and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. * Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. * Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) * Problem-Solving and Analytical Abilities: Strong problem-solving … ensuring the configuration of tools is secure and compliant with Security standards. * Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. * Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. * Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. * Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) * Problem-Solving and Analytical Abilities: Strong problem-solving … ensuring the configuration of tools is secure and compliant with Security standards. * Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. * Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
South West London, London, United Kingdom Hybrid / WFH Options
Syntax Consultancy Limited
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.' This is a great opportunity on a long running programme of work. Apply now for your CV to reach More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle." Experience: "5+ years experience in Hands-on ForgeRock developer experience with PingGateway, PingAM, PingIDM and PingDS working with Agile More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.? PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. · Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). · Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and configure … in vulnerability managementand endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identityandaccessmanagement principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or monitoring systems. Provisioning/patching of … software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate More ❯