Working in our AccessManagement team, the Engineer will play a major role in our successful AccessManagement function across the organisation. The successful candidate will be instrumental in driving improvements to improve control and reduce risk. This key role will encompass being a subject matter … expert across both the AccessManagement Team and the Society. We are happy to consider flexible working approaches to help you perform at your best. At Nationwide we offer hybrid working wherever possible. More rewarding relationships are supported through our hybrid approach, bringing colleagues together across our UK … you are engaging with in this role. Experience of Information Security, and a solid IT background. Excellent presentation and documentation skills. Knowledge of CyberArk PAM capabilities including Hybrid Environments (On-Prem, AWS, Azure). Our customer first behaviours put customers and members at the heart of how we work together. More ❯
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
based in Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privilegedaccessmanagement, identity access governance, and incident response across my client’s banking arm and securities business under a dual-hat … arrangement. Role Responsibilities: Lead and oversee PrivilegedAccessManagement (CyberArk) and Identity AccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access control enhancements, ensuring least privilege principles … Experience in cyber security operations, identity accessmanagement, and privilegedaccess management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations). Proficiency in SQL, PowerShell, and automation scripting for security operations. Experience More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security … AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. Networking More ❯
Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or … management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and PrivilegedAccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security … AccessManagement (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and PrivilegedAccessManagement (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM, endpoint security, and vulnerability management tools. • Networking More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
KPMG UK
Identity & AccessManagement - Senior Analyst – KPMG Curve Base Location: Leeds based (Hybrid – 3 days per week in office) Experienced professional (kpmgcareers.co.uk) As a result of the work that we do, we require applicants to hold or be capable of obtaining UK National Security Vetting, the requirements for which … knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from: Enterprise identity, including provisioning, JML, certification, RBAC, entitlement management, policy management, data access governance, identity analytics; Customer IAM (CIAM), including registration, customer experience, authentication, multi-channel, privacy; Accessmanagement, including advanced authentication, identity federation, advanced authorisation. Privilegedaccessmanagement, including credential management, session management, privileged account discovery and privileged account inventory management, Proven track record of delivering high quality outputs, on time and meeting/exceeding expectations. Project managementMore ❯
own path, with support all the way. A diverse set of minds that work cross-functionally and broadly together. Introduction to role Identity and AccessManagement are among the most critical aspects of any modern cyber security program. Threat actors increasingly leverage identity-based attacks for intrusion and … lead the strategy and capability roadmap for core IAM focus areas: Authentication and Federation AccessManagementPrivilegedAccessManagement (PAM) Identity Governance and Administration (IGA) Identity Threat Detection & Response IAM Policies, Standards, and Lifecycle Management Development & Execution: Define multiyear IAM capability roadmaps aligned with … a leadership role focusing on identity and access management. Deep knowledge across the IAM landscape including authentication protocols (OAuth2, SAML, etc.), IGA tools, PAM solutions, and identity-centric threat management. Experience in defining and delivering strategic roadmaps for IAM capabilities. Expertise in cloud platform capabilities, including modern authentication protocols More ❯
have an outstanding opportunity for a driven professional to join our Cyber Security team at Virgin Atlantic Ltd. You will support and challenge existing access and privilegedaccessmanagement across Technology and the business. You will provide knowledge and input into process improvement for the Identity … and AccessManagement function. Maintain, review, and monitor access to applications, systems, and privileges within Virgin Atlantic, Holidays, and Cargo systems. Ensure compliance with relevant legislation, regulations, and business policies. Responsible for process automation where applicable and managing the technologies required to strengthen the accessmanagement … of working within or with Information Security and experience of various governance concepts, tools, processes, and methodologies used in Access Management. (e.g., RBAC, PAM, least-privilege, MFA etc.) Experience of working with business users, able to translate business requirements and Technology requirements into working practices/processes. Good knowledge More ❯
Identity and AccessManagement Senior Manager page is loaded Identity and AccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to … apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: Identity and AccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the … many other memberships and perks designed to enhance the workplace experience, your health, and wellbeing. The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA's IDAM capabilities, initially focusing on AVEVA before expanding to include RIB and ETAP as part More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Lorien
