or London or Bristol (Hybrid), UK Job Type: Contract (Inside IR35) Exp level: 15+ yrs over all experience Job Description : Administer user accounts andaccess privileges in the organization’s identitymanagement system. Responsible for the day-to-day administration of the IAM system. … to identify potential risks. Provide training to new users on the IAM system. Managing user accounts and permissions in the identityandaccessmanagement system. Granting or denying access to company resources based on user role and privileges. Creating and managing user … groups in the identityandaccessmanagement system. Enforcing company policies and procedures related to identityandaccess management. Monitoring user activity in the identityandaccessmanagement system. Reporting on identityMore ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management … remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active … with internal teams (IT, security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication More ❯
Skills: Okta, CIAM Description : We are seeking an experienced Okta/Auth0 Architect to lead the migration of legacy Customer IdentityandAccessManagement (CIAM) system for partners to a modern, cloud-based solution using Okta Auth0 . The ideal candidate will be responsible … Should be able to provide technical leadership for a small team in onsite and offshore model Previous experience working with partner ecosystems and designing identity solutions for external users (B2B/B2B2C). Good Experience with user data migration and synchronization between legacy and new systems. Lead the … implementing, and migrating Okta and/or Auth0 identitymanagement systems. Strong understanding of CIAM (Customer IdentityandAccessManagement) , with a focus on partner management (B2B/B2B2C). Expertise in SSO, MFA, OAuth 2.0, OpenID Connect More ❯
Skills: Okta, CIAM Description : We are seeking an experienced Okta/Auth0 Architect to lead the migration of legacy Customer IdentityandAccessManagement (CIAM) system for partners to a modern, cloud-based solution using Okta Auth0 . The ideal candidate will be responsible … Should be able to provide technical leadership for a small team in onsite and offshore model Previous experience working with partner ecosystems and designing identity solutions for external users (B2B/B2B2C). Good Experience with user data migration and synchronization between legacy and new systems. Lead the … implementing, and migrating Okta and/or Auth0 identitymanagement systems. Strong understanding of CIAM (Customer IdentityandAccessManagement) , with a focus on partner management (B2B/B2B2C). Expertise in SSO, MFA, OAuth 2.0, OpenID Connect More ❯
Wokingham, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Wokingham, UK (Hybrid) Number of hours: Standard Ready to utilize your skills & experience in Joiner-Mover-Leaver (JML) process andIdentityandAccessManagement (IDAM)? Join us as a IDAM Solutions Architect. Careers at TCS: It means more TCS is a purpose-led transformation … be responsible for analyzing and enhancing existing JML processes to improve overall efficiency and effectiveness. Key responsibilities: Provide subject matter expertise in JML processes andIDAM, promoting and maintaining industry best practices. Analyze and evaluate current JML processes, identifying areas for optimization. Lead business requirements sessions with key stakeholders across … address process gaps. Excellent written and verbal communication skills, with the ability to convey complex information clearly and concisely. Proven leadership, communication, and project management skills. Bachelor’s or Master’s degree in computer science, Information Technology, Business Administration, or related field. Relevant certifications such as Certified Business More ❯
Wokingham, UK (Hybrid) Number of hours: Standard Ready to utilize your skills & experience in Joiner-Mover-Leaver (JML) process andIdentityandAccessManagement (IDAM)? Join us as a IDAM Solutions Architect. Careers at TCS: It means more TCS is a purpose-led transformation … be responsible for analyzing and enhancing existing JML processes to improve overall efficiency and effectiveness. Key responsibilities: Provide subject matter expertise in JML processes andIDAM, promoting and maintaining industry best practices. Analyze and evaluate current JML processes, identifying areas for optimization. Lead business requirements sessions with key stakeholders across … address process gaps. Excellent written and verbal communication skills, with the ability to convey complex information clearly and concisely. Proven leadership, communication, and project management skills. Bachelor’s or Master’s degree in computer science, Information Technology, Business Administration, or related field. Relevant certifications such as Certified Business More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations … both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end … of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. We're the UK's largest water and wastewater More ❯
IdentityandAccessManagement (IAM) & Security Expert We are looking for a hard-working candidate who can design and deliver excellent IAM solutions to a range of major private & public sector clients. You should be able to follow set procedures and be able to More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, andmanagement using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of … IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
CD Recruitment
key role in scaling and supporting global IT operations across EMEA. This is a hands-on role focused on infrastructure, identityandaccess, automation, and creating world-class internal systems. You’ll partner with product, security, and commercial teams while supporting a growing remote-first workforce … and London office. Key Responsibilities: Own identityandaccessmanagement systems, including configuration and ongoing support of Okta, SSO, and IAM policies Identify and implement automation across user lifecycle management, SaaS provisioning, and IT workflows Provide IT support coverage during EMEA hours … re Looking For: 3+ years in a support, systems engineer, or IT manager role at a software vendor Experience with identityandaccess tools such as Okta and SSO Strong knowledge of AWS environments Proficiency in macOS and MDM tools (e.g., Kandji, JAMF) Ability to write More ❯
