2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
access. For identities, we also include technical, shared, emergency, robotic, etc. Key Responsibilities: ·Develop and maintain IAM solutions, including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). ·Manage identity lifecycle processes, including provisioning, de-provisioning, and role-based More ❯
access. For identities, we also include technical, shared, emergency, robotic, etc. Key Responsibilities: ·Develop and maintain IAM solutions, including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). ·Manage identity lifecycle processes, including provisioning, de-provisioning, and role-based More ❯
policies and security standards. Entra ID Integration: Implement and manage Entra ID solutions, including user provisioning, access management, and singlesign-on (SSO) configurations. Collaboration: Work with cross-functional teams including IT, security, and business units to support identity-related projects and initiatives. Documentation More ❯
Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
policies and security standards. Entra ID Integration: Implement and manage Entra ID solutions, including user provisioning, access management, and singlesign-on (SSO) configurations. Collaboration: Work with cross-functional teams including IT, security, and business units to support identity-related projects and initiatives. Documentation More ❯
Support the transition from on-prem Active Directory to Microsoft Entra ID Manage user provisioning, authentication, and singlesign-on (SSO) configurations Administer and configure Microsoft Intune for device and user policy management Collaborate with IT, security, and third-party providers to More ❯
Support the transition from on-prem Active Directory to Microsoft Entra ID Manage user provisioning, authentication, and singlesign-on (SSO) configurations Administer and configure Microsoft Intune for device and user policy management Collaborate with IT, security, and third-party providers to More ❯
principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯
principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Intec Select
configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package More ❯
Months Based : Hybrid/London - 2 days per week Required Experience: Enhance access control by implementing and refining RBAC in Microsoft Intune Lead SSO integrations using protocols such as SAML, OIDC, and OAuth Configure and manage Privileged Identity Management (PIM) within Entra ID Support compliance initiatives by aligning Entra ID More ❯