cheltenham, south west england, united kingdom Hybrid / WFH Options
IMT Resourcing Solutions
and technology group, is seeking an Identity & AccessManagement (IDAM) Specialist to take ownership of the organisation's identity, authentication andaccess control systems. This is a key position within the global IT function — ensuring secure, compliant, and efficient access to critical systems and information across the business. … The Role As the IDAM Specialist, you'll be responsible for the management, optimisation and continuous improvement of identityandaccessmanagement systems across a global infrastructure. You'll support the organisation's digital security objectives by delivering reliable authentication, enforcing access control policies, and enhancing compliance across cloud and … entitlement reviews across cloud and on-premise environments. Maintain accurate and auditable documentation of configurations, policies and processes. Provide end-user support for access requests, password issues andIDAM-related incidents. Collaborate with Infrastructure, Cloud and Cybersecurity teams to ensure cohesive identity governance. Stay current with emerging technologies and best practice, recommending improvements to strengthen security More ❯
Identity & AccessManagement Engineer - IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune Our global law firm client are actively looking to take on a new Identity & AccessManagement Engineer (IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune) to join their team on a permanent … staff members in the troubleshooting, diagnosis, and resolution of incidents. Occasionally provides technical support to end users. Must have excellent troubleshooting and customer service skills. Appropriately inform and advise management on incidents and incident prevention. Participate in knowledge sharing with other engineers and develop solutions efficiently. Technology/Software expertise: Proven experience in Active Directory management … Governance Tools. Veza preferred. Experienced level of understanding of Identity & AccessManagement, Single Sign-On, Multi-Factor Authentication (MFA), and Authentication, Identity Governance & Administration concepts. Experience with using PowerShell scripting and the ability to read code. Experience with Outlook/Exchange and an understanding of mail routing. Experience with Windows More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
consultants related programmes. Principal Preferred Requirements Cybersecurity Expertise: • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud • Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. • Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. • Privileged AccessManagement (PAM): Securing, controlling, and … governance processes • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation • Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: • Effectively manages and escalates both technical and project risks or issues • Articulates solutions and remediation steps to technical risks & issues • Ability to map design decisions to resultant technical More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API Security is done across the bank. Client is working on uplifting controls … and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Provides technical thought leadership to the Design Team More ❯
The Opportunity: The Fisher Investments Europe IdentityandAccessManagement Associate provides operational support to Fisher Investments IdentityandAccessManagement team through the processing of staffing events, request fulfilment and the setup of organisational data in the team's toolset. You will be supporting the entire Fisher … Investments organisation through the completion of these activities. You will be reporting to the IdentityandAccessManagement Team Leader. The Day-to-Day: Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Overseeing assigned operational tasks to completion Identifying, creating and developing documentation for group Supporting the More ❯
Basingstoke, Hampshire, South East, United Kingdom
Middle Recruitment Limited
days in office per week) middle is partnered exclusively with a leading global company to recruit an IAM Analyst Service Delivery, joining their global IdentityandAccessManagement (IAM) team within Technology Operations. This is a pivotal role acting as the bridge between engineering, delivery, projects, and vendors, ensuring the effective global operation of … team that values communication, transparency, and continuous improvement, with direct exposure to the companys wider global technology leadership. Ideal Skills and Background Strong understanding of IdentityandAccessManagement (IAM) concepts and service delivery Background in IT Project Management, Service Delivery Management, or Technical Operations Experience coordinating vendors, service providers … providing equal employment opportunities regardless of ethnic origin, gender, nationality, religion, physical ability, sexual orientation, marital status, parental status, or medical history. Keywords: IAM Analyst, IdentityandAccessManagement Analyst, Service Delivery Manager, IT Project Manager, Technical Delivery Analyst, AccessManagement Analyst, IT Operations Manager, IAM Engineer More ❯
IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of application. Accenture … live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
and Public Services. Consolidated revenues as of $13+ billion. ForgeRock Architect Key Responsibilities: Architect and implement ForgeRock Access Manager (AM) solutions for secure authentication, authorization, and session management across banking applications. Design and integrate SSO, MFA, adaptive authentication, and federation for applications using ForgeRock AM. Collaborate with application, infrastructure, and security teams to embed access controls into core banking platforms. Define and enforce accessmanagement policies aligned with regulatory standards (e.g., GDPR, PCI-DSS, SOX). Lead integration efforts with identity providers (IdPs), service providers (SPs), and third-party systems using SAML, OAuth2, OpenID Connect. Conduct security assessments, threat modeling, and performance tuning of ForgeRock AM components. … to IAM engineers and developers. Support critical incident response, troubleshooting, and root cause analysis for IAM-related issues. Support audit and compliance activities with documentation and evidence of access controls. Stay updated on ForgeRock product roadmap and emerging IAM trends in the banking sector. Enable and advise customer on IAM and automation opportunities and drive thought leadership conversations More ❯
Oakley, Hampshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Bilston, West Midlands, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Oakley, Hampshire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
Bilston, West Midlands, United Kingdom Hybrid / WFH Options
Sky
products, content and services millions of people love. And we do it all right here at Sky. As a key member of the Enterprise Technology IdentityandAccessManagement team, you will help set the direction of Sky's IdentityandAccessManagement (IAM) roadmap and strategy as … we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication andaccessmanagement specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders. What You'll Do Design, develop, and implement IAM solutions using One Identity … standards e.g., IS027001, NIST and CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls andIdentity Lifecycle management. Have excellent communication and organisational skills. Team overview Cyber Security Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber More ❯
in providing assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, IdentityandAccessManagement, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Managementand Vulnerability … and Patch Management Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback SKILLS AND EXPERIENCE Functional/Technical Competencies Essential: Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks … Ability to maintain a working knowledge of cybersecurity principles and elements Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Education/Qualifications: Essential Degree educated and/or equivalent experience.Preferred: Relevant certifications (e.g. CISA, CRISC, CISM, CISSP .) PERSONAL REQUIREMENTS Personal alignment to MUFG Values + More ❯
Position Available: Security & IdentityManagement Lead Location: London (Hybrid, 2 days a week in office) Salary: £80,000 - £100,000 (DoE) + Bonus Experience needed: We're looking for an experienced security andidentity professional with strong expertise in IdentityandAccessManagement, cloud security, and operational leadership. You'll combine hands-on technical skills with … manage the Global Technology Operations security roadmap Develop and implement an enterprise-wide IAM framework Collaborate with the CISO function to mitigate risks and vulnerabilities Lead responses to identity or access-related incidents Develop, enforce, and maintain IAM policies and procedures Translate security risks into clear, actionable operational tasks What we need from you: 4+ years More ❯
you will help organizations secure and streamline the entire identity lifecycle. You'll design and implement solutions using leading IAM platforms to deliver seamless authentication, authorization, andidentity governance. By leveraging protocols such as SAML, OAuth, and OpenID Connect, alongside automation and scripting expertise, you will ensure effective provisioning, migration, and governance of identities across cloud … Integrate authentication and authorization solutions such as SSO, MFA, RBAC, and IGA platforms. Apply protocols and standards (e.g., SAML, OAuth, OpenID Connect, LDAP) to strengthen identityandaccess security. Develop and maintain automation scripts (e.g., PowerShell, Python, Java) to streamline IAM processes and migrations. Advise on IAM-related compliance and governance requirements using frameworks such as … to hold or gain a UK government security clearance. Preferred Technical And Professional Experience Relevant professional certifications, such as: AWS Certified Security – Specialty Microsoft Certified: IdentityandAccess Administrator Associate Okta, Ping Identity, SailPoint, CyberArk, or Saviynt certifications Experience with Identity Governance Administration (IGA) platforms. Familiarity with automation/orchestration tools (e.g. More ❯
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