to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … similar roles including in-depth troubleshooting, mentoring and managerial skills. KEY RESPONSIBILITIES 1. Provide strong and experienced leadership. 2. Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical workshops and 1:1 coaching sessions, to ensure alignment to business strategy. 3. Creation and maintenance of technical guides to convey facts … simply and effectively to both peers and those less experienced. 4. Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. 5. Balance technical fact/opinion against business risk/delivered service to provide well thought More ❯
Change your job, change your workplace, change your future Ricoh are currently recruiting for a IdentityandAccessManagement (IAM) Specialist to join our EMEA IT team. This position will play a critical role in safeguarding the organisation's digital identity framework. The position ensures secure, appropriate, and compliant access … policies and security standards. Maintain and enhance IAM tools and infrastructure, including role-based access controls (RBAC), single sign-on (SSO), multi-factor authentication (MFA), and privileged accessmanagement (PAM). Perform regular access reviews and recertifications to ensure compliance with internal governance and external regulatory requirements. Identify, assess, and respond to … identifying process automation and efficiency gains. Manage user accounts, permissions, and group memberships. Execute daily IAM operations and service requests. Conduct audit logging and reporting activities. Implement and enforce access control policies aligned with corporate governance. Design and review workflows for joiners, movers, and leavers. Maintain compliance with standards such as ISO 27001, NIST, and GDPR. Apply IAM More ❯
the epics and ensure the required processes are applied to deliver epics on time, within budget and with the desired outcomes aligned to objectives. In the context of our IDAM Programme, we are looking an Infrastructure Project Leader/EDO with knowledge of the IDAM (IDentity & AccessManagement) domain to lead technical projects. The … is respected Report these elements to the appropriate stakeholders/committees in order to ensure full awareness and appropriate decisions are taken Your responsibilities: In relation to the management aspects: Running the epic on a day-to-day basis on behalf of the Sponsorship Committee: Monitor the epic, from definition phase to closure phase, including managing all internal … these ones (Planning, Budgets, Risks & Issues, Resources management ). Previous experience of outsourced projects management is a plus. You naturally have strong negotiation and conflict management skills and you are able to influence different levels of management towards your projects targets. You are fluent in English and have excellent communication skills (listening More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Entasis Partners
Non-Human Identity Manager – Security-Led Transformation Sector: Financial Services, Government and other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & AccessManagement (IAM), Privileged AccessManagement (PAM), and modern DevOps practices to protect non-human identities at scale for a leading consultancy. If you thrive on tackling complex security challenges, enjoy working across traditional security and cutting-edge automation teams … and have a knack for designing elegant solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human More ❯
Non-Human Identity Manager – Security-Led Transformation Sector: Financial Services, Government and other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & AccessManagement (IAM), Privileged AccessManagement (PAM), and modern DevOps practices to protect non-human identities at scale for a leading consultancy. If you thrive on tackling complex security challenges, enjoy working across traditional security and cutting-edge automation teams … and have a knack for designing elegant solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
lead transformative ERP engagements across diverse industries? We're partnering with a leading consultancy to find a Senior Manager who will spearhead SAP S/4 HANA security andaccessmanagement initiatives, driving innovation and compliance in financial transformation programmes. About the Role As a Senior Manager, you'll take ownership of SAP Security architecture and … implementation, leading teams through complex ERP transformations. You'll work closely with senior stakeholders to assess risks, define strategy, and deliver robust access governance solutions across SAP and non-SAP platforms. Key Responsibilities Lead SAP Security and GRC strategy development and implementation. Oversee accessmanagement policies, user provisioning, and SoD controls. Manage greenfield SAP … Security andIdentityAccessManagement projects. Conduct risk assessments aligned with frameworks like NIS2. Stay ahead of emerging threats and technologies to enhance application security. Build strong client relationships and deliver high-quality service. What We're Looking For Proven experience in large-scale SAP implementations. Deep knowledge of S/4 HANA, BW More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
lead transformative ERP engagements across diverse industries? We're partnering with a leading consultancy to find a Senior Manager who will spearhead SAP S/4 HANA security andaccessmanagement initiatives, driving innovation and compliance in financial transformation programmes. About the Role As a Senior Manager, you'll take ownership of SAP Security architecture and … implementation, leading teams through complex ERP transformations. You'll work closely with senior stakeholders to assess risks, define strategy, and deliver robust access governance solutions across SAP and non-SAP platforms. Key Responsibilities Lead SAP Security and GRC strategy development and implementation. Oversee accessmanagement policies, user provisioning, and SoD controls. Manage greenfield SAP … Security andIdentityAccessManagement projects. Conduct risk assessments aligned with frameworks like NIS2. Stay ahead of emerging threats and technologies to enhance application security. Build strong client relationships and deliver high-quality service. What We're Looking For Proven experience in large-scale SAP implementations. Deep knowledge of S/4 HANA, BW More ❯
