and execute the organisation’s Identity & AccessManagement (IDAM) strategy to improve employee experience, productivity, and cyber resilience Lead the selection, implementation, and optimisation of IDAM technology solutions, ensuring seamless integration with existing systems and infrastructure Drive and deliver a major transformation programme focused on modernising identityandaccessmanagement … lifecycle of the IDAM Product, including budget management, change control, and obsolescence planning Ensure compliance with all relevant regulations and cyber standards, maintaining a robust and secure identity environment You’ll also have people management responsibilities in this role and will be directly hiring a number of key roles … to support programme execution Your skills and experiences: Essential: Significant experience of working in an IT Function within a complex environment Significant experience of managing identityandaccessmanagement in a relevant field Experience with enhancing and developing technical capability which will be applied across a range of large, complex, high value and strategically More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Description Allica's security team plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with various teams, such as Engineering … mitigation on potential intrusions in real-time, collaborating with cross functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities aimed at gaining unauthorized access … security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
on-site) 6 months + MAIN RESPONSIBILITIES Support critical IAM work streams aimed at enhancing compliance and operational maturity within VWFS, with a focus on IdentityandAccessManagementand maintaining user account hygiene across all applications. Lead efforts to onboard legacy applications to the SailPoint IdentityIQ platform, through calibration with Application Owners and … specific applications, ensuring full compliance with internal and regulatory IAM requirements. Design and build robust data collation and transformation workflows to facilitate the accurate and timely upload of Identityand Entitlement data for offline applications into IAM systems. Provide ongoing technical expertise and guidance on IAM best practices, processes, and principles, supporting both the IAM team and wider … global standards, sharing knowledge and best practices to drive consistency across regions. EDUCATION, TRAINING AND EXPERIENCE Mandatory Minimum of 3 years' hands-on experience in IdentityandAccessManagement (IAM), with a strong understanding of IAM principles and best practices. Proven experience assessing application maturity against IAM control requirements, identifying gaps, and recommending remediation More ❯
related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
/day (Outside IR35) (Hybrid - 3/4 days per week onsite in Farnborough) Our client, a leading Managed Services provider, is seeking an experienced IdentityandAccessManagement (IAM) Engineer to support a large transformation programme, delivering a multi-tenant private cloud platform to replace complex legacy infrastructure. Key Responsibilities: Design and implement … IdentityManagement solutions (AD, ADFS, SAML, MFA) Automate provisioning, de-provisioning, and synchronization processes Integrate ADFS with third-party identity providers (SAML, LDAP, OAuth) Implement Tiered Access, Zero Trust, Least Privilege, SSO, and MFA Produce technical documentation and collaborate with infrastructure teams Requirements: Strong experience with Microsoft AD and ADFS Hands-on … with SAML, LDAP, OAuth integrations Desirable: PAM, IGA, Ansible, Terraform, VMware experience Active SC clearance. If you're a skilled IAM Engineer with a background in secure and automated identity solutions, we'd love to hear from you. More ❯
consultative selling. In the security industry, we develop high-quality solutions that are offered both on-premises and as SaaS solutions. Our products focus on IdentityandAccessManagement processes, with the goal of simplifying configuration andmanagement for our customers. End users appreciate our solutions for creating a secure and trusted … element of the role, you must be able to confidently deliver training sessions to engineers of varying levels of expertise; Develop and grow your own knowledge about our access control solutions by testing new functionalities, integrations and providing input for their documentation; Participate in and/or leads complex projects together with business partnersfrom the perspective of the … sales processes; including being part of a presentation/pitch team and delivering compelling product demonstrations; Advise and provide product or selling information to external stakeholders up to management level; Develop strong relationships with end-users and business partners to continuously improve collaboration; Assist and participate in events. Your team In the role of Technical Support & pre-Sales More ❯
thats driving real change for major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, youll play a key role in shaping secure, scalable solutions. Youll also enjoy the benefits of working for Europes leading independent IT providerwith … a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting at customer meetings, and shaping technical solutions that meet client needs Own and lead technical implementations … the ability to manage virtual teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Join Us. Drive Innovation. Deliver Impact. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Absolute Recruit
