, OAuth 2.0, OIDC (OpenID Connect)- Experience designing and implementing SSO architectures across enterprise applications- Deep knowledge of Identity Providers (IdPs) and … Service Providers (SPs)Hands-on Experience with SSO Platforms (Azure AD/Entra ID, Okta etc).Experience with federation, multi-tenant SSO, and Just-in-Time (JIT) provisioningIntegration and Development- Ability to integrate SSO with cloud-based and on-prem applications- Knowledge of JWT, assertions, tokens, and claims transformation- Familiarity with SCIM for user provisioning/… e.g., GDPR, HIPAA) related to identity- Cloud infrastructure knowledge (Azure, AWS, GCP) especially around IAM componentsKnowledge of CI/CD pipelines and how auth impacts DevSecOpsFamiliarity with mobile app SSO integration (deep linking, PKCE)Experience working with legacy apps that need modern auth retrofittedMulti-factor authentication (MFA) solutions and passwordless strategies Nice to have Strong stakeholder communication - explaining auth concepts More ❯
design skills. Understanding of Service Oriented Architecture (SOA). Knowledge of architectural frameworks and best practices. Experience deploying internet-based software architectures, addressing security, singlesign-on, performance, caching, sizing, scalability, and service availability. Experience with Agile development methodologies. Candidate Details Needed: Availability/Notice Period Current Location Expected Rate Relevant Years of Experience More ❯