The Role We are seeking a seasoned Senior Cyber Security Consultant with a background in SOC engineering tools plus one of Cloud Security, IdentityandAccessManagement (IAM) or Threat Modelling. In this role, you will work with cross-functional teams to deliver cutting-edge security solutions that address the evolving threat landscape, helping … time monitoring and response. Conduct regular tool performance reviews and implement upgrades or replacements as necessary. Skills Extensive experience in SOC tools engineering plus one of Cloud Security, Identity & AccessManagement (IAM) or threat modelling. Hands-on experience with SOC tools, including SIEM, SOAR and EDR solutions. Strong experience in securing cloud platforms (AWS More ❯
What you’ll bring: Strong experience with Microsoft 365, CoPilot, and Intune deployment and migration. Deep knowledge of Microsoft productivity and security solutions. Expertise in identityandaccessmanagement, including Microsoft security tools. Familiarity with CoPilot capabilities and its impact on user productivity. Excellent communication and leadership skills. Proven experience facilitating complex customer workshops … and co-design sessions. It would be great if you had: Microsoft Cyber Security Expert or Identity & AccessManagement certifications. M365 Endpoint or Collaboration certification. Knowledge of Azure security services. Experience with M365 Security & Compliance and Apps Productivity Suite including SharePoint. If you are interested in this role but not sure if your skills More ❯
the discussion at offer stage JOB PURPOSE To lead the vision, strategy, and delivery of the BBC's Account Platform, ensuring secure, scalable, and resilient identityandaccessmanagement (IAM) systems that support seamless signed-in experiences across BBC digital services. WHY JOIN THE TEAM Join a mission-driven team at the heart of … the BBC's digital transformation. You'll shape the future of user identityandaccess across one of the UK's most trusted institutions, working with cutting-edge technologies and collaborating with diverse stakeholders to deliver secure, user-centric solutions at scale. YOUR KEY RESPONSIBILITIES AND IMPACT Define and lead the product vision and roadmap for … in coordinating cross-functional teams to identify shared capabilities and simplification Strategies. Proficiency with tools like Jira, Confluence, and modern collaboration frameworks. Demonstrated experience with IdentityandAccessManagement (IAM) systems and/or account platforms at scale. INTERVIEW PROCESS The interview process will be two stages and held on MS Teams. The first More ❯
systems. Proficiency in implementing CI/CD pipelines and managing complex integration challenges. Identity & AccessManagement: Understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Must be capable of effectively implementing and troubleshooting SSO and SCIM integrations. High-Quality Code … our people feel they truly belong. We value and respect individual differences, so all applications will receive fair and equal consideration without regard to ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability or age. More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £85,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with experience designing and implementing IAM frameworks, managing access governance, and improving security posture in large-scale environments. You'll combine hands … with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're seeking a senior-level Identity & AccessManagement (IAM) and Security specialist to take ownership of a global security roadmap and design IAM frameworks that protect operations across multiple countries. This … security objectives into practical, scalable solutions. Key Responsibilities: Own and deliver the Global Technology Operations security roadmap Design & implement IAM frameworks (Saviynt preferred, Okta/SailPoint/Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Work with CISO and leadership to identify & mitigate security risks Respond to identity/accessMore ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £100,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with a proven track record in designing security roadmaps and influencing at executive level. You'll combine hands-on IAM expertise with strategic leadership … shaping global identity strategies while engaging with CISOs and senior stakeholders. Experience with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're looking for an Identity & AccessManagement (IAM) and Security specialist to own and drive a global … priorities into scalable, actionable security solutions. Key Responsibilities: Design, own, and deliver the Global Technology Operations security roadmap Build and implement IAM frameworks (Saviynt preferred; Okta, SailPoint, Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Partner with CISO and senior leadership to define security strategy and mitigate risks Provide expert guidance during More ❯
thats driving real change for major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, youll play a key role in shaping secure, scalable solutions. Youll also enjoy the benefits of working for Europes leading independent IT providerwith … a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting at customer meetings, and shaping technical solutions that meet client needs Own and lead technical implementations … the ability to manage virtual teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Join Us. Drive Innovation. Deliver Impact. More ❯