Services background - this is a must-have Microsoft Office 365 (including all the collaboration and communication tools) Microsoft Intune - setting up, configuring, and managing devices IdentityandAccessManagement (Entra/Azure) and multi-factor authentication Google Workspace experience would be a real bonus Apple device support would be brilliant to have Good understanding … of network security, VPNs, antivirus, and mobile device management We'd love to hear from candidates who've worked with Autotask and Datto - these would be perfect, but if you've got experience with similar PSA or RMM platforms, that works too.Their ideal Technical Support Engineer will love working as part of a team but also be happy … getting stuck in on their own to deliver great results.Keywords: Technical Support Engineer, Azure, Office 365, Intune, IdentityManagement, Service Desk, Autotask, Datto, RMM, PSA More ❯
up, alongside deep expertise in Microsoft Entra. You'll be instrumental in designing, deploying, and supporting a modern workplace environment, with a strong focus on identityandaccessmanagement, device configuration, compliance, and security policies. Key Responsibilities for the Microsoft 365 Engineer: Lead the end-to-end setup and configuration of Microsoft Intune, including … policies, profiles, compliance, device enrolment, Autopilot, and application deployment. Design, implement, and support Microsoft Entra ID, Conditional Access, MFA, andidentity governance. Oversee the integration between on-prem Active Directory and cloud identity services. Develop and maintain documentation and SOPs for identityand device management across the organisation. Collaborate with … including device compliance, endpoint protection, Autopilot deployment, and app packaging. Familiarity with identity protocols such as SAML, OAuth2, and OpenID Connect. PowerShell scripting experience for automation andmanagement tasks. Experience working with Microsoft Graph API and Entra Workload Identities. Good understanding of Zero Trust architecture and secure modern workplace concepts. Strong troubleshooting and diagnostic skills in More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
Administrator to manage, optimise, and secure a Microsoft 365 environment. Key Skills are M365 and Hyper-V. However, the ideal candidate will have hands-on experience with user management, security policies, Intune, Exchange Online migrations, and Autopilot deployments . You will play a key role in ensuring a secure, efficient, and well-governed M365 ecosystem. Key Responsibilities: Microsoft … Administration: Manage user identities, licenses, and security groups in Azure AD & Microsoft 365 . Configure and enforce Conditional Access Policies (CAP) for secure access. Implement and manage Multi-Factor Authentication (MFA) and Zero Trust policies . Monitor and troubleshoot Microsoft 365 services (Exchange Online, SharePoint, Teams, OneDrive) . Endpoint Management (Intune & Autopilot): Deploy, configure, and manage … Microsoft Intune for MDM (Mobile Device Management) & MAM (Mobile Application Management) . Set up and automate Windows Autopilot for zero-touch device provisioning. Develop and enforce compliance policies for endpoints (Windows, macOS, iOS, Android). Manage application deployments and updates via Intune. Exchange Online & Migrations: Perform migrations from on-prem Exchange to Exchange Online . Manage More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
dofrom infrastructure to application design. Key Responsibilities Design and implement security controls across cloud platforms (AWS, Azure, or GCP) Develop and maintain security tooling for threat detection, vulnerability management, and incident response Lead threat modelling and risk assessments for critical systems and services Collaborate with engineering teams to integrate security best practices into CI/CD pipelines Monitor … controls and documentation What Were Looking For Proven experience as a security engineer with a strong background in cloud security (AWS, Azure, or GCP) Solid understanding of networking, identity & accessmanagement, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, and security scanners Familiarity with DevSecOps practices and modern CI More ❯
moving. We re on the lookout for a Security Engineer. Reporting to the Cyber Security Manager, the main purpose of this role is to support the development andmanagement of security technologies across F1 s growing technology landscape. Main Duties & Responsibilities: Assess and maintain high standards of security maturity across Formula 1 s cloud infrastructure Focus on new … Cloud infrastructure against Formula 1 s compliance and security standards (such as ISO 27001 and CIS) Main duties to be carried out include, but not limited to: Vulnerability Managementand reporting across Formula 1 s cloud environment(s), including: Development of requirements, design, and implementation of cloud security tools (E.g. compliance and host security) A key … focus on threat detection and risks across cloud environments Identification, remediation, and reporting of security vulnerabilities Reporting on compliance to F1 s security standards Support in the delivery andmanagement of security design and architecture reviews Working closely with Infrastructure teams on security design and control strategies to reduce risks The definition and operation of secure development/ More ❯
Three and its partners, ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity managementand planning in place for the security services and solutions assigned to you and ensure that the … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. Our people make us who we are. We're a diverse and inclusive bunch, and it's important you can feel you belong here. … solution is incorporated into the 18-month technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue managementand the budgeting process. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Eames Consulting
