Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
supporting systems it will need to integrate with as part of the end-to-end journey. Project Overview: Our client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand … API Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end … governance processes. ? Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation. ? Present publications at technical design authorities for input, feedback, and approval. Risk and Dependency Management: ? Effectively manages and escalates both technical and project risks or issues. ? Articulates solutions and remediation steps to technical risks & issues. ? Ability to map design decisions to resultant technical More ❯
days in the office is mandatory End Date: 30th November (renewal end of Nov) £567 Project Overview: The client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API … Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). The client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead … to-end journey. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud. Broad background across information technology with the ability to communicate clearly with non-security More ❯
Identity & AccessManagement (IDAM) Analyst – Contract Contract Details 6 months initially, with potential extension. £500 to £550 P/d Inside IR35 Full-time, Monday to Friday. Hybrid role (3 Days a week in London Office) We are seeking an experienced Identity & AccessManagement (IDAM) Analyst to join … role will suit a hands-on analyst with strong technical knowledge of IDAMand PAM platforms with a focus on Entra ID, as well as excellent communication and stakeholder management skills. Key Responsibilities Manage user account lifecycle (creation, modification, deletion). Ensure consistency of IDAM processes in line with policies and standards. Administer and support enterprise PAM solutions … Movers-Leavers (JML) processes. Conduct periodic audits of user identities and access. Provide adoption training and liaise with stakeholders regarding process changes. Requirements Significant hands-on experience in an IDAM or Security Analyst role. Solid knowledge of Microsoft Active Directory and Azure AD/Entra ID. Strong background in identitymanagement/provisioning tools (e.g., CyberArk More ❯
IAM Technical Business AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our IdentityandAccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across … an IAM implementation. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of IdentityandAccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring … Directory or Okta. Key Responsibilities: Requirement Elicitation: Gathering and documenting detailed business and technical requirements for IAM projects from various stakeholders. Process Analysis: Analysing current identityandaccessmanagement processes to identify opportunities for improvement and develop new strategies. Solution Design: Contributing to the design and implementation of IAM solutions that enhance security, streamline More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
IdentityAccess Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identityandaccessmanagement (IAM) solutions across a large-scale enterprise environment, as part of our clients strategic migration project. Day-to-day of the role: Lead the architecture … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP IdentityManagement (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture andidentity & accessmanagement to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful … practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & AccessManagementand Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged AccessManagement (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out for a confidential discussion. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
rolling 6 months We are seeking an experienced IAM Technical Analyst to join a leading financial services organisation. This role will be part of a large-scale Cybersecurity andIdentity & AccessManagement (IAM) programme, delivering business-critical solutions across a complex and highly regulated environment. Key Responsibilities Gather requirements across the IAM stack, working … ensuring on-time, high-quality outcomes. Operate as a self-sufficient, proactive team player within a large programme environment. Key Skills & Competencies Deep understanding of IdentityandAccessManagement (IAM), including: Authentication Governance AccessManagement Privileged AccessManagement Strong analysis and requirements-gathering skills in a … technical environment. Process mapping expertise, with proficiency in MS Excel, Visio, and Confluence. Experience delivering within large-scale Cybersecurity and IAM programmes. Excellent stakeholder managementand communication skills, with the ability to engage effectively across global, cross-functional teams. Strong presentation skills, able to clearly communicate progress and delivery roadmaps. Knowledge of financial services and the regulatory environment More ❯
Lead IAM/PAM TesterUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong IAM/PAM Tester who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU … to Project Managers and Test Leads throughout the testing lifecycle In addition to the above responsibilities, the IdAM Test Analyst must have proven experience testing IdentityandAccessManagement (IdAM) systems. This includes the ability to validate: User Authentication: Login/logout flows, password policies, MFA, and account lockout User Authorisation: Correct access … Role Management: Creating, editing, and deleting user roles and their associated permissions Policy Enforcement: Testing correct application of access policies under varied conditions Experience with IdAM tools is required , including (but not limited to): Microsoft Entra CyberArk SailPoint ServiceNow Savyint Candidates will ideally show evidence of the above in their CV in order to be considered.Please More ❯
