South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
Identity & AccessManagement Engineer London, UK £800/day Hybrid (1 Day Office, 4 WFH) Contract (612 Months) Were hiring an Identity & AccessManagement Engineer to support a public sector cyber security uplift programme. The successful contractor will … lead on the separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal … Active Directory: Tier-0 structure, Group Policy, OU segmentation. AADC: Hybrid sync troubleshooting, filtering, and role scoping. Zero Trust & PAW: Secure workstation policies andaccess controls. Contract Details: Start Date: 2nd June Contract Length: 612 Months Clearance Required: Active SC If this Identity & AccessMore ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity … s a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity … backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk managementMore ❯
Technical Identity Specialist Hampshire Contract - inside IR35 - (Apply online only) P/D We're looking for a skilled and proactive Technical Identity Specialist to join our team and support the delivery of secure, scalable identity services across our Microsoft environment. This is a … Share knowledge within the team and contribute to technical design discussions What We're Looking For: 5+ years' experience in identityandaccessmanagement Strong expertise in: Active Directory and Entra ID (Azure AD) Microsoft Intune administration PowerShell and Microsoft 365 tools Experience with … or exposure to: SailPoint ISC and/or CyberArk Identity lifecycle managementandaccess control best practices Ability to work across teams and communicate technical ideas clearly Attention to detail and a proactive approach to problem-solving If this role sounds like a good More ❯
A financial markets firm are building a new authentication andaccessmanagement capability and have an opportunity for an experienced Linux engineer with a strong security lens to build out foundational elements of the platform. This is full lifecycle design, build, implement activity, for someone with … a strong understanding of secure Linux builds, identity/accessmanagement for on-prem and cloud-based systems, and be able to solution based on a strong understanding of HashiCorp Vault, industry standard secure authentication protocols, containerised and automated infrastructure … as-code architectures, and DevSecOps methodologies 15+ years systems or security engineering experience in Linux-based environment Deep understanding of identityandaccessmanagement, and authentication Strong understanding of HashiCorp vault (ideally implementation from scratch) Strong understanding of secure authentication protocols (Kerberos, LDAP) Excellent More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Defence
SQS, etc.) Desirable Skills & Experience Experience with SIEM convergence from legacy platforms Familiarity with tools such as JIRA, Confluence, Git Background in Ethical Hacking, IDAM, PKI, or broader information security disciplines A team-oriented, adaptable mindset with a problem-solving approach Required Qualifications Splunk Cloud Administrator Splunk Enterprise Security Splunk … Systems Security Professional (CISSP) Ethical Hacking & Intrusion Prevention Information Security Management Systems (ISMS) IdentityAccess & Management (IDAMMore ❯
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
Directory (AD) Architect - MUST BE DV CLEARED Are you an experienced Active Directory Architect with a passion for designing and delivering cutting-edge identity solutions ? Do you thrive in agile environments , working with multi-skilled teams to create secure and scalable Active Directory architectures ? If so, this is … adapting solutions to evolving user and security needs. Collaborate with Solution Owners and delivery teams to design and optimise enterprise identityandaccess solutions . Produce and maintain design documentation , ensuring compliance with security and regulatory standards. Implement automation using PowerShell scripting to streamline AD managementand testing . What We're Looking For: Extensive experience in IdentityandAccessManagement technologies. Deep knowledge of MS Windows Enterprise architectures and AD environments. Strong PowerShell scripting and automation skills for managing enterprise AD solutions. Experience with agile delivery methodologies More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. · Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). · Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless digital experiences for hundreds of thousands of clients across the UK and Europe. As part of the … ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). … Implement secure authentication mechanisms such as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive More ❯
Outside IR35 Contract Duration: 6 Months Key Responsibilities: Oversee Azure Kubernetes Service (AKS) deployments, ensuring high availability, security, and scalability. Manage Microsoft 365 identityandaccess solutions, including Azure AD B2C and Single Sign-On (SSO) configurations. Administer secure remote access technologies and enforce … web security, DDoS protection, and performance enhancement. Lead incident response, conduct forensic investigations, and implement preventive measures. Manage Dataverse solutions, including data modelling, access permissions, and security policies. Required Skills: Strong knowledge of Azure AKS and DevOps practices. Proficiency in Microsoft 365 security andidentityaccessMore ❯
City of London, London, United Kingdom Hybrid / WFH Options
VIQU Limited
Architect – Zero Trust – 6 months – Fully Remote – Outside of IR35 My Customer is seeking a highly skilled Architect to lead the design, implementation, andmanagement of a Zero Trust security architecture leveraging Microsoft security technologies . This role is critical to enhancing our security posture and aligning our … infrastructure with modern, identity-centric security principles. Key Responsibilities of the Security Architect … Design and maintain a scalable Zero Trust architecture aligned with industry best practices and organizational objectives. Develop and implement modern IdentityandAccessManagement (IAM) solutions that enforce Zero Trust principles. Deep knowledge of Microsoft security tools (e.g., Microsoft Entra ID, Defender suite, Purview More ❯
London, Bishopsgate, United Kingdom Hybrid / WFH Options
VIQU Limited
Architect – Zero Trust – 6 months – Fully Remote – Outside of IR35 My Customer is seeking a highly skilled Architect to lead the design, implementation, andmanagement of a Zero Trust security architecture leveraging Microsoft security technologies . This role is critical to enhancing our security posture and aligning our … infrastructure with modern, identity-centric security principles. Key Responsibilities of the Security Architect … Design and maintain a scalable Zero Trust architecture aligned with industry best practices and organizational objectives. Develop and implement modern IdentityandAccessManagement (IAM) solutions that enforce Zero Trust principles. Deep knowledge of Microsoft security tools (e.g., Microsoft Entra ID, Defender suite, Purview More ❯
CIS, GDPR and others. Lead threat modelling, risk assessments, and security reviews for GCP infrastructure and applications. Define and enforce IdentityandAccessManagement (IAM) policies, including roles, permissions and service accounts. Implement and maintain security monitoring, logging, and alerting tools (e.g., Cloud Logging More ❯
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯
storage in cloud environments. Familiarity with monitoring and logging tools (e.g., Prometheus, Grafana, ELK, CloudWatch). Working knowledge of cloud security principles andidentity/accessmanagement in hybrid environments. Desirable: Certifications such as AWS SysOps/Architect, Azure Administrator, or Red Hat OpenShift … Admin. Background in regulated or high-security environments (e.g. public sector, defence). Experience with ITSM tools (e.g. ServiceNow, Jira Service Management) and ITIL-based processes. Knowledge of backup and recovery tools like Veeam, Commvault, or Azure Backup. You MUST hold Active SC or DV Clearance in order More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and configure … in vulnerability managementand endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identityandaccessmanagement principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or monitoring systems. Provisioning/patching of … software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate More ❯
to make a significant contribution to the overall technical design. You will need experience of network security solutions, cybersecurity, IAM, ITIL and Service Management as well as strong compliance and governance, such as GDPR. Required Skills and Experience: Strong background in IT Security design, ability to look over … business needs. Strong knowledge of the insurance industry Strong background in vulnerability management with strong Tenalbe or Qualys. Strong knowledge of Cybersecurity, IDAM, IAM and overall security frameworks. Strong knowledge if compliance and governance around GDPR/DORA and other industry regulations Strong knowledge of network security with More ❯