SK10, Butley Town, Cheshire East, Cheshire, United Kingdom
Royal London
over 50 already, these new roles will enhance our capabilities as the threat landscape continues to evolve. We are seeking a highly skilled and experienced IdentityandAccessManagement Engineer to join our IAM team at Royal London, with a core skillset in Identity Governance Administration (IGA) solutions. As an IAM Engineer … and enforcement of security policies and procedures, as well as conducting regular security assessments and audits. Additionally, you will be responsible for troubleshooting and resolving identityandaccess-related issues. The ideal candidate will have a strong background in IAM, possess excellent problem-solving skills, and be a proactive and self-driven individual with a keen … lifecycle management, and governing Joiner, Mover, Leaver processes. Combined IT and security work experience with a broad range of exposure to IdentityandAccessManagement functions and experience designing and deploying IGA solutions at the enterprise level. Demonstrated successful implementation of security control frameworks and standards such as ISO More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Security Manager - Identity & Access Engineering Company: Royal London Group Job Title: Security Manager - Identity Engineering Contract Type: Permanent Location: Edinburgh or Alderley Edge Working style: Hybrid 50% home/office based Closing date: 7th July … to recruit an exciting role within our Security & Resilience function. This is an operationally focussed role which involves maintaining a high benchmark to assure colleagues only have appropriate access for their role, minimising the potential damage from cybersecurity incidents. The successful candidate shall be able to work with minimal guidance in the Identity & Access … practice, attending key conferences etc. and recommend. About Royal London We're the UK's largest mutual life, pensions and investment company, offering protection, long-term savings and asset management products and services. Our People Promise to our colleagues is that we will all work somewhere inclusive, responsible, enjoyable and fulfilling. This is underpinned by our Spirit of More ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
where it mattersmost . Connect to your opportunity As a Senior Manager, you will lead and oversee a variety of SAP Security, Governance, Risk, and Compliance (GRC) andIdentityAccessmanagement work for a portfolio of diversified clients in different industries where you will be required to lead and collaborate effectively. The ideal candidate … will have extensive experience with SAP Security architecture and implementation, SAP GRC solutions (Access Control, IdentityAccess Governance), and proven experience managing teams through complex SAP ERP Transformation engagements. You will demonstrate and develop your capabilities in the following areas: Apply problem solving and critical thinking to enable the identification of Technology and Risks … maintain robust accessmanagement policies and procedure for user provisioning, de-provisioning, and segregation of duties. Lead greenfield implementation project for SAP Security, GRC andIdentityaccess management. Work effectively in diverse team within an inclusive team culture where people are recognised for their contribution. Perform security risk assessment against NIS2 framework. More ❯
optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, IdentityandAccessManagement (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … agile squads, fostering cross-functional collaboration and consistency. Establish clear program plans, manage risks, and coordinate complex interdependencies. Align cyber security objectives with broader enterprise technology goals. Cyber Security andIdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with … outcomes aligned with security and compliance goals. The Person Experience Proven track record delivering large-scale cybersecurity-focused technical programs in a Senior TPM capacity. Significant experience managing Authentication andIdAM initiatives, preferably in regulated or enterprise environments. Strong background in agile software development within cloud platforms (AWS, Azure, or GCP). Familiarity with access provisioning, identityMore ❯
super guarantee. 25% off UWA full fee courses, discounted health insurance, and convenient on-campus childcare options. Incremental progression based on 12 months continuous service. IdentityandAccessManagement (IAM) Analyst Job no: 520876 Work type: Full Time Location: Crawley Categories: Information Technology Enhance access security andidentity governance in … plus 17% superannuation. About the area UWA IT enables excellence in teaching, learning, research, and operations by delivering reliable, secure digital services and platforms. The IdentityandAccessManagement (IAM) function supports robust security and user experience through lifecycle governance, access automation, and risk-based access controls. About the opportunity … access governance and role engineering, enabling effective access policies and compliance. Collaborate with cybersecurity and IT teams to refine access controls, policies, andidentity data reporting. About you Tertiary qualifications in Information Systems, Cybersecurity, or related discipline, or equivalent experience. Solid understanding of IAM principles including provisioning, access reviews, andMore ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
super guarantee. 25% off UWA full fee courses, discounted health insurance, and convenient on-campus childcare options. Incremental progression based on 12 months continuous service. IdentityandAccessManagement Engineer Job no: 520877 Work type: Full Time Location: Crawley Categories: Information Technology Develop secure, automated identity solutions to support UWA's digital … plus 17% superannuation. About the area UWA IT enables excellence in teaching, learning, research, and operations by delivering reliable, secure digital services and platforms. The IdentityandAccessManagement (IAM) function supports robust security and user experience through lifecycle governance, access automation, and risk-based access About the opportunity Support … access governance and role engineering, enabling effective access policies and compliance. Collaborate with cybersecurity and IT teams to refine access controls, policies, andidentity data reporting. About you Experience configuring identity governance systems, including Saviynt or similar. Strong scripting and automation skills (e.g., PowerShell, Python, SQL). Knowledge of hybrid More ❯
