enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
Northampton, Northamptonshire, England, United Kingdom Hybrid / WFH Options
PLANET RECRUITMENT SERVICES LTD
tune security tools, detection rules, and automation scripts. Support compliance initiatives (e.g., ISO 27001, NIST, GDPR). Document incidents, procedures, and technical findings clearly and accurately. Ensure timely managementand resolution of tickets, both internal/partner and third-party suppliers. Remain up to date with the latest security threats, trends, and technologies. Skill Requirements: Microsoft Defender Extended … Network Security: Understanding of TCP/IP, DNS, VPNs, firewalls, and packet analysis (e.g., Wireshark). Threat Intelligence: Use of platforms like MISP, Recorded Future, or ThreatConnect. Vulnerability Management: Experience with tools like Tenable Nessus, Qualys. Scripting &Automation: Proficiency in Python, PowerShell, or Bash for automating security tasks. Cloud Security: Knowledge of MS Azure. Privileged/Identity& AccessManagement (IAM): Understanding of RBAC, MFA, SSO, and directory services (e.g., Active Directory, Azure AD). Log Analysis &Forensics: Ability to analyse logs and artifacts from Windows, Linux, and cloud environments. Security Frameworks: Familiarity with MITRE ATT&CK, NIST CSF, CIS Controls. Preferred Qualifications: Industry certifications such as CompTIA CySA+, SSCP,CEH, GCIA More ❯
number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of the firm. Essential Duties and Responsibilities for this IT Security … security-by-design principles into development processes. Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect … such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with IdentityAccessandManagement (IDAM) solutions. CyberArk and ENTRA ID Familiarity with conditional/remote access toolsets. ENTRA, DUO SSO & MFA gateway. Good knowledge in Network (Routing and Switching, WAN More ❯
activities, ensuring tracking and reporting via AzureDevOps (ADO). Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccess … Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Key Responsibilities: Manage the Infrastructure and EUC change process, including identification, creation andmanagement of internal and external partner change. Ensuring maximum uptime and minimal operational impact to the business. Engage and support IT audit activities, through managementand collation … services to optimise efficiency, scalability, and security. Advocate for the adoption of automation, AI-driven security, and modern IT operations tools to enhance cloud performance. Ensure enforcement, reporting, andmanagement of vendor product lifecycles, for both legacy cloud assets and proposed cloud solutions. Provide support (technical and resource management) to the wider IT product teams. Vendor More ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Multi-Cloud Expertise: Architect and implement cloud-native solutions in Google Cloud (GCP) , leveraging services like EKS , GKE (Google Kubernetes) Design and optimise GCP Implement IdentityandAccessManagement (IAM) and Security Policies Work with Google Anthos, Kubernetes, and container-based architectures Optimise GCP cost and performance , ensuring efficiency across environments (Optional) Provide expertise … in AWS, Azure, and OCI when needed Kafka and Kubernetes Platform Management: Design, deploy, and maintain scalable Kafka and Kubernetes clusters to support development and production environments Implement best practices for Kafka and Kubernetes operations , ensuring high availability, performance, and security Monitor, troubleshoot, and optimize Kafka and Kubernetes infrastructure to meet development team needs Implementation: Implement cloud infrastructure … on experience with DevOps tools (e.g., GitLab, Jenkins, ArgoCD ) and Infrastructure-as-Code (IaC) (e.g., Terraform, Ansible ) Experience with CI/CD pipelines (Jenkins, GitLab CI, ArgoCD) and source control management (Git) Strong scripting skills (e.g., Bash, Shell, PowerShell, Python ) Experience in automating infrastructure deployment using IaC tools such as Terraform, CloudFormation, and ARM templates Experience with Agile More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk managementand incident response programmes. What you will do The IdentityandAccess Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identityandaccessmanagement (IAM … issues of non-compliance related to PAM, IAM and IGA policies and processes. Leadership & Team Development Provide leadership and structured mentorship to a team of identityandaccessmanagement staff, supporting their technical development, training & certifications, and career progression. Oversee the design andmanagement of the on-call support structure, ensuring appropriate … working with Microsoft identity products, namely Active Directory and Entra ID. Extensive experience working in architecture or information security, with a significant focuson identityandaccess management. Current Azure certifications (e.g., Azure Security Engineer Associate). Strong knowledge of security and compliance standards and frameworks, such as ISO27001, MS CAF, and WAF. Excellent communication More ❯
IdentityandAccessManagement Consultant - London Security Delivery Senior Analyst Early Career Full time IdentityandAccessManagement Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically … live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identityandaccess governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG … applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identityandaccessmanagementand recommend mitigation strategies. Implement and maintain audit trails and reporting mechanisms to track accessandidentity-related activities. Stakeholder Collaboration More ❯
industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. • Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. • Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). • Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. • Oversee endpoint security, cloud network and API security for robust protection across all assets • Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience • Microsoft Azure Infrastructure design and administration, including topology More ❯
Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating … environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security … PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning and budgeting. Follow change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge More ❯
