full-stack development background (front-end + back-end integration). Proven experience designing and deploying external identity solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable : Experience with large-scale consumer or partner identity deployments. Familiarity More ❯
AD B2C.Solid full-stack development background (front-end + back-end integration).Proven experience designing and deploying external identity solutions for enterprise environments.Deep understanding of OAuth2, OpenID Connect, and SAML protocols.Knowledge of API security, custom policies, and user journey configuration.Excellent communication, problem-solving, and stakeholder management skills.Desirable:Experience with large-scale consumer or partner identity deployments.Familiarity with CI/CD More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
full-stack development background (front-end + back-end integration). Proven experience designing and deploying external identity solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable: Experience with large-scale consumer or partner identity deployments. Familiarity More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
PL/SQL, Java, Python, Shell Scripting. Experience with data and reporting tools such as Oracle Analytics Cloud, Power BI, Tableau. Understanding of security and compliance standards including OAuth2, SAML, RBAC, encryption standards. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of our UK roles under More ❯
managed identities, service principals, and Azure AD Connect for hybrid scenarios. Experience managing user provisioning/deprovisioning, conditional access policies, multi-factor authentication, Azure AD Application Proxy, federated authentication, SAML/OAuth integration, and implementing least-privilege access controls across Azure subscriptions and resources. Container Services - Working knowledge of Docker containerisation and Azure Kubernetes Service (AKS) for supporting containerised applications. More ❯
IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identity and access management systems Integrate IAM solutions with existing infrastructure and applications Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure More ❯
swindon, wiltshire, south west england, united kingdom
Stable
IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identity and access management systems Integrate IAM solutions with existing infrastructure and applications Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure More ❯
Required Skills & Experience Active DV clearance (Developed Vetting) – essential Proven experience in identity architecture within secure or classified environments Strong knowledge of IAM technologies: Azure AD, AD FS, LDAP, SAML, OAuth, OpenID Connect Familiarity with Zero Trust principles and secure enclave design Experience with identity governance tools (e.g., SailPoint, Saviynt) is a plus Excellent stakeholder engagement and communication skills Preferred More ❯
swindon, wiltshire, south west england, united kingdom
Stable
Required Skills & Experience Active DV clearance (Developed Vetting) – essential Proven experience in identity architecture within secure or classified environments Strong knowledge of IAM technologies: Azure AD, AD FS, LDAP, SAML, OAuth, OpenID Connect Familiarity with Zero Trust principles and secure enclave design Experience with identity governance tools (e.g., SailPoint, Saviynt) is a plus Excellent stakeholder engagement and communication skills Preferred More ❯
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
london (city of london), south east england, united kingdom
Bestman Solutions
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
and Zero Trust principles. Proven ability to manage SSO, MFA, and hybrid identity integrations. Automation skills using PowerShell, Graph API, or similar scripting tools. Working knowledge of authentication protocols (SAML, OAuth, OpenID Connect). More ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Your Profile Essential skills/knowledge/experience: Previous experience in a cybersecurity role, with a strong focus on Microsoft securityMore ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯
Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication protocols, including SAML, OAuth, OIDC, and SCIM for application and service provisioning. Secure Bring Your Own Device (BYOD) and other device access by implementing device-based access policies and configurations. Your Profile Essential More ❯