Job Title: Product Owner - IdentityandAccessManagement (IDAM) Location - London plus travel About the Role: We're seeking a flexible and driven Product Owner to lead the development and transformation of our IdentityandAccessManagement (IDAM) products. This is a pivotal role where you'll collaborate … across departments and levels to shape the future of our enterprise-wide IDAM strategy. You'll be responsible for managing the full product lifecycle-from ideation and development to sustainment and decommissioning-ensuring alignment with strategic goals and user needs. This role requires a confident individual with excellent organisational, communication, and stakeholder engagement skills. Key Responsibilities: Stakeholder Collaboration: Build strong … relationships across the organisation to understand business needs and translate them into product requirements. Product Strategy & Lifecycle Management: Lead the transformation of IDAM products into scalable, sustainable solutions aligned with enterprise strategy. Demand Management: Balance delivery of new capabilities with the maintenance of mission-critical products. Governance & Integration: Submit and advocate for new requirements through the More ❯
strong background in Identity Security Cloud solutions and technical identity recruitment processes. You will play a key role in streamlining our IdentityandAccessManagement (IAM) by leveraging SailPoint's capabilities to ensure least-privilege access , enforce zero trust policies , and support full lifecycle identity governance … and on-prem environments. Implement and optimize least-privilege access policies, automated role management , and real-time access monitoring . Manage and govern access for non-employees , privileged users , and machine identities . Automate onboarding/offboarding processes through identity recruitment workflows . Integrate SailPoint with HR systems, Active Directory … Azure AD, Okta, ServiceNow, and other key platforms. Build and customize access certifications , policy enforcement , and risk-based access controls . Develop and maintain audit-ready compliance reports (GDPR, HIPAA, PCI, CCPA, FISMA, etc.). Work with DevSecOps and Security Engineering to detect and respond to access-related threats. ?? What You Bring: Proven experience More ❯
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised More ❯
PAM Business Systems AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong PAM Systems BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … Vendors. Please only apply if you have delivered a PAM implementation. In full: PAM (Privileged AccessManagement) System Analyst is an IT security professional who analyses, designs, and implements solutions to control, monitor, and secure privileged accounts, which are accounts with elevated access to an organisation's critical systems and data. This role involves … analyse business needs and translate them into technical requirements. Communication: Excellent verbal and written communication skills for interacting with diverse stakeholders. Technical Knowledge: Understanding of identityandaccessmanagement (IAM), security principles, and potentially specific PAM tools (Cyberark, TPAM, BeyondTrust) Project Management: Ability to work on project deliverables and manage requirements through More ❯
IDAM Engineer 12 Month Contract Onsite - London We're supporting a government client in strengthening their IdentityandAccessManagement (IDAM) capabilities and seeking an experienced IDAM Engineer to join the Live Services team. You … ll help maintain and monitor key identity infrastructure, support project delivery, and drive continuous service improvement. Key Responsibilities: Provide 2nd/3rd line support for Active Directory andIDAM solutions. Support privileged accessmanagementand certificate-based authentication. Collaborate with support and project teams to implement changes. Monitor system health, respond to incidents, and … Manager. Excellent communication and stakeholder engagement skills. ITIL or service management qualifications (desirable). If you're a proactive engineer with a passion for secure infrastructure andidentity services, apply now to join a high-performing team. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Project Support Office/Analyst ((Identity & AccessManagement Programme) - Banking Client - London Duration: 12 months Rate: 400 - 600 per day (inside of IR35) Hybrid: 8 days onsite per month, the rest is remote working Locations: London, Paris, Brussels or Amsterdam Role description PSO Analyst - Planning & Budgeting … Identity & AccessManagement Programme) We're looking for a hands-on PSO Analyst to help managing the budgeting and planning side in the IDAM programme, which has a portfolio of 20 projects. You'll work closely with project managers, the central PMO team and other delivery teams across to keep finances on track, support … slides and collect input from several contributors. Meeting minutes and action tracking: Summarise key discussion points, actions and decisions and follow-up with action owners. Quality assurance and controls management: Frequent checkpoints with project managers to maintain a high standard in terms of project life cycle documents, monthly reports and status updates, and steer and support where needed. More ❯