in Agile teams, public sector (GDS), dealing with stakeholders across technical teams, business change teams and end users. Experience in IdentityandAccessmanagement is desirable. Roles and Responsibilities Elicit and define business requirements with stakeholders, Working with the developers, produce well-crafted user … ensure alignment with stakeholder expectations, Research, gather requirements, analysis, process design, user story creation for topics such as: Customer experience/user journey Identity lifecycle (joiner, mover, leaver) Lifecycle automation – HR driven data integration Contractor registration Accessmanagement processes (request, approve, review, revoke) Service More ❯
in Agile teams, public sector (GDS), dealing with stakeholders across technical teams, business change teams and end users. Experience in IdentityandAccessmanagement is desirable. Roles and Responsibilities Elicit and define business requirements with stakeholders, Working with the developers, produce well-crafted user … ensure alignment with stakeholder expectations, Research, gather requirements, analysis, process design, user story creation for topics such as: Customer experience/user journey Identity lifecycle (joiner, mover, leaver) Lifecycle automation – HR driven data integration Contractor registration Accessmanagement processes (request, approve, review, revoke) Service More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation andaccess control • IdentityandAccessManagement (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic … techniques and implementations • IT asset managementand tracking • Vulnerability Managementand Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This More ❯
to modern cloud-based integration solutions. Collaborate with stakeholders to gather requirements and deliver high-quality, scalable solutions. Promote best practices in data management, integration testing, and change management. Support Identity & AccessManagement systems and provide MDM (Master Data Management … technical users. Ability to prioritise tasks, meet deadlines, and work independently or in a team environment. Desirable: Knowledge of BizTalk , Azure DevOps , API Management , JavaScript , HTML , or ASP.NET . Familiarity with systems such as SITS, Unit4, Dynamics CRM, Blackboard/Canvas, CMIS, or Sitecore. Experience working in large More ❯
to modern cloud-based integration solutions. Collaborate with stakeholders to gather requirements and deliver high-quality, scalable solutions. Promote best practices in data management, integration testing, and change management. Support Identity & AccessManagement systems and provide MDM (Master Data Management … technical users. Ability to prioritise tasks, meet deadlines, and work independently or in a team environment. Desirable: Knowledge of BizTalk , Azure DevOps , API Management , JavaScript , HTML , or ASP.NET . Familiarity with systems such as SITS, Unit4, Dynamics CRM, Blackboard/Canvas, CMIS, or Sitecore. Experience working in large More ❯
will be at the forefront of protecting critical IT infrastructure and data. This role involves leading a team responsible for managing security operations, identity services, and Microsoft 365 environments. You will play a vital role in the University's cyber defence strategy, working closely with IT colleagues and … a key player in shaping the University's cybersecurity strategy. Collaborate with talented engineers and security experts in a forward-thinking academic environment. Access ongoing professional development opportunities and cutting-edge security tools. … Responsibilities: Lead and manage security operations, including threat detection, incident response, and vulnerability management. Act as a technical manager for identityandaccessmanagement services, ensuring secure, automated access for university staff and students. Design and implement long-term security strategies, focusing More ❯
for containerized workloads Oversee Azure VMware Solution (AVS) environments, ensuring seamless integration with existing infrastructure Implement security best practices, including identityandaccessmanagement (IAM), encryption, and network security groups Monitor compliance with industry standards (e.g., ISO, SOC, NIST) and regulatory requirements Continuously evaluate More ❯
IAM Engineer Location: Remote, UK Type: Contract Start Date: ASAP About the Role: Our client is currently delivering a major IdentityandAccessManagement transformation and is seeking a skilled IAM Engineer to join the team. This role will focus on the hands-on … Key Responsibilities: Build, configure, and integrate IAM tools and platforms in a complex enterprise environment Implement IAM capabilities including provisioning, SSO, MFA, RBAC, andaccess reviews Develop custom scripts, APIs, and connectors to enable integrations with internal systems and third-party platforms Ensure IAM solutions are secure, scalable … Skills and Experience: Hands-on experience in IAM engineering and implementation in enterprise environments Proficient with tools such as SailPoint, ForgeRock, Okta, Ping Identity, CyberArk, or similar Solid understanding of identity protocols (SAML, OAuth, OpenID Connect, LDAP) Strong scripting/coding skills in PowerShell, Python, Java More ❯
Databricks and Data Warehouse solutions (must have). Expertise in integration architecture and design patterns. Protocols and formats SOA, Rest, JSON, XML, etc. IdentityandAccess management. Cloud to Cloud integration & Cloud to On Premise integration. Front End and Back End integrations, network and infrastructure managementMore ❯