number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of the firm. Essential Duties and Responsibilities for this IT Security … security-by-design principles into development processes. Conduct reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect … such as SentinelOne, CrowdStrike and Defender. Demonstrated ability working with IT System Administration of Azure, Defender (ATP), M365 and Windows. Experience with IdentityAccessandManagement (IDAM) solutions. CyberArk and ENTRA ID Familiarity with conditional/remote access toolsets. ENTRA, DUO SSO & MFA gateway. Good knowledge in Network (Routing and Switching, WAN More ❯
to support comprehensive Cyber Security programs whilst optimising the operational performance and reliability of Infrastructure technologies? Then we need your expertise in controls and activities for the effective management of critical cyber security platforms. Are you skilled with Privilege Accessmanagement, Application Control and Data Loss Prevention solutions? The we need you to help … and showcase your knowledge of regulation standards, compliance and governance. Essential experience includes: Experience in configuring and managing PAM solutions in enterprise environments. Familiarity with identityandaccessmanagement (IAM) principles , including role-based access control (RBAC) and least privilege. Strong understanding of Application Control concepts, tools, and technologies (e.g., whitelisting, blacklisting … years+ experience in IT including circa 3 years in an operational environment Knowledge of best practices of IT security hardware and software, security suites, identityandaccessmanagement, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM More ❯
a Technical Solution Design and Delivery Engineer to work with one of our financial services clients. This is to work on high profile project regarding SSH keys discovery, managementand remediation across on-prem … and the Cloud.We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the IdentityandAccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management … access reconfiguration and operational handover. Deep expertise in Identityandaccessmanagement, Privileged accessmanagementand secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key More ❯
rate 📍 Location 🕒 Duartion: 6 months We’re working with a Cardiff based financial services organisation seeking a Technical Analyst to support a key project enhancing IdentityandAccessManagement (IAM) on their platform. Key Responsibilities: Support IdentityandAccessManagement (IAM) requirements across their financial platform. Analyse current … access roles and permissions; identify gaps and rationalisation opportunities. Support design and implementation of a new RBAC framework. Map legacy roles to new structures and assist in transition planning. Produce process documentation and support audit/compliance alignment. Requirements … Experience as a Technical/Business/Data Analyst in financial or regulated environments. Strong stakeholder engagement and documentation skills (Excel, Visio). Understanding of IdentityandAccessManagement (IAM) principles andaccess controls. Apply now for a quick chat More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
About the Role: We are seeking an experienced Identity & AccessManagement … Specialist with a strong background in designing, implementing and managing robust IAM strategies and solutions to safeguard our client's information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager this role is instrumental in maintaining a secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce accessMore ❯
M365 Identity Engineer DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry who require an M365 Identity Engineer to join the firm in Birmingham. Responsibilities: * Deliver third-line technical support for identity & access management. * Act as technical lead for identity & accessmanagement on projects. * Monitor for and identify, analyse, and resolve or remediate incidents and risks. * Keep track of upcoming changes in the product stack, including new or changed features and planned maintenance and raise accordingly. * Improve security posture including Microsoft Entra Secure Score. * Design and configure Conditional Access policies. * Configure and migrate single sign … Access, and self-service password reset. * Understanding of various authentication methods and 'Passwordless' authentication options. * Understanding of M365 admin role assignments, use of administrative units, and Privileged Identity Management. M365 Identity Engineer In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first More ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identityandaccessmanagement, data protection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry … emerging threats. Key Responsibilities : Cloud Architecture Design : Develop cloud-based solutions, integrating security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & AccessManagement : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. Data Protection & Encryption : Protect data at rest, in transit, and in use through … or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder managementand communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in More ❯
Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
AWD online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
AWD Online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. Essential: Proven experience in software testing, preferably within Privileged AccessManagement (PAM) or Identity & AccessManagement (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. … Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/ More ❯