the managementand optimisation of the hybrid cloud infrastructure which supports business-critical services. The successful candidate will demonstrate expert-level proficiency in the design, implementation, andmanagement of Microsoft Azure and Microsoft 365 environments. The role requires a deep understanding of cloud infrastructure, identityandaccessmanagement, automation, and … VMs, Azure Files, Blob Storage, and Azure Backup. Monitoring and Governance: Implementation of Azure Monitor, Log Analytics, and Azure Policy for compliance and performance tracking. IdentityandAccess: Deep knowledge of Microsoft Entra ID (formerly Azure AD), including Conditional Access, RBAC, and Privileged IdentityManagement (PIM). Physical Infrastructure: Experience … Android device lifecycle management. Security & Compliance: Implementation of DLP, sensitivity labels, email authentication (SPF, DKIM, DMARC), and Secure Score optimisation. SharePoint & OneDrive: Administration of collaboration platforms, including migration andaccess control. Automation & Scripting PowerShell: Advanced scripting for automation of administrative tasks across Azure and Microsoft 365 environments. Integration: Experience with Graph API, Logic Apps, and automation runbooks for More ❯
month basis. If you are an experienced IAM professional with a background in the banking/financial services sector then this role is for you. Experience in Identity or AccessManagement Experience in standardising accessmanagement operating models, creating documentation, and onboarding new access models from projects . … of IAM principles such as least privilege, RBAC/ABAC, and Zero Trust. Define IAM requirements and work closely with cross-functional teams to ensure secure and compliant access controls. Transition IAM from projects into BAU IAM models Design and implement solutions for identity lifecycle management, authentication (MFA/SSO), andaccessMore ❯
rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering … the future direction of secrets management within the bank Enabling identity sharing and single sign-on across different organisations or domains. Securing, controlling, and monitoring access to critical systems by privileged users. Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. CISSP/CISM certification SABSA or TOGAF certified preferred If you are interested More ❯
required About the Role We are seeking an experienced Lead DevOps Engineer to take ownership of the development and delivery of a strategic product roadmap for our clients Identity & AccessManagement (IAM) platform (SailPoint), alongside supporting systems that enhance cyber defence capability. This role requires a balance of technical leadership, CI/CD oversight … acting as an Employment Business in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged AccessManagement (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments … decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & Dependency Management Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME across IT … transformation teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & AccessManagement (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design More ❯
London, Finsbury Square, United Kingdom Hybrid / WFH Options
Morson Talent
Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation’s vulnerability management programme across multiple business units, technologies, and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerability management platform. You’ll be expected … Metrics - Power BI ServiceNow dashboards Excel (advanced analysis) Frameworks & Standards - NIST CSF, ISO 27001, OWASP, CE/CE+, GDPR, NIS2, ONR Security Domains/Capabilities - IdentityandAccessManagement (IAM) Network Security Data Protection Cloud Security Controls Application Security Security Monitoring Processes & Practices - Vulnerability Management Programmes Incident Response and Threat Assessment Emergency … Patch Governance Risk-based Prioritisation (CVEs, exploit intelligence, asset criticality, business impact) Audit Support (internal assurance, penetration test follow-ups, external audits) Exception and exemption management Automation of manual tasks Dashboarding for risk and SLA metrics What's on Offer - A leadership role with significant influence across a major UK organisation. Opportunity to work with a forward-thinking More ❯
Hybrid - Manchester & Remote IR35 Status: Inside Start: ASAP Role Overview: We are seeking a Solution Architect for our higher education client with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to be part of the Client's Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into … which aims to deliver stable, secure, and future-ready IT services. This role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across their systems. Essential Skills & Experience required: As the Solutions Architect you will possess a solid technical foundation in IAM with hands-on experience in … organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. IAM-Focused Workstreams Enhance identity provisioning and lifecycle management for the Client's managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Strengthen collaboration between their IT Services and their teaching and learning community More ❯
East Kilbride, Lanarkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
with engineers. Experience architecting and securing solutions within highly sensitive and classified environments, including familiarity with relevant security policies, regulations, and best practices. Experience with identityandaccessmanagement solutions, including privileged accessmanagement, and ability to architect secure authentication and authorisation mechanisms. (Desirable) Experience with software-defined networking, storage More ❯
East Kilbride, South Lanarkshire, Lanarkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
with engineers. Experience architecting and securing solutions within highly sensitive and classified environments, including familiarity with relevant security policies, regulations, and best practices. Experience with identityandaccessmanagement solutions, including privileged accessmanagement, and ability to architect secure authentication and authorisation mechanisms. (Desirable) Experience with software-defined networking, storage More ❯