South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
Identity & AccessManagement Engineer London, UK £800/day Hybrid (1 Day Office, 4 WFH) Contract (612 Months) Were hiring an Identity & AccessManagement Engineer to support a public sector cyber security uplift programme. The successful contractor will … lead on the separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal … Active Directory: Tier-0 structure, Group Policy, OU segmentation. AADC: Hybrid sync troubleshooting, filtering, and role scoping. Zero Trust & PAW: Secure workstation policies andaccess controls. Contract Details: Start Date: 2nd June Contract Length: 612 Months Clearance Required: Active SC If this Identity & AccessMore ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Morson Talent
Our client SPEN are currently recruiting for an Identity & AccessManagement analyst to joint the team based in Glasgow City Centre. Candidate must have expeirence with either Sailpoint or Cyberark. It would be a contract role … for 12 months initially and a hybrid role. The SPEN Cyber Security team is responsible for the development of the IdentityandAccessManagement service, which is utilised to provision, monitor and maintain core user identities and corresponding entitlements across SPEN systems. This role … will help to support the current ongoing Identity & AccessManagement projects; the focus being working with project teams to complete technical onboarding ,testing and production deployment. Ongoing projects include both CyberArk and SailPoint with the role requiring engineering experience in either one however preferably More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity … s a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity … backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk managementMore ❯
A financial markets firm are building a new authentication andaccessmanagement capability and have an opportunity for an experienced Linux engineer with a strong security lens to build out foundational elements of the platform. This is full lifecycle design, build, implement activity, for someone with … a strong understanding of secure Linux builds, identity/accessmanagement for on-prem and cloud-based systems, and be able to solution based on a strong understanding of HashiCorp Vault, industry standard secure authentication protocols, containerised and automated infrastructure … as-code architectures, and DevSecOps methodologies 15+ years systems or security engineering experience in Linux-based environment Deep understanding of identityandaccessmanagement, and authentication Strong understanding of HashiCorp vault (ideally implementation from scratch) Strong understanding of secure authentication protocols (Kerberos, LDAP) Excellent More ❯
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.' This is a great opportunity on a long running programme of work. Apply now for your CV to reach More ❯
Directory (AD) Architect - MUST BE DV CLEARED Are you an experienced Active Directory Architect with a passion for designing and delivering cutting-edge identity solutions ? Do you thrive in agile environments , working with multi-skilled teams to create secure and scalable Active Directory architectures ? If so, this is … adapting solutions to evolving user and security needs. Collaborate with Solution Owners and delivery teams to design and optimise enterprise identityandaccess solutions . Produce and maintain design documentation , ensuring compliance with security and regulatory standards. Implement automation using PowerShell scripting to streamline AD managementand testing . What We're Looking For: Extensive experience in IdentityandAccessManagement technologies. Deep knowledge of MS Windows Enterprise architectures and AD environments. Strong PowerShell scripting and automation skills for managing enterprise AD solutions. Experience with agile delivery methodologies More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting … regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports … the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction More ❯
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. · Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). · Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
for a long term remote contract ForgeRock Architect - £550/day inside IR35 Remote 6months + contract Requirements: Extensive experience in SSO integration, Identity & AccessManagement (IAM), and ForgeRock AM & DS. The ideal candidate will lead IAM technical integrations, provide architectural guidance, and drive More ❯
Senior Software Engineer - Client Identity We are seeking a Senior Software Engineer to join a newly formed cybersecurity team based in Europe. This role is pivotal in shaping secure and seamless digital experiences for hundreds of thousands of clients across the UK and Europe. As part of the … ES&F) organization, you will be at the forefront of protecting clients from cyber threats while building and evolving critical identityandaccessmanagement services. Key Responsibilities Design, develop, and enhance modern cloud-native cybersecurity services, spanning database to content delivery networks (CDNs). … Implement secure authentication mechanisms such as Multi-Factor Authentication (MFA) and Passkeys. Integrate with identity providers including Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and mitigate account takeover attempts. Improve the resilience, scalability, and efficiency of cloud-based identity services. Drive More ❯
Outside IR35 Contract Duration: 6 Months Key Responsibilities: Oversee Azure Kubernetes Service (AKS) deployments, ensuring high availability, security, and scalability. Manage Microsoft 365 identityandaccess solutions, including Azure AD B2C and Single Sign-On (SSO) configurations. Administer secure remote access technologies and enforce … web security, DDoS protection, and performance enhancement. Lead incident response, conduct forensic investigations, and implement preventive measures. Manage Dataverse solutions, including data modelling, access permissions, and security policies. Required Skills: Strong knowledge of Azure AKS and DevOps practices. Proficiency in Microsoft 365 security andidentityaccessMore ❯
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯
or environment setup for demonstrations. The ideal candidate will possess practical experience in deploying, managing, and scaling AWS WorkSpaces to provide secure and efficient remote access solutions. Familiarity with optimizing WorkSpaces specifically for developer workflows, including the integration of necessary tools and environments, is highly desirable. Key Responsibilities … to software developers. Strong understanding of networking concepts relevant to AWS WorkSpaces (eg, VPCs, subnets, security groups). Knowledge of identityandaccessmanagement, including integration with Active Directory and AWS Directory Service. Desirable Skills Experience in scaling AWS WorkSpaces deployments to accommodate growing … user bases or fluctuating demands. Proficiency in automating WorkSpaces deployment andmanagement using tools such as AWS CloudFormation, Terraform, or Scripting languages. Experience with other AWS End User Computing services, such as Amazon AppStream 2.0. Familiarity with operating systems supported by AWS WorkSpaces (Windows, Amazon Linux, Ubuntu). More ❯
storage in cloud environments. Familiarity with monitoring and logging tools (e.g., Prometheus, Grafana, ELK, CloudWatch). Working knowledge of cloud security principles andidentity/accessmanagement in hybrid environments. Desirable: Certifications such as AWS SysOps/Architect, Azure Administrator, or Red Hat OpenShift … Admin. Background in regulated or high-security environments (e.g. public sector, defence). Experience with ITSM tools (e.g. ServiceNow, Jira Service Management) and ITIL-based processes. Knowledge of backup and recovery tools like Veeam, Commvault, or Azure Backup. You MUST hold Active SC or DV Clearance in order More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and configure … in vulnerability managementand endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identityandaccessmanagement principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or monitoring systems. Provisioning/patching of … software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate More ❯