London, South East, England, United Kingdom Hybrid / WFH Options
AWD online
mobile devices, and operating systems (Windows/macOS), escalating sophisticated problems when necessary Manage user access and bolster cybersecurity by handling password resets, account updates, and implementing multifactor authentication via Active Directory, Azure AD, and similar systems Install, configure, and maintain hardware and software to keep business operations running smoothly Maintain clear, up-to-date documentation and contribute More ❯
Management (PAM) technologies such as Delinea (preferred), CyberArk, etc. Experience with Identity Governance Tools. Veza preferred. Experienced level of understanding of Identity & Access Management, Single Sign-On, Multi-FactorAuthentication (MFA), and Authentication, Identity Governance & Administration concepts. Experience with using PowerShell scripting and the ability to read code. Experience with Outlook/ More ❯
Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. Single Sign-On (SSO)/Multi-FactorAuthentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players More ❯
Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. Single Sign-On (SSO)/Multi-FactorAuthentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required skills and experience: Any of the major IAM players More ❯
Identity and Access Management service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged Access Management principles knowledge and experience MultiFactorAuthentication principles Information Security principles Windows Server 2003 to 2022 Group Policy Windows PKI DFS Microsoft Clustering Great customer service Good understanding of networks and Domain Structure More ❯
managing guest access for B2B (business-to-business) and B2C (business-to-consumer) scenarios. Develop and manage Conditional Access (CA) policies to enforce granular access controls, including Multi-FactorAuthentication (MFA), based on user, device, and location. Implement and manage Self-Service Password Reset (SSPR) and Password Writeback to ensure seamless and secure user … PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and More ❯
managing guest access for B2B (business-to-business) and B2C (business-to-consumer) scenarios. Develop and manage Conditional Access (CA) policies to enforce granular access controls, including Multi-FactorAuthentication (MFA), based on user, device, and location. Implement and manage Self-Service Password Reset (SSPR) and Password Writeback to ensure seamless and secure user … least privilege. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong More ❯
managing guest access for B2B (business-to-business) and B2C (business-to-consumer) scenarios. Develop and manage Conditional Access (CA) policies to enforce granular access controls, including Multi-FactorAuthentication (MFA), based on user, device, and location. Implement and manage Self-Service Password Reset (SSPR) and Password Writeback to ensure seamless and secure user … least privilege. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong More ❯
detection, response, and resiliency. Identity & Access Management Own enterprise-wide IAM strategy, including workforce and customer identity, privileged access management (PAM), identity governance and administration (IGA), and multi-factorauthentication (MFA). Lead initiatives to modernize and integrate IAM platforms to support cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and More ❯
AD), Azure RBAC, Privileged Identity Management (PIM), managed identities, service principals, and Azure AD Connect for hybrid scenarios. Experience managing user provisioning/deprovisioning, conditional access policies, multi-factorauthentication, Azure AD Application Proxy, federated authentication, SAML/OAuth integration, and implementing least-privilege access controls across Azure subscriptions and resources. Container More ❯
identifying limitations, and resolving system inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity Threat Detection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse … and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active Directory, Entra ID, Okta, SailPoint, and CyberArk. Configure Single Sign-On (SSO), Multi-FactorAuthentication (MFA), and Conditional Access Policies for OT integration with existing IT tooling. Define and enforce Role-Based Access Control (RBAC) and least privilege principles More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TalentHawk
identifying limitations, and resolving system inconsistencies. Facilitate smooth transitions across IT and OT environments, including hypercare and process adaptations. Investigate and resolve IAM security incidents, access anomalies, and authentication issues. Review and monitor Identity Threat Detection & Response (ITDR) systems. Collaborate with SOC teams to detect privileged account misuse … and insider threats. Identity & Access Management (IAM): Design, implement, and maintain IAM solutions leveraging Active Directory, Entra ID, Okta, SailPoint, and CyberArk. Configure Single Sign-On (SSO), Multi-FactorAuthentication (MFA), and Conditional Access Policies for OT integration with existing IT tooling. Define and enforce Role-Based Access Control (RBAC) and least privilege principles More ❯
