Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Certification: Assist in access certification campaigns, following segregation of duties and least privilege principles. Audits and Reviews: Participate in regular audits andaccess reviews to meet regulatory requirements. System Administration: Administer access to core banking systems, cloud platforms (e.g., Microsoft 365/Azure AD … and business applications. Secure Authentication: Support secure authentication solutions like single sign-on (SSO), multi-factor authentication (MFA), andidentity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation andidentitymanagement processes. Incident Response: Help with … Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 24 years of experience in identityandaccessmanagement, preferably in financial services or regulated environments, with beneficial qualifications like a degree in cybersecurity or certifications such as Security+ More ❯
We are looking for Product Owner - Identity Verification for our client's project based at Northampton, UK – Hybrid Role Description: A Digital Identity Verification Product Owner needs a diverse skill set, including strong technical knowledge, understanding of identitymanagement systems, and excellent … s a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity … backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk managementMore ❯
of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & AccessManagement (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially … like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. The consultant is also proficient in developing scripts to automate the provisioning and migration of identities … IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in IdentityandAccessManagement (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high More ❯
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning … protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identityandaccessmanagement efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. … Manager at Nottingham Building Society: Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One … AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work with stakeholders to define and enforce user access policies and workflows. About you: Experience: Extensive background in accessmanagement, IGA implementation, and endpoint security. Knowledge: Familiarity More ❯
Our Financial client in Ottawa is looking for a Senior Business Systems Analyst with a strong background in IdentityandAccessManagement (IAM) and experience supporting large-scale projects involving Microsoft Entra ID (Azure AD) . This opportunity is with a high-profile client … Secret-level security clearance and on-site presence in Ottawa 8 days per month. The successful candidate will support the Client's Cyber Access Control team in driving key initiatives related to IAM deployment, stakeholder engagement, solution evaluation, and documentation. Mandatory Qualifications: Degree or diploma in Computer Science … Microsoft Entra ID (Azure AD) Conditional Access Policies, Identity Governance, MFA, SAML, OATH Deep understanding of IAM concepts and enterprise access migrations Proven ability to write clear documentation, requirements, and functional specs Strong analytical and communication skills Knowledge of SDLC and QA/testing More ❯
Role Title: Digital Identity Verification Business Analyst Duration: contract to run until 31/12/2025 Location: Northampton, 2/3 days per week Rate: up to £386.40 p/d Umbrella inside IR35 Role purpose …/summary A digital identity verification Business Analyst needs a mix of technical and soft skills to effectively analyze, implement, and optimize digital identity verification processes. They should possess strong analytical, problem-solving, and communication skills, along with knowledge of relevant technologies and security concepts. Key … analyze large datasets, identify trends, and use data to inform decision-making. Proficiency in SQL for database querying and manipulation. IdentityandAccessManagement (IAM) Concepts: Understanding of directory services, identity lifecycle management, and privilege management. Familiarity with technologies like More ❯
information systems, assuring the integrity, availability, authentication, confidentiality and non-repudiation. As well as the protection of information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Role Responsibilities Key responsibilities for this role may … Checks (ITHC) Co-ordinate and support with MOD and other authority assurance activities To support the Development and maintenance of our Information Security Management System (ISMS) to best support the Company's activities, including Risk Managementand Accreditation Document Sets (RMADS) and Company Security Policies. To … technical expertise in security technologies and solutions, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, encryption, identityandaccessmanagement (IAM), and security information and event management (SIEM) systems. Strong understanding of security frameworks, standards, and regulations, including More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/… Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a More ❯
practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology More ❯
storage in cloud environments. Familiarity with monitoring and logging tools (e.g., Prometheus, Grafana, ELK, CloudWatch). Working knowledge of cloud security principles andidentity/accessmanagement in hybrid environments. Desirable: Certifications such as AWS SysOps/Architect, Azure Administrator, or Red Hat OpenShift … Admin. Background in regulated or high-security environments (e.g. public sector, defence). Experience with ITSM tools (e.g. ServiceNow, Jira Service Management) and ITIL-based processes. Knowledge of backup and recovery tools like Veeam, Commvault, or Azure Backup. You MUST hold Active SC or DV Clearance in order More ❯
2022. Ensure that any business changes, acquisitions, or transformations are accounted for within the scope of certification, through proactive risk identification andmanagement with IT assets owners. Development and championing all Information Security Policies, Procedures and relevant standards, and produce supporting documentation and training material to ensure organizational … and facilitate development of pragmatic solutions. Work with the DPO to ensure appropriate security is applied to data and provide reports/subject access requests. Design and deliver continual education and training to our colleagues to support them in identifying risks in their day-to-day operations, using … the organization. Experience working in a global, multi-business environment is a plus. Technical/Professional Qualification requirements: Proven experience in Information Security Managementand IT risk management. In-depth knowledge of ISO27001 to Lead Auditor standard. Knowledge of relevant regulations (Data Protection, DORA, NIS2). Knowledge of More ❯