Manage and optimize Virtual Desktop Infrastructure (VDI) environments to deliver reliable remote access solutions Configure and maintain Entra ID (Azure Active Directory) for identityandaccessmanagement across the organization Deploy and manage Microsoft Intune for device management, application deployment, and security policy enforcement Implement conditional access policies … group policies, and user profile management solutions Support Azure and Microsoft 365 services integration with on-premise systems Manage application packaging, virtualization, and deployment using SCCM and Citrix technologies Maintain enterprise mobility management platforms and ensure seamless user experiences Work with database, storage, network, and monitoring systems to ensure comprehensive service delivery Contribute to long-term … roles within ITIL-governed environments Strong hands-on experience with Windows 11, Entra ID, Active Directory, VDI, EUC, Microsoft 365 suites, and Intune Expertise in VDI technologies and virtual desktop management Knowledge of Microsoft 365, single sign-on (SSO), identity providers, and PKI systems PowerShell scripting skills and automation experience with Infrastructure as Code (IaC) Experience More ❯
productivity by standardizing environments and streamlining workflows. Security & Compliance Partner closely with the ISO and Security teams to maintain compliance with ISO 27001, SOC 2, and GDPR. Implement identityandaccessmanagement, secrets management, and network security best practices. Drive a security-first culture across platform and product teams. Mentorship & Leadership Act … policies that support working families. Top-Quality Equipment: Modern tech and ergonomic setups to help you do your best work. About Definely Definely is revolutionising how legal professionals accessand understand information in complex documents. Our LegalTech solutions integrate directly into legal workflows, enabling teams to draft, review, and interpret contracts more efficiently, without breaking focus. We're … be stored for up to 12 months, after which it will be securely deleted unless we have another lawful basis to retain it. You have the right to access, correct, or request the deletion of your data at any time. For more details on how we handle your personal data and your rights, please email and we will More ❯
projects and Azur's product teams Design, manage, and optimise CI/CD pipelines using Bitbucket Pipelines, Salesforce DX, and Vlocity Build Tool Automate metadata deployment, scratch org management, and managed package release processes Support the build and deployment of backend services using Docker containers and orchestration (e.g. Kubernetes/AKS) Set up and maintain infrastructure and services … in Microsoft Azure, including Azure Functions, Logic Apps, API Management, and Key Vault Collaborate with IT on environment provisioning, security policies, identity/accessmanagement, and cross-team tooling Monitor system performance, availability, and scalability using tools such as Azure Monitor, Application Insights, and Log Analytics Lead the rollout of DevOps best … Actions, or custom CI/CD tools Proficiency in scripting languages (e.g. PowerShell, Bash, Python) Experience with data loading across various environments Solid experience in Docker and container management Familiarity with Azure services supporting serverless and app hosting Understanding of networking, security, identity (OAuth, SSO), andaccess control best practices Git-based version control More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
cloud-native architecture Demonstrated ability to produceHigh Level Design and Low-Level Design documents (must have) Expertise in integration architecture and design patterns Experience in IdentityandAccessManagement, security best practices, and authentication protocols (e.g., OAuth2, SAML). Proven track record of leading secure, performant, and scalable solution delivery. Experience with cloud-to … requirements of ISO 9001:2015 Quality Management System, ISO 14001:2015 Environmental Management System with guidance for use", OHSAS 18001:2017 Occupational Health and Safety Management Systems and ISO/IEC 27001:2013 Information Security Management System, Policies, Plans, Procedures and Processes, and statutory requirements as they affect the Joint Venture 's More ❯
our games and back-end infrastructure. The role offers the opportunity to further develop a career in Cyber Security in an exciting, fast-moving industry. Key Deliverables: SIEM Managementand Optimisation Lead the management, administration and support of our SIEM platform and incident response environment, including general infrastructure and system administration. On-board, maintain and manage … Experience in a hands-on SIEM/SOC Engineering or Security Engineering role or have gained similar experience through other adjacent roles. Capabilities working with Security Information and Event Management (SIEM) or Security Analytics platforms. Specific experience with Elastic Security is highly desirable. Microsoft Defender, Sentinel, Purview, M365 E5 and Entra Suite experience. Competency working with Google Cloud … security frameworks, for example SABSA and NIST CSF. Willingness to learning and understanding new technologies quickly. Ability to converse effectively across technology domains to include identityandaccessmanagement, network security, infrastructure, databases, cryptography and virtualisation. Ability to communicate complex technical concepts in simple diagrams, blueprints and solution definitions. Interpersonal Skills/Other Proactive More ❯
Sanderson are working with our client on an exclusive basis to help the recruit a permanent Senior Identity Consultant during a phase of growth in the organisation. This is a newly created role so you will need to have the depth of knowledge to be able to interpret architecture requirements whilst collaborating with developers, business analysts and architects … Microsoft Entra for customer needs against project deadlines. To carry out this role successfully you will need to have a blend of the following skills; IdentityandAccessManagement knowledge Configuration Management Active Directory Security best practises Troubleshooting & Support Software Configuration Agile Methodologies Data Orchestration & Transformation The ability to work across internal More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