technology areas. You'll take the lead on complex audit engagements, What you'll be doing: Leading and executing audits across core technology risk areas including Cyber Governance, Identity & AccessManagement, Network Security, Cloud, and AI Providing independent assurance over key cyber and infrastructure controls Partnering with senior stakeholders across Technology and Risk to … share findings and drive improvements Supporting the wider audit team with subject matter expertise in areas like Data Protection, Threat Management, and Emerging Technologies What we're looking for: Proven experience in IT or Cyber Security auditing, ideally within financial services or a regulated industry Strong technical understanding of cyber risk domains and infrastructure controls Ability to lead More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
Reigate, Surrey, South East, United Kingdom Hybrid / WFH Options
Client Server
improve cloud technologies including automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, Azure subscription management (they have 85 subscriptions), threat/vulnerability managementand incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter … home. About you: You have experience of designing, supporting, securing and building Azure cloud solutions; ideally with AZ-104 certification although it's not necessary You understand subscription management structures and have experience of managing Azure … subscriptions You have a good knowledge of DevOps and IaC concepts You're familiar with cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) andIdentityandAccessManagement (IAM) within Azure You're familiar with ARM templates and/or Pulumi Ideally you will have automation and scripting (PowerShell or similar) skills You More ❯
and fully aligned with the evolving needs of our research teams and scientists driving global pathogen research. Key Responsibilities: Manage our object data storage, ensuring efficient design, tiering, andaccess controls. Build and manage our research compute environment for running bioinformatics pipelines and interactive analytics. Ensure the data platform meets disaster recovery standards. Ensure cloud resources are managed … and follow through on opportunities for improvement. Essential Knowledge, Skills and Experience: Strong hands-on experience with cloud infrastructure, ideally Oracle Cloud and its portfolio, including provisioning, configuration, andmanagement of services. Ability to automate everything using Terraform and appropriate toolchains. In-depth knowledge of containerisation technologies (e.g. Docker) and orchestration tools like Kubernetes. Solid understanding of cloud … security best practices, including identityandaccessmanagement (IAM), network security, and encryption. Experience with Git or other version control systems. Desirable Knowledge, Skills and Experience: Certifications in Oracle Cloud (OCI) or other cloud platforms (AWS, GCP). Experience with Jira, Confluence, or similar project management tools. Knowledge of compliance frameworks andMore ❯
ID/Active Directory. Skilled in Office 365 deployment and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusion detection/… prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identityandaccessmanagement tools like Azure AD, MFA, and SSO. Experience designing and implementing security protocols. Comfortable managing cybersecurity incidents and maintaining compliance with standards such as GDPR More ❯
experience in IT infrastructure support and administration. Strong technical knowledge in Microsoft 365, Google Workspace, Windows OS, Active Directory, Backup and Disaster Recovery. Proficient in IdentityandAccessManagement platforms (e.g., Entra ID, Okta). In-depth understanding of server technologies, enterprise storage, network protocols, and infrastructure components. Skilled in managing and deploying resources … within public cloud environments (e.g., Microsoft Azure, AWS). Familiar with virtualisation infrastructure (e.g., VMware, Nutanix, Hyper-V, Azure Stack HCI). Knowledgeable in Mobile Device Management platforms (e.g., Intune, Mosyle, JAMF). Well-versed in ITIL frameworks and best practices. Experience with Desktop as a Service (e.g., Citrix, AVD), automation tools (e.g., PowerShell, Power Automate), and Linux More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
manner over the phone and via e-mail. Take ownership of incidents and manage them in a logical and methodical manner, taking responsibility for the end-to-end management of incidents in your queue and proactively keeping the customer informed of progress. Accurately log incidents by categorising and prioritising them in line with service operations procedures. Conduct full … Automate, Power BI) Azure Active Directory Intune and Endpoint Manager Conditional Access Policies Advanced Threat Protection (ATP) Data Loss Prevention (DLP) Information Protection IdentityandAccessManagement Firewalls Network routing and switching Additional 3rd party security stack technology Conditional access policies Personal Attributes Has a natural aptitude for troubleshooting andMore ❯
regulated sectors such as Defence, Aerospace, or Industrial Engineering. Strong understanding of enterprise security frameworks, secure system design, and risk management. Experience with cloud security, identityandaccessmanagement, and secure integration patterns. Familiarity with cybersecurity tools and platforms including SIEM, endpoint protection, IAM, and vulnerability management. Excellent communication and stakeholder engagement skills. UK More ❯