2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
with PCI DSS, ISO 27001, and DORA standards Managing both on-prem and cloud infrastructure (Azure & AWS) Maintaining Active Directory, authentication solutions (SSO, SAML), and local networks (Dell servers and switches) Rolling out CI/CD pipelines, observability tooling, and leading on proactive system monitoring Supporting More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
access. For identities, we also include technical, shared, emergency, robotic, etc. Key Responsibilities: ·Develop and maintain IAM solutions, including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). ·Manage identity lifecycle processes, including provisioning, de-provisioning, and role-based More ❯
access. For identities, we also include technical, shared, emergency, robotic, etc. Key Responsibilities: ·Develop and maintain IAM solutions, including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM). ·Manage identity lifecycle processes, including provisioning, de-provisioning, and role-based More ❯
policies and security standards. Entra ID Integration: Implement and manage Entra ID solutions, including user provisioning, access management, and singlesign-on (SSO) configurations. Collaboration: Work with cross-functional teams including IT, security, and business units to support identity-related projects and initiatives. Documentation More ❯
Portsmouth, yorkshire and the humber, United Kingdom
TalentHawk
policies and security standards. Entra ID Integration: Implement and manage Entra ID solutions, including user provisioning, access management, and singlesign-on (SSO) configurations. Collaboration: Work with cross-functional teams including IT, security, and business units to support identity-related projects and initiatives. Documentation More ❯
Support the transition from on-prem Active Directory to Microsoft Entra ID Manage user provisioning, authentication, and singlesign-on (SSO) configurations Administer and configure Microsoft Intune for device and user policy management Collaborate with IT, security, and third-party providers to More ❯
Support the transition from on-prem Active Directory to Microsoft Entra ID Manage user provisioning, authentication, and singlesign-on (SSO) configurations Administer and configure Microsoft Intune for device and user policy management Collaborate with IT, security, and third-party providers to More ❯
principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯
principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
operations Financial markets and/or the financial technology sector experience Requirements Design and deployment of IAM solutions including SingleSign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) Development of scripts and automation tools for user account management and More ❯
systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication: Support secure authentication solutions like singlesign-on (SSO), multi-factor authentication (MFA), and identity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation and More ❯
configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Intec Select
configuration and advanced troubleshooting Group Policy Objects Quest Change Auditor/Quest Forest Recovery Manager Azure AD Connect Connectors, sync rules and metaverse queries SSO implementation via SAML and OAUTH PowerShell Automation and centralised management/script creation Multi-Factor Authentication configuration via MS Authenticator User Lifecycle Management Package More ❯