Identity & AccessManagement (IAM) Manager Location: Hybrid/London Salary: Up to £80k + Discretionary Bonus + Additional corporate benefits package The Client: A leading global consultancy firm requires an IAM Manager About the Role: We are seeking a highly skilled Identity & AccessManagement (IAM) Manager … delivery. Technical Expertise & Skills Required: Strong subject matter expertise across IAM domains, including Identity Governance Administration (IGA) and PrivilegedAccessManagement (PAM). Experience defining and embedding IAM controls in regulated environments. Knowledge of leading IAM solutions such as SailPoint, CyberArk, and others. Understanding of disruptive trends … delivery and business development activities effectively. Desirable Experience: Proven background in corporate, utilities, or financial sectors. Hands-on expertise in enterprise identity, customer IAM, accessmanagement, and privilegedaccess management. Strong knowledge of JML processes, RBAC, entitlement management, multi-factor authentication, and policy enforcement. Awareness More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with precision, and inspire teams … and deliver even bigger. Acting as a subject matter expert in CyberArk Leading strategic transformations in: Identity Governance PrivilegedAccessManagement (PAM) AccessManagement Customer Identity and AccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently … people with: deep expertise and a successful track record in IAM strategy, delivery, or assurance with CyberArk Hold relevant certifications such as CDE in Privileged Cloud or Guardian Have experience in a client-facing role (preferred, but not essential) Thrive in a hybrid working environment and are available to More ❯
The team you'll be working with: We are currently recruiting for IDAM & PAM Engineers of various grades to join our growing client advisory & delivery business. NTT DATA is one of the world's largest Global Security services providers with over 7500 Security SMEs and Integration partner to many of … competence and industry standards, frameworks and good practices to review, enable, validate or define client IDAM outcomes. Identify: Client needs and drivers for IDAM & PAM technology adoption. Technical Security requirements, functional & non-functional. Gaps, issues and failings in client Security designs and configurations. Define: IDAM & PAM designs (High Level & Low … Level). User Profiles, Use Cases & IDAM/PAM processes. Work with other teams to agree Implementation plans and effort. Appropriate metrics, and processes to achieve client objectives and targets. Enact: The setup of test, development and production IDAM & PAM environments. IDAM & PAM technology implementation & configurations. Robust practices for the More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Description The Identity & AccessManagement (IAM) team, sitting within the Cyber Security function, ensures that access for all Motability Operations (MO) employees and customers is correct, appropriate, and secure. Within the IAM function: The IDaaS team is responsible for customer identities, SSO, and MFA. The IGA team … manages internal employee accessmanagement and governance. This role leads the IGA team and reports into the Cyber Security Technical Manager. As IGA Team Lead, you will manage the identity governance function, ensuring robust access governance, compliance, and security policies across the organisation. You will work closely … and key business stakeholders. Knowledge of industry frameworks such as ISO 27001, NIST, or other security governance models. PrivilegedAccessManagement (PAM) experience. Benefits Motability Operations is a unique organisation, virtually one of a kind. We combine a strong sense of purpose with a real commercial edge More ❯
Employment Type: Permanent, Part Time, Work From Home
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procerdures Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA’s outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & AccessManagement and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) are enforced. Manage and improve PrivilegedAccessManagement (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccess Management. (PAM) Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to address More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
/part time, permanent We are seeking a highly skilled Identity and AccessManagement; PrivilegedAccessManagement (IDAM/PAM) Specialist to join our team. This position is pivotal in ensuring robust identity and access control measures, aligning with organizational security policies and regulatory … requirements, and driving strategic initiatives. You will lead efforts to mitigate cyber risks, manage IDAM/PAM processes, and support the organization's growth through resilient and efficient accessmanagement systems. Your future plans Lead and manage IdAM/PAM initiatives, including Joiner-Mover-Leaver (JML) processes. Oversee … within RWE using Sailpoint. Manage the integration of target systems from a business-related perspective. Act as SME and trusted partner between IDAM/PAM, IT Ops, HR, and Business Units. Mitigate risks by further developing, implementing, and automating workflows and controls. Investigate and identify access anomalies and implement More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing privileged accounts. … You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Heres a taste of what you will be doing as an Identity Governance Access Analyst … at Nottingham Building Society: Daily Operations: Collaborate with the IGA Manager to ensure smooth daily operations of our identity governance platform, adhering to user access policies. Process Management: Coordinate with HR and IT to manage joiner, mover, and leaver processes across systems. Access Certification: Assist in accessMore ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Accenture
and mitigations-to ensure defensive resiliency. This is a new project within the existing team and will require the candidate to own the service management across internal and external stakeholders, support a team of 5 analysts and run service reviews with the client with support from the SOC Operations … excellent employee benefits, including: Competitive salary and benefits, including but not limited to: life/health insurance, performance based bonuses, company car (depending on management level), flexible work arrangements (remote working), employee share purchase plan, parental leave and various corporate discounts. Multi-cultural team of highly motivated advisory professionals … to develop your career across a spectrum of clients, industries and projects leveraging our alliances (Google, Microsoft, Splunk, and others). Corporate citizenship initiatives (access to volunteering opportunities, charity work) Modern working environment. Key Responsibilities Act as service delivery manager during the run phase of the service. Supporting the More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN … Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and … Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), and security automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi More ❯