Experience and good understanding of systems management tool (LANDESK preferred) §Reinstalling Operating Systems with imaging software §Good understanding of two-factorauthentication §Voice system administration: support, provisioning, and troubleshooting (Avaya preferred) §Using Antivirus and malware software to clean PCs §Video Conferencing setup and troubleshooting (Teams, Zoom More ❯
Experience and good understanding of systems management tool (LANDESK preferred) §Reinstalling Operating Systems with imaging software §Good understanding of two-factorauthentication §Voice system administration: support, provisioning, and troubleshooting (Avaya preferred) §Using Antivirus and malware software to clean PCs §Video Conferencing setup and troubleshooting (Teams, Zoom More ❯
ideally within professional services, you'll have strong knowledge of Microsoft Office 365, Active Directory, Intune, Mimecast, VPNs, and two-factorauthentication, along with hands-on experience supporting iPhones, laptops, and multi-screen setups. A proactive, service-driven approach, excellent problem-solving and communication More ❯
data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. Manage multi-factorauthentication (MFA) systems to ensure they are functioning correctly and securely. Manage single sign-on (SSO) solutions to improve users More ❯
backup systems, VoIP and video conference systems. Implement and manage: Endpoint protection solutions (antivirus/encryption), Patch management systems, Two-factorauthentication infrastructure. Ensure compliance with enterprise security policies Provide desktop support (in-person/remote) for employees, including VIPs. Support onboarding/offboarding (system deployment More ❯
Password Management. Access Management, Single Sign-On & Federation. Access review process customisations, inc. exclusion, pre-delegation and active period rules. Risk-based & Multi-Factor Authentication. Vault/Key/Password Management. What experience you'll bring: What you'll bring: Experience with at least one of More ❯
hardware and networking that incudes installation, configuration and troubleshooting. Support endpoint security standards (antivirus/firewall/patching/two-factorauthentication). Manage day to day operational aspects of a project and scope. To assist the IT Manager in delivering various IT projects. End User More ❯
implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) Single Sign-On (SSO) and Multi-FactorAuthentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate with client More ❯
ensuring IT Security is managed through Identity and Access Management and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and Access Management, especially through technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and … AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-FactorAuthentication configuration via MS Authenticator User Lifecycle Management Package: £100,000 - £120,000 Basic Salary 20% bonus 15% Pension Excellent More ❯
ensuring IT Security is managed through Identity and Access Management and Cyber Security. Roles and Responsibilities: Govern and advise on technical direction for Authentication, CyberArk and Access Management, especially through technical workshops and 1:1 coaching sessions Daily management and maintenance of the Authentication, CyberArk and … AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-FactorAuthentication configuration via MS Authenticator User Lifecycle Management Package: £100,000 - £120,000 Basic Salary 20% bonus 15% Pension Excellent More ❯
hands-on experience with IAM technologies (e.g., Okta, SailPoint, CyberArk) Familiarity with cloud platforms such as AWS or Azure Strong understanding of RBAC, authentication protocols (e.g., SAML, OAuth, OIDC), and directory services Automation/IaC mindset Full stack engineering experience - design, deployment, and operations … Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including Single Sign-On (SSO), Multi-FactorAuthentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and access More ❯
hands-on experience with IAM technologies (e.g., Okta, SailPoint, CyberArk) Familiarity with cloud platforms such as AWS or Azure Strong understanding of RBAC, authentication protocols (e.g., SAML, OAuth, OIDC), and directory services Automation/IaC mindset "Full stack" engineering experience - design, deployment, and operations … Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including Single Sign-On (SSO), Multi-FactorAuthentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and access More ❯
identify and mitigate OWASP Top Ten vulnerabilities . Validate the effectiveness of security controls such as RBAC (Role-Based Access Control), MFA (Multi-FactorAuthentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. Vulnerability … and infrastructure. Knowledge of database security testing , including writing security-focused SQL queries. Familiarity with identity and access management (IAM), RBAC, MFA, JWT authentication, and OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government security frameworks , including Cyber Essentials More ❯
applications. The IAM Operations analyst role is responsible for managing and supporting the systems, processes, and tools used to handle the identity lifecycle, authentication, authorization, and access control within an organization's IT infrastructure. The IAM Operations analyst collaborates with multiple teams within IT, including security, infrastructure, and … Essential • Technical Expertise: Understanding of IAM tools (e.g., Okta, SailPoint, CyberArk, Azure AD) and technologies such as SSO (Single Sign-On), MFA (Multi-FactorAuthentication), and role-based access control (RBAC). • Security Knowledge: In-depth knowledge of security concepts like least privilege, identity More ❯
City of London, Greater London, UK Hybrid / WFH Options
McGregor Boyall
