optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Description Allica's security team plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with various teams, such as Engineering … mitigation of potential intrusions in real-time, collaborating with cross-functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities aimed at gaining unauthorized access … security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. NOTE: Applicants must … per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
in Active Directory, Entra ID, and Microsoft technical administration. The successful candidate will have extensive experience with Intune and Entra ID and will be responsible for supporting and securing our identity infrastructure across several high-profile, time-sensitive projects. This role requires close collaboration with internal teams and third-party partners to ensure seamless integration and operation of … Proficient in Active Directory and Entra ID administration. Solid experience with Microsoft Intune configuration and management. Experience in Microsoft technical administration and troubleshooting. Familiarity with identityandaccessmanagement (IAM) principles and best practices. Exposure to Privileged AccessManagement (PAM) tools such as CyberArk and/or IGA platforms like … SailPoint ISC is advantageous. General proficiency in Microsoft tooling, PowerShell, KQL, Copilot etc. Certifications (Preferred) Microsoft Certified: IdentityandAccess Administrator Associate Microsoft Certified: Azure Administrator Associate Other relevant Microsoft or security certifications Soft Skills Strong problem-solving and analytical abilities. Excellent communication and interpersonal skills. Ability to work independently and collaboratively within a team. Detail More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. More ❯
implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
incident response. Youll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
Chatham, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
response. You’ll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Searchability®
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
lifestyle and helps you reach your ambitions. We are looking for someone enthusiastic and ambitious to join our Pre-Sales team to work with our IdentityandAccessmanagement portfolio. In this position, you will be working closely with the Workforce IAM sales team to respond to partner and customer needs for our solutions. … and half about the technical skills; so, you will need to have experience on both sides. Also, you will be working with other IAM Pre-Sales consultants and product management on driving the Thales Workforce IAM portfolio. Identity, AccessManagementand Cryptography underpin everything that we do and so the more you … learn and interested in technology; the ability and desire to 'learn something new' will really help. The position is based in the United Kingdom near to London and easy access to the Thales Head Office in Reading. You will need to be mobile as we have customers across the French speaking territories. We expect you would be travelling More ❯
or OpenSearch) and Grafana Knowledge of ServiceNOWfor change managementand incident management. Familiarity with observability tools and practices for 24x7x365 monitoring and alerting. IdentityandAccessManagement experience is a plus for this role LI RB1 LI Remote LI Hybrid About Bentley Systems Bentley Systems (Nasdaq: BSY) is the infrastructure engineering software … twins, include MicroStation and Bentley Open applications for modeling and simulation, Seequent's software for geoprofessionals, and Bentley Infrastructure Cloud encompassing ProjectWise for project delivery, SYNCHRO for construction management, and AssetWise for asset operations. Bentley Systems' 5,200 colleagues generate annual revenues of more than $1 billion in 194 countries. Equal Opportunity Employer: Bentley is an equal opportunity … employer and considers all qualified applicants for employment without regard to race, color, sex, sexual orientation, gender identity, disability, pregnancy, protected veteran status, religion, national origin, age, genetic information or any other protected characteristic. This commitment extends to all aspects of employment, including, but not limited to, hiring, placement, promotion, compensation, and training.Know Your Rights as an applicant More ❯
in on-prem backup solutions; cloud backup solutions an advantage Ability to diagnose and troubleshoot software and hardware issues logically and methodically Knowledge of Microsoft SQL Database Services andmanagement Strong written, oral, and interpersonal communication skills Keen attention to detail and adaptable to change Team-oriented and skilled in working within a collaborative environment Desirable Qualifications and … Experience: Experience with Microsoft 365 services Microsoft IdentityandAccessManagementand Conditional Access policies Knowledge of PowerShell Experience with server virtualisation (VMWare/Hyper-V) or VDI Strong understanding of networking concepts Proficiency with Microsoft Endpoint Configuration Manager MS Azure foundation level cloud certifications Experience with NIST-(Apply online only) andMore ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
processes. What youll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
Gillingham, Brompton, Medway, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
What you’ll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth knowledge of Conditional Access, Azure Active Directory (Azure AD), andidentity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid … identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, andaccess reviews. Monitor and respond to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
with API Gateway technologies (e.g., Kong, Apigee, AWS API Gateway) to enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile … architecting and deploying microservices-based systems in complex enterprise environments. • Hands-on experience with API Gateways (Kong, Apigee, or AWS API Gateway) and secure API development. • Working knowledge of IDAM platforms like Ping Identity, Auth0, or Okta. • Work closely with mobile app teams to ensure backend services are optimized for mobile/web delivery. • Experience working in banking More ❯