Identity & AccessManagement Engineer - IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune Our global law firm client are actively looking to take on a new Identity & AccessManagement Engineer (IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune) to join their team on a permanent basis. This role will specialise in the design … culture with a great deal of convenient services including breakfasts and lunches as well as an extensive amount of social events. This Identity & AccessManagement Engineer (IAM, PAM, MFA, Azure, Entra, Active Directory, RBAC, PIM, Intune) will perform and require the following: Duties: Will assist in the administration, maintenance, and day-to-day operation of firms IAM, directory … management and security. Experience with Microsoft Azure/Entra, roles, RBAC and PIM. Experience with M365, Intune and related technologies. Experience with PrivilegedAccessManagement (PAM) technologies such as Delinea (preferred), CyberArk, etc. Experience with Identity Governance Tools. Veza preferred. Experienced level of understanding of Identity & AccessManagement, Single Sign-On, Multi-Factor Authentication More ❯
Warwickshire, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
PAM Technical Project Manager Utilities Predominantly remote: Occasional travel to Warwick 6 months+ Day rate contract In short: We’re implementing new and heavily regulated controls across our PrivilegedAccessManagement solution and we need a strong technical PM who can drive the inner workings of this project. You will be delivering across BAU, Programmes and Vendors … so having solid examples of multi-faceted technical delivery is essential. Please only apply if you have delivered a PAM implementation. In full: We’re seeking a Project Manager specialising in PrivilegedAccessManagement (PAM) solutions and technologies. In this role, you’ll oversee the planning, development, and execution of projects related to PAM tools, which safeguard … include managing project plans, collaborating with technical teams like engineering and security, engaging with customers and stakeholders, and ensuring product features meet complex security requirements. Key Aspects of the PAM Technical PM Role: Product/Project Lifecycle: You’ll guide the entire lifecycle of a PAM product or project, from initial discovery and planning to launch and iteration. Technical Expertise More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom Hybrid/Remote Options
Adroit People Limited (UK)
Greetings Greetings We are Hiring Lead Security Solution Architect(Privilege Password Management CyberArk ) Position in UK - Sheffield -JC: 106885 Client is looking for someone with strong ITSM knowledge Privilege Password Management CyberArk . Job Description Location: UK - Sheffield (Hybrid) Hybrid Model Job Profile – Lead Security Solution Architect Project Overview Client is working on a strategic Identity and AccessManagement programme and is re-shaping the way Authentication, Federation, PrivilegedAccessManagement, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privilegedaccess for the Group and introducing the strategic password vaulting solution that will enable to meet … cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working with PAM solutions such as CyberArk, Centrify, Delinea and OneIdentity Preparing end-to-end configuration of the strategic PAM capability – including on-prem deployments as well as Cloud native toolings Qualifications & Certifications More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
Lead Security Solution Architect Project Overview Client is working on a strategic Identity and AccessManagement programme and is re-shaping the way Authentication, Federation, PrivilegedAccessManagement, Access Governance, Secrets Management and API Security is done across the bank. Client is working on uplifting controls and capabilities in privilegedaccess … as subject matter expert. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement … cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Experience working with PAM solutions such as CyberArk, Centrify, Delinea and OneIdentity Preparing end-to-end configuration of the strategic PAM capability – including on-prem deployments as well as Cloud native toolings Qualifications & Certifications More ❯
Warwick, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
IAM Technical Analyst/BA (IGA) Utilities Predominantly remote: Occasional travel to Warwick 6 months+ In short: We’re implementing new and heavily regulated controls across our Identity and AccessManagement solution and we need a strong IAM Technical BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes … deep IAM/IGA skills. In full: An IAM Technical BA acts as a vital link between business needs and technical solutions in the complex domain of Identity and AccessManagement (IAM). This role involves analysing and documenting user identity, access, and entitlement requirements, designing and improving IAM frameworks, and ensuring solutions meet both business objectives … processes and systems. Required Skills: IAM Expertise: Strong understanding of core IAM concepts, IAM controls, including identity lifecycle management, authentication, authorisation, and privilegedaccessmanagement (PAM). Cloud Platform Knowledge: Practical knowledge of cloud-based IAM services in AWS, Azure, and GCP. Stakeholder Management: Excellent communication and interpersonal skills to effectively manage relationships with technical More ❯