in the Client Identity team, you'll work on developing and enhancing modern cloud-based cybersecurity services, ensuring the security and integrity of authentication solutions for our clients. You'll be at the forefront of defending against cyber threats and creating seamless login experiences for hundreds of thousands … cloud-based cybersecurity services across all layers, from databases to Content Delivery Networks (CDNs). Implement secure authentication solutions, including Multi-FactorAuthentication (MFA) and Passkeys. Integrate with leading identity providers such as Auth0, Transmit Security, and Ping Identity. Build and maintain More ❯
City of London, London, United Kingdom Hybrid / WFH Options
McGregor Boyall Associates Limited
in the Client Identity team, you'll work on developing and enhancing modern cloud-based cybersecurity services, ensuring the security and integrity of authentication solutions for our clients. You'll be at the forefront of defending against cyber threats and creating seamless login experiences for hundreds of thousands … cloud-based cybersecurity services across all layers, from databases to Content Delivery Networks (CDNs). Implement secure authentication solutions, including Multi-FactorAuthentication (MFA) and Passkeys. Integrate with leading identity providers such as Auth0, Transmit Security, and Ping Identity. Build and maintain More ❯
not become affected by end-of-life or end-of-support milestones. Security & Compliance: Implement and maintain Citrix security best practices, including nFactor authentication, WAF, IP reputation filtering, and session recording. Evaluate emerging security threats and action/implement patching schedules to protect the organisation’s systems against … LDAP, Kerberos) PowerShell scripting for automation and administration Group Policy Management and Windows OS optimization for VDI FSLogix Profile Management Security & Networking: Multi-FactorAuthentication (MFA), Citrix nFactor, Conditional Access Application Layer Firewalls (WAF), SSL Certificates, and Zero Trust security principles Network protocols: DNS More ❯
not become affected by end-of-life or end-of-support milestones. Security & Compliance: Implement and maintain Citrix security best practices, including nFactor authentication, WAF, IP reputation filtering, and session recording. Evaluate emerging security threats and action/implement patching schedules to protect the organisation’s systems against … LDAP, Kerberos) PowerShell scripting for automation and administration Group Policy Management and Windows OS optimization for VDI FSLogix Profile Management Security & Networking: Multi-FactorAuthentication (MFA), Citrix nFactor, Conditional Access Application Layer Firewalls (WAF), SSL Certificates, and Zero Trust security principles Network protocols: DNS More ❯
scalable and resilient IAM solutions for large corporate organisations. Experience with IAM engineering experience across authentication, authorisation, single sign-on, multi-factorauthentication, identity lifecycle management, OAuth2.0, OpenID Connect, SAML and policy management Expertise with JavaScript, Java, Python, and must be comfortable … DevSecOps - knowledge of Product Operating Model Knowledge of Infrastructure as a Code tooling (Chef is essential, Ansible is a plus), containerization knowledge of authentication and biometric system design is highly desired. Open-source experience You may be assessed on the key critical skills relevant for success in role More ❯
including VPC, Direct Connect, VPN, Load Balancers, and Route 53. Proficient in AWS security practices, including IAM, KMS, security groups, NACLs, and multi-factor authentication. Solid experience in containerization and orchestration using AWS services like ECS, EKS, and Docker. Strong understanding of microservices architecture, serverless computing More ❯
South West London, London, United Kingdom Hybrid / WFH Options
La Fosse
based systems using VPN services. Architect hybrid cloud security solutions, including Identity and Access Management (IAM), Identity Federation, Single Sign-On (SSO), Multi-FactorAuthentication (MFA), access control policies, security key management, and firewall rules. Actively monitor and respond to security alerts to mitigate More ❯
s information and cybersecurity standards and principles. Defined the requirements for the configuration and management of SSO and MFA solutions to streamline user authentication and improve security across cloud and on-premise applications. Proficient in data analysis, data lineage, data profiling, master data management, metadata management, ETL/… verification processes. Other Important Skills: Knowledge of Digital Identity Verification Technologies: Understanding of techniques like biometric verification, face recognition, document verification, and multi-factor authentication. Understanding of Cybersecurity: Awareness of security threats, vulnerabilities, and best practices for protecting sensitive data. Experience with Agile Methodologies: Familiarity with More ❯
Detection and Response Web & email filtering Firewalls (Cisco ASA, Firepower preferred others beneficial) Managed Wi-Fi solutions (Cisco Meraki) Two-factorauthentication (RSA, Authenticator apps) Data Leakage Prevention (DLP) Desirable skills: CCNA or CCNP certification RADIUS: Experience with Steel-Belted RADIUS, FreeRADIUS, or nuRADIUS Database Management … Basic knowledge of MS SQL Security Appliances: Experience with filtering solutions, RSA authentication, and Data Leakage Prevention (DLP) SIEM solution exposure What Will Make You Shine at Mobius Strong multitasking with capability to manage and prioritise workloads effectively and efficiently. Excellent communication skills, especially in customer relations when More ❯
within their Cybersecurity Engineering division. This team is responsible for managing Client Authentication services for their retail investment platform, including multi-factorauthentication (MFA) and Passkeys. As a Senior Engineer, you will work within a multi-functional agile squad to More ❯
Design, implement and maintain secure access to internal and cloud-based systems. Manage hybrid cloud security solutions, Identity and Access Management (IAM), Multi-FactorAuthentication (MFA) and access control policies. Monitor and mitigate security risks, responding to security alerts to protect infrastructure and data. More ❯