and group memberships based on job function. Provision access to Microsoft 365, SharePoint, Teams, and line-of-business apps. Configure Conditional Access Policies for secure login. Enforce Multi-FactorAuthentication (MFA) and device compliance. Enable self-service password to reset and onboarding guides. Trigger access review workflows via Azure AD or IAM tools. Reassign More ❯
Southampton, Hampshire, South East, United Kingdom
Baltic Apprenticeships
Technician qualification, delivered by our expert training team at Baltic Apprenticeships. A Typical Day in the Job: Onsite support, email, ticketing system, call. Involved in MultiFactorauthentication, password resets, occasional group policies. Network diagrams, tech specs, interpret with line manager. Hardware to install and configure includes desktop, laptops, printers, interactive whiteboards. Will be More ❯
POS systems, and integrated third-party services. Cyber Security & Compliance Support the implementation and monitoring of cyber security best practices across the business. Administer security tools, including , multi-factorauthentication (MFA), mail filtering and Anti-Virus software . Participate in vulnerability management, incident response coordination, and system security reviews. Help maintain system documentation, asset More ❯
admin center (users, groups, and licenses). · Create, modify, and deactivate user accounts. · Assign and manage licenses (Exchange, Teams, OneDrive, SharePoint, etc.). · Configure and enforce MFA (Multi-FactorAuthentication). · Manage security groups, mailbox permissions, and access levels. · Block/disable users when required and monitor login activity. · Manage Teams and SharePoint permissions. More ❯
admin center (users, groups, and licenses). · Create, modify, and deactivate user accounts. · Assign and manage licenses (Exchange, Teams, OneDrive, SharePoint, etc.). · Configure and enforce MFA (Multi-FactorAuthentication). · Manage security groups, mailbox permissions, and access levels. · Block/disable users when required and monitor login activity. · Manage Teams and SharePoint permissions. More ❯
Windows Server and Related Server Roles (IIS/RDS/DFS/NPS) Microsoft Azure Active Directory and InTune Microsoft Azure IaaS Technologies Microsoft Azure Virtual Desktop Multi-FactorAuthentication and Conditional Access Setup and Configuration for Office 365 and Related Technologies Backup Technologies (Veeam and Datto) Firewall Technologies (Sophos UTM/XG, Sonicwall More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Netteam tX Ltd
Windows Server and Related Server Roles (IIS/RDS/DFS/NPS) Microsoft Azure Active Directory and InTune Microsoft Azure IaaS Technologies Microsoft Azure Virtual Desktop Multi-FactorAuthentication and Conditional Access Setup and Configuration for Office 365 and Related Technologies Backup Technologies (Veeam and Datto) Firewall Technologies (Sophos UTM/XG, Sonicwall More ❯
Teams, Exchange Online, and OneDrive. Manage and respond to compromised account incidents, including investigation and remediation. Support the implementation and management of Azure Conditional Access Policies and Multi-FactorAuthentication (MFA). Collaborate with the networking team to resolve issues related to firewalls, routing, and general network connectivity in a cloud/hybrid setup. More ❯
Teams, Exchange Online, and OneDrive. Manage and respond to compromised account incidents, including investigation and remediation. Support the implementation and management of Azure Conditional Access Policies and Multi-FactorAuthentication (MFA). Collaborate with the networking team to resolve issues related to firewalls, routing, and general network connectivity in a cloud/hybrid setup. More ❯
Wimbledon, London, England, United Kingdom Hybrid / WFH Options
Xact Placements Limited
Teams, Exchange Online, and OneDrive. Manage and respond to compromised account incidents , including investigation and remediation. Support the implementation and management of Azure Conditional Access Policies and Multi-FactorAuthentication (MFA) . Collaborate with the networking team to resolve issues related to firewalls, routing, and general network connectivity in a cloud/hybrid setup. More ❯
analyse access-related risks and respond effectively during security incidents Experience in developing and enforcing governance, risk, and compliance (GRC) frameworks Nice to Have Skills: Familiarity with multi-factorauthentication (MFA), role-based access control (RBAC), and orphan account mitigation Knowledge of cybersecurity audits, regulatory regimes, and compliance assessments Certifications such as CISSP, CISM More ❯