Basingstoke. This is a pivotal role where you will act as a key technical authority, designing and delivering cutting-edge IdentityandAccessManagement solutions for complex projects. You'll collaborate within a multi-skilled delivery team where teamwork, knowledge sharing, and achieving together … values. The Role: As the IDAM Architect, you will report to the Solution Owner and take ownership of the end-to-end design and delivery of IDAM work packages. You will be the subject matter expert, ensuring solutions meet stringent functional and non-functional requirements while navigating governance and review … maintain comprehensive documentation for IDAM solutions, processes, and support. Collaborate closely with multi-skilled agile delivery teams. Manage the delivery of ongoing changes and enhancements to IDAM solutions based on evolving user needs. Leverage experience with identity governance principles, including Role-Based Access Control (RBAC) andMore ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
so that we're able to interact and collaborate in person. About the Role As an IAM Engineer, you will be designing and implementing identity solutions across a variety of … SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identityandaccessmanagement team and act as a liaison to the wider business, providing SME knowledge on identityandaccess … including authentication protocols, Identity Lifecycle Management, Privileged AccessManagement, Role Based Access Control andIdentity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using tools such as Terraform Experience of More ❯
We are seeking a highly skilled Senior Java Developer to join our team. The ideal candidate will have experience in identityandaccessmanagement (IAM) technologies and a passion for solving complex problems. You will work independently and collaboratively with our CIAM engineers to … maintain and create customizations for Bentley's customer identityandaccessmanagement systems. Key Responsibilities: Design and Development:Create and implement identity solutions using protocols like OAuth, OIDC, SAML, and other IAM technologies. Integration:Work with cross-functional teams to integrate identity … solutions are secure, scalable, and comply with industry standards and best practices. Troubleshooting:Identify and resolve issues related to identityandaccessmanagement systems. Documentation:Develop and maintain documentation for identity solutions, including design specifications, configuration guides, and troubleshooting procedures. Collaboration More ❯
Basingstoke, Hampshire, South East, United Kingdom
CBSbutler Holdings Limited
the delivery of ongoing change to the work package, in response to evolving user requirements. Your experience Extensive experience in IdentityandAccessManagement (IdAM) technologies. Develop and maintain documentation for IdAM, experience in creating HLD/LLD's. Experience working with identity governance including Role based access control, access requests. Knowledge of key IdAM standards. Providing specialised expertise on IdAM tools and their integration within client systems. Providing SME leadership skills in IdAM technologies. Experience in MS Windows Enterprise technologies and architectures, along with PowerShell scripting More ❯
challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight andmanagement to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. … following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing, Ransomware and other key threats IDAM (IdentityandAccess Mgmt) JML (Joiners, Movers and Leavers Processes) Security Awareness Information Classification Experience (Nice to have) Previous experience managing More ❯
Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Hampshire County Council
Cloud, including design work, utilizing concepts and technologies such as SaaS, PaaS, IaaS, On-Premises hosting, application provisioning and integration, IdentityandAccessManagement (IdAM), Windows Server, firewalls, load balancers, and databases (both HCC hosted and cloud-based). Additionally, you should possess: Motivation … to equality and diversity. No unnecessary conditions or requirements will be applied that could adversely affect any group. All applicants will have equal access to employment opportunities. No one will be treated less favorably based on age, disability, gender reassignment, race, religion or belief, sex, sexual orientation, marriage More ❯
in Cyber Security, Computer Science, Networks, etc. Professional qualifications from organizations like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management … etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes, security awareness, and information classification. About SiXworks SiXworks specializes in secure digital solutions, focusing on digital experimentation and cutting-edge technology in secure More ❯