Identity AccessManagement and Digital Trust Lead Are you a strategic thinker with a passion for securing critical information and empowering organisations through cutting-edge identity access solutions? We are seeking an experienced, dynamic IAM Lead to spearhead enterprise-wide identity and accessmanagement initiatives. This pivotal role offers the opportunity to lead a talented … excellence, innovation, and leadership, this is your chance to elevate your career to the next level. What You'll Bring to the Table Required Skills: Deep expertise in Identity AccessManagement frameworks, policies, and standards Hands-on experience with IAM technologies such as Microsoft Entra ID, Privilege Manager, and similar solutions Strong understanding of access controls, user … provisioning, de-provisioning, and privilegedaccessmanagement Proficiency in implementing and managing security policies aligned with industry standards like ISO 27001, NIST, GDPR Exceptional stakeholder management and communication skills Proven ability to manage third-party vendors, define SOWs, and oversee service delivery Ability to analyse access-related risks and respond effectively during security incidents Experience More ❯
Warwickshire, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
Lead PAM Business Analyst Utilities Predominantly remote: Occasional travel to Warwick 6 months+ Day rate contract In short: We’re implementing new and heavily regulated controls across our PrivilegedAccessManagement solution and we need a strong Lead PAM BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU … Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead Identity and AccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user access and identity within an organisation, often involving Identity Governance & Administration (IGA) and PrivilegedAccessManagement (PAMMore ❯
Identity AccessManagement and Digital Trust Lead Hybrid - Onsite 2 Days Are you a strategic thinker with a passion for securing critical information and empowering organizations through cutting-edge identity access solutions? We are seeking an experienced, dynamic IAM Lead to spearhead enterprise-wide identity and accessmanagement initiatives. This pivotal role offers the opportunity … excellence, innovation, and leadership, this is your chance to elevate your career to the next level. What You'll Bring to the Table Required Skills: Deep expertise in Identity AccessManagement frameworks, policies, and standards Hands-on experience with IAM technologies such as Microsoft Entra ID, Privilege Manager, and similar solutions Strong understanding of access controls, user … provisioning, de-provisioning, and privilegedaccessmanagement Proficiency in implementing and managing security policies aligned with industry standards like ISO 27001, NIST, GDPR Exceptional stakeholder management and communication skills Proven ability to manage third-party vendors, define SOWs, and oversee service delivery Ability to analyse access-related risks and respond effectively during security incidents Experience More ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & AccessManagement (IAM), and Data Loss Prevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal candidate will … combine deep technical expertise with strong leadership skills to shape the future of cybersecurity, identity, and data protection within the organization. This position is designated as a Senior Management Function (SMF) under the Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber … advanced analytics to improve detection, response, and resiliency. Identity & AccessManagement Own enterprise-wide IAM strategy, including workforce and customer identity, privilegedaccessmanagement (PAM), identity governance and administration (IGA), and multi-factor authentication (MFA). Lead initiatives to modernize and integrate IAM platforms to support cloud adoption, Zero Trust, and frictionless user experiences. Partner More ❯
PAM Consultant - London Please Note: Due to the nature of client work you will be undertaking, you will need to be willing to go through a Security Clearance process as part of this role, which requires 5+ years UK address history at the point of application. Accenture is a leading global professional services company, providing a broad range of services … impact we have with our clients and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a PAM Consultant, you will: Architect and Design PAM Solutions: Develop and implement a robust PrivilegedAccessManagement (PAM) architecture tailored to the organization’s needs, including policies, processes … and tools for managing privileged accounts and access. Implementation: Lead the deployment and configuration of PAM solutions, such as CyberArk, BeyondTrust, or other relevant technologies, ensuring they are properly integrated with existing IT infrastructure. Risk Assessment and Management: Conduct regular risk assessments related to privilegedaccess, identifying potential security risks and vulnerabilities, and developing mitigation strategies. More ❯
initial – Inside IR35 We are seeking a skilled Windows Engineer with strong hands-on experience across Active Directory environments. This role supports a critical security programme focused on RBAC, privilegedaccess, and secure identity controls. The ideal candidate will be proactive, dependable, and able to work collaboratively with senior SMEs. Role Overview: Job Title: Windows Security Specialist Location … days per week onsite (non-negotiable) Contract Type: Contract Duration: 12 months initial Sector: Banking AD Groups PowerShell scripting Building RBAC model, Group Policy, Add Priv. Groups Domain access segregation Creating and managing AD Objects Implementing least privilege Managing Group Policy inheritance and reference Integrating with tools such as CyberArk Managing Windows Server roles and features (especially AD DS … credential rotation policies Troubleshooting authentication and network connectivity issues How to onboard Windows accounts and configure CyberArk safes (nice to have) Understanding of privilegedaccessmanagement (PAM) concepts PowerShell scripting for onboarding, policy enforcement, and reporting Assist with design and build of RBAC infrastructure Knowledge of SericeNow service management system (incident and change management) Banking More ❯
