environment Desirable Requirements: ▪ Familiarity with SQL, with the ability to understand schemas and write basic queries ▪ Understanding of authentication and authorisation protocols (OAuth2, OIDC, SAML), and the various flows available for different scenarios ▪ Familiarity with REST and gRPC APIs, event-driven architecture and microservice patterns This role is suited for More ❯
environment Desirable Requirements: ▪ Familiarity with SQL, with the ability to understand schemas and write basic queries ▪ Understanding of authentication and authorisation protocols (OAuth2, OIDC, SAML), and the various flows available for different scenarios ▪ Familiarity with REST and gRPC APIs, event-driven architecture and microservice patterns This role is suited for More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Roc Search
environment Desirable Requirements: ▪ Familiarity with SQL, with the ability to understand schemas and write basic queries ▪ Understanding of authentication and authorisation protocols (OAuth2, OIDC, SAML), and the various flows available for different scenarios ▪ Familiarity with REST and gRPC APIs, event-driven architecture and microservice patterns This role is suited for More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Roc Search
environment Desirable Requirements: ▪ Familiarity with SQL, with the ability to understand schemas and write basic queries ▪ Understanding of authentication and authorisation protocols (OAuth2, OIDC, SAML), and the various flows available for different scenarios ▪ Familiarity with REST and gRPC APIs, event-driven architecture and microservice patterns This role is suited for More ❯
architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and More ❯
architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and More ❯
architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and More ❯
architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and More ❯
aligned with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting annual audits and More ❯
aligned with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting annual audits and More ❯
aligned with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting annual audits and More ❯
Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD )Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect, LDAP, SCIM etc. )Experience with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex More ❯
Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD )Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect, LDAP, SCIM etc. )Experience with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex More ❯
Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD )Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect, LDAP, SCIM etc. )Experience with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex More ❯
Identity Governanc ePAM: CyberArk, BeyondTrust, Deline aSSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD )Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect, LDAP, SCIM etc. )Experience with cloud IAM in AWS, Azure or GCP .Hands-on experience designing and deploying IAM in large, complex More ❯
or GCP) and on-prem hybrid integrations. • Knowledge of event-driven architecture, messaging systems (Kafka, RabbitMQ, JMS), and ETL processes. • Experience with OAuth, JWT, SAML, and API security best practices. • Strong understanding of CI/CD tools (Jenkins, GitHub Actions, Azure DevOps, etc.). • Exposure to Salesforce • Excellent problem-solving More ❯
or GCP) and on-prem hybrid integrations. • Knowledge of event-driven architecture, messaging systems (Kafka, RabbitMQ, JMS), and ETL processes. • Experience with OAuth, JWT, SAML, and API security best practices. • Strong understanding of CI/CD tools (Jenkins, GitHub Actions, Azure DevOps, etc.). • Exposure to Salesforce • Excellent problem-solving More ❯
o Security Clearance o Hands-on experience with IAM platforms (Okta, Microsoft Entra ID, SailPoint, CyberArk, OneIdentity). o Understanding of authentication protocols (OAuth, SAML, Kerberos). o Familiarity with cloud IAM (AWS IAM, Azure AD, Google Cloud IAM). o Relevant certifications such as CISSP, Certified Identity and Access More ❯
o Security Clearance o Hands-on experience with IAM platforms (Okta, Microsoft Entra ID, SailPoint, CyberArk, OneIdentity). o Understanding of authentication protocols (OAuth, SAML, Kerberos). o Familiarity with cloud IAM (AWS IAM, Azure AD, Google Cloud IAM). o Relevant certifications such as CISSP, Certified Identity and Access More ❯
and experience of Agile development, tools, and methods Knowledge and experience of delivering AI-based solutions Knowledge of authentication and authorisation technologies, such as SAML, OAuth, OpenID Connect, Active Directory, ADFS, and LDAP. More ❯