IAM/PAM design and delivery. Integrate IAM/PAM telemetry into SIEM tooling. Provide technical oversight for MSPs and vendors. Develop and manage Conditional Access, MFA, and RBAC policies. Mentor junior team members and build internal capability. Maintain IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven IAM/PAM implementation experience (e.g. More ❯
knowledge of security tooling such as SIEM, endpoint detection (EDR/XDR), and vulnerability management platforms. o Hands-on experience with policy development, accesscontrol models (RBAC, ABAC), and logging standards. o Experience supporting assurance activities or government-mandated reviews (e.g. GovAssure, Secure by Design). o Ability to interpret CVEs, CVSS scores, and threat intelligence feeds. More ❯
clusters. Automate infrastructure and configuration with Terraform, Ansible, and Helm . Manage CI/CD workflows and application deployment with GitHub and Operators . Implement security best practices (RBAC, network policies, image handling). Collaborate with DevOps and development teams to support containerized workloads. Maintain reliability, monitoring, and logging for platform performance. Required Skills & Experience: Strong hands-on expertise More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid/Remote Options
KBC Technologies UK LTD
Design, architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Salt Search
experience as a Business Analyst, ideally within cybersecurity, IAM, or a regulated IT environment. Strong understanding of Identity and Access Management concepts, including access provisioning/deprovisioning, RBAC, JML processes, ServiceNow integration, and security standards (e.g. SAML, OAuth). Hands-on experience onboarding applications into IAM platforms and implementing process improvements. Strong analytical and problem-solving skills More ❯
Basingstoke, Hampshire, South East, United Kingdom
Experis
knowledge of Identity and Access Management technologies and standards. Proven ability to create and maintain HLDs and LLDs for identity solutions. Experience with rolebasedaccesscontrol , access request processes, and identity governance. Strong understanding of Windows Enterprise technologies , PowerShell scripting, and automation. Awareness of automated testing approaches within secure More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Morson Edge
IAM Solutions Architect-Identity Access Management-Higher Education IAM Solutions Architect with specialist skills in identity access management/identity mastering, access management and application provisioning is needed to support our prestigious Russell Group London University on More ❯
initial – Inside IR35 We are seeking a skilled Windows Engineer with strong hands-on experience across Active Directory environments. This role supports a critical security programme focused on RBAC, privileged access, and secure identity controls. The ideal candidate will be proactive, dependable, and able to work collaboratively with senior SMEs. Role Overview … Title: Windows Security Specialist Location: Fleet, Hampshire 2 days per week onsite (non-negotiable) Contract Type: Contract Duration: 12 months initial Sector: Banking AD Groups PowerShell scripting Building RBAC model, Group Policy, Add Priv. Groups Domain access segregation Creating and managing AD Objects Implementing least privilege Managing Group Policy inheritance and reference Integrating with … tools such as CyberArk Managing Windows Server roles and features (especially AD DS, DNS, and GPO) Configuring secure remote access and privileged accounts Role-basedaccesscontrol (RBAC) and least privilege principles Integrating with Active Directory Managing service accounts and credential rotation policies Troubleshooting authentication and network connectivity issues How to More ❯
Manage CyberArk components including Vault, CPM, PSM, PSMP, CCP, PTA, AIM. Plan and execute major version upgrades and migrations. Automate credential onboarding, rotation, and decommissioning. Develop and maintain Safes, RBAC structures, and master policies aligned to NIST 800-53 and Zero Trust. Build custom connectors for non-standard platforms (e.g., Oracle Cloud). Provide SME-level support and troubleshooting across … Conjur. Maintain documentation and deliver training to internal teams. Required Skills & Experience 10+ years of hands-on experience with CyberArk PAM suite. Strong knowledge of privileged access concepts, RBAC, and compliance frameworks (NIST, ISO 27001). Experience with Linux (RHEL 9), Windows Server, Oracle DB, and cloud platforms. Scripting and automation skills (PowerShell, REST APIs). Proven track record More ❯