and maintain the organization's information security strategy, policies, standards, and procedures in alignment with business objectives and regulatory requirements. Lead the development and implementation of an Information Security Management System (ISMS), based on ISO 27001 Conduct regular security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies. Stay up-to-date with the latest cybersecurity threats, trends, technologies … Oversee the day-to-day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection … environments (e.g., Azure, AWS, GCP), networks, servers, and endpoints. Manage access controls, identity management (e.g., Entra ID/Azure AD), and privilegedaccessmanagement (PAM) systems. Manage access control processes to 3rd party applications, and 3rd party relations. Oversee the patching and configuration management of all systems and applications to reduce the attack More ❯
Join us as Change Portfolio Director, IAM In this critical role, you'll be leading the Identity & AccessManagement (IAM) portfolio delivery team, across architecture, engineering, infrastructure and governance to deliver a multi-year IAM transformation programme encompassing Identity governance, machine identity, privilegedaccessmanagement and directory services We'll look to you to deliver … Change Portfolio Director, IAM, you'll plan and deliver transformation programmes of work. You'll be responsible for cohesive demand forecasting across the assigned portfolio to enable effective resource management in order to meet a committed and baselined plan of record. We'll look to you to lead the direction on, and team oversight of, working relationships with key … business stakeholders and senior management to support the understanding of the businesses risk appetite with respect to the technology service provision. Your role will also involve: Accountability for the delivery of large transformational change along with defining and maintaining a multi-year IAM delivery roadmap Overseeing multiple projects within the change programme and ensuring effective quality assurance and the More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
Security Operations & Detections team at one of the UK’s leading retail organisations. You’ll play a key role in protecting their mainframe environments by supporting security initiatives, maintaining access controls, and responding to security alerts. Working closely with colleagues across Technology and the wider business, you’ll help ensure their mainframe platforms remain secure, resilient, and well-controlled. … Monitoring daily tasks and controls to maintain operational efficiency. Responding to mainframe security alerts. Administering RACF Role-Based Access Control (RBAC) and PrivilegedAccessManagement (PAM) systems. Managing access recertification with data owners. Creating and maintaining internal documentation, including runbooks, processes, and procedures. Supporting audit evidence and remediation activities. Assisting with incidents, investigations, and projects … related to mainframe security. Recommending access rules and performing analysis, design, and testing of new or enhanced security functionality. Monitoring and maintaining RACF digital certificates. Supporting the installation of new applications within RACF and assisting with migrations of existing applications. What you’ll bring Extensive specialist knowledge of RACF/z/OS and related mainframe components. Strong understanding More ❯
Engineering, or related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: Identity and AccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) PrivilegedAccessManagement principles knowledge and experience Multi Factor More ❯
Security Stack and other leading security tools. Familiarity with network and application firewalls. Working knowledge of security frameworks such as ISO27001, NIST, SOC2, and Cyber Essentials Plus. Experience with PrivilegedAccessManagement tools (e.g., CyberArk, Entra, SailPoint). Ability to quickly learn and adapt to new security tools and technologies. More ❯
Security Stack and other leading security tools. Familiarity with network and application firewalls. Working knowledge of security frameworks such as ISO27001, NIST, SOC2, and Cyber Essentials Plus. Experience with PrivilegedAccessManagement tools (e.g., CyberArk, Entra, SailPoint). Ability to quickly learn and adapt to new security tools and technologies. Please be aware this advert will remain More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Tate Milton Keynes
Security Stack and other leading security tools. Familiarity with network and application firewalls. Working knowledge of security frameworks such as ISO27001, NIST, SOC2, and Cyber Essentials Plus. Experience with PrivilegedAccessManagement tools (e.g., CyberArk, Entra, SailPoint). Ability to quickly learn and adapt to new security tools and technologies. Please be aware this advert will remain More ❯
Employment Type: Full-Time
Salary: £50,000 - £60,000 per annum, Negotiable, Inc benefits, OTE
is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, and identity management best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation, storage, and usage across … closely with developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust Identity and AccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across teams and … outcomes and strengthen security posture. Key Skills and Experience To excel in this role, candidates should demonstrate: Proven expertise in CyberArk operations and implementation, with strong technical understanding of privilegedaccess management. Hands-on experience in developing and configuring CyberArk plugins and PSM connectors to manage credentials across diverse applications. Strong knowledge of information security principles, controls, and More ❯
Posted:
Salary Guide
Privileged Access Management the UK excluding London