have experience with: Basic/Essential Qualifications: Proven track record of stakeholder management. Proven ability to deliver timely high quality analytical work in a relatively unsupervised environment. Technical andmanagement experience (operational leadership or within an audit/control function) covering Technology Infrastructure, Cyber Security or Resilience. Experience of one or more of the following areas: cloud technologies … incident response, vulnerability management, threat management, information risk management, data leakage protection, identity & accessmanagement, technology areas includes Unix/Linux, Windows, Databases, or Middleware storage technologies or Networks. Additionally, ITIL service management processes including Incident, Problem and Change, Data Backup and Recovery. Knowledge of new … to and background knowledge of IT Architecture. Programme/Project delivery experience (including: agile, waterfall and SDLC) or exposure to auditing major programmes and projects. Supplier/Vendor management experience or exposure to auditing third parties or outsourcers. Experience of Cloud delivery, security and deployment models for IaaS, PaaS and SaaS provided by Amazon Web Service, Microsoft Azure More ❯
Bexhill-On-Sea, East Sussex, South East, United Kingdom Hybrid / WFH Options
Hastings Direct
developing comprehensive remediation strategies. Your responsibilities will include maintaining detailed documentation on security architecture, patterns, and practices, advising on critical aspects such as data protection, identityandaccessmanagement, network security, and incident response within Azure. Staying abreast of the latest Azure security capabilities, threats, vulnerabilities, and industry trends will be essential. You will … of Azure services and security features (e.g., NSGs, Private Endpoints, Azure Firewall, Conditional Access). Experience with Azure AD, role-based access control (RBAC), andidentity federation. Strong understanding of network and application security principles. Familiarity with Infrastructure-as-Code (e.g., Bicep, ARM templates, Terraform). Hands-on experience with SIEM tools, ideally Azure … proud to provide you with an AWARD WINNING package which includes - discounts and cashback at everyday retailers and on our own products, fee free independent mortgage advice, and free access to financial wellbeing support. Mental Wellbeing programme - At Hastings Direct we understand that mental health cannot not be scheduled, that's why we have a range of support More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, andaccess controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identityandaccessmanagement (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged AccessManagement (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO … NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all assets Define, manage and maintain accurate DR and BCP plans for the infrastructure area with biannual tests. Technical Experience Microsoft Azure Infrastructure design and administration, including topology More ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
NCSC, NPSA), monitoring threat intelligence and security guidance. Operational Security & Risk Management Lead the design, implementation, and monitoring of controls across endpoint security, identityandaccessmanagement, and cloud infrastructure (e.g., AWS). Own and improve the incident response framework, including active participation in investigations, post-incident reviews, and business continuity planning. … Run regular tabletop exercises and scenario testing to ensure operational preparedness for cyber-attacks and disruptions. Support secure architecture and infrastructure reviews across projects and services. Risk Management & Security Engineering Conduct and lead structured technical and procedural risk assessments, including threat modelling and security reviews for new projects or systems. Collaborate with IT and engineering teams to identify … address, and continuously improve security control effectiveness. Oversee the management of external security assessments and ensure remediation plans are executed effectively. Maintain relevant security certifications such as Cyber Essentials/Plus and support the business in aligning with broader security frameworks (e.g., NIST CSF, CIS Controls). Awareness & Security Culture Lead internal training, briefings and onboarding sessions to More ❯
IdentityandAccessManagement Engineer page is loaded IdentityandAccessManagement Engineer Apply locations Cambridge, United Kingdom London Cannon Street time type Full time posted on Posted Yesterday job requisition id R010889 AVEVA is creating software trusted by over 90% of leading industrial companies. Job Title: IdentityandAccessManagement Engineer Location: Cambridge/London Employment Type: Full Time (Hybrid) The job AVEVA are looking for an IdentityandAccessManagement (IDAM) focused Engineer with a strong background in engineering hybrid Windows platforms to join our growing team. The AVEVA IT team is dedicated to … and hiring process, please notify your recruiter. Determinations on requests for reasonable accommodation will be made on a case-by-case basis. Similar Jobs (1) IdentityandAccessManagement Senior Manager locations 2 Locations time type Full time posted on Posted 30+ Days Ago AVEVA is a global leader in industrial software. Our cutting More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential: Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. NOTE: Applicants must … per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
occasional out-of-hours support for critical activities or urgent issues, including support for our Canadian team outside regular UK hours (rota or flexible arrangement available) Systems & Device Management Diagnose and resolve technical issues related to hardware, software, and networking. Support lifecycle management of devices: laptops (HP, Dell, Surface), MacBooks, iOS/Android devices, and peripherals. … optimize Microsoft 365 services. Support IT projects such as hardware/software upgrades and installations. Identity, Access & Security Implement and maintain identityandaccessmanagement solutions, including SSO, Conditional Access, and SCIM integrations. Conduct vulnerability management, patching, and endpoint protection aligned with ISO 27001, SOC … to mentoring and supporting junior team members in their professional growth. Willingness to assist with physical office setups, relocations, and related logistical IT tasks. Valid UK driving license andaccess to a personal vehicle. Experience in hardware and software asset lifecycle management, including procurement, tracking, and disposal. What makes you stand out: Experience supporting complex IT More ❯