3 of 3 Permanent Identity Access Management Jobs in Wales

Cyber Security Architect

Hiring Organisation
Searchability (UK) Ltd
Location
Deeside, Flintshire, Wales, United Kingdom
Employment Type
Permanent, Work From Home
security architecture and embedding security by design across all IT and business change initiatives. You will lead the Security Engineering function, covering Identity & Access Management, Cloud Security, Threat Modelling, and Application Security. You'll work closely with both technical teams and senior business stakeholders … and mentor security professionals within the team. CYBER SECURITY ARCHITECT ESSENTIAL SKILLS Proven experience designing and implementing enterprise security architectures Strong expertise in Identity & Access Management principles and technologies Experience within predominantly Microsoft environments Cloud security expertise (Azure essential, AWS desirable) Threat modelling and ...

Site Reliability Engineer (Security Cleared)

Hiring Organisation
Profile 29
Location
Newport, UK
DevOps, cloud engineering, and automation with a focus on reliability, observability, and scalability. Youll also work with event-driven technologies, identity and access management, and data platforms, ensuring our orchestration solutions are resilient, secure, and future-ready. This is an exciting opportunity ...

Senior Data Engineer - £62,000 - Hybrid

Hiring Organisation
Hays Specialist Recruitment Limited
Location
Bridgend, Mid Glamorgan, Wales, United Kingdom
Employment Type
Full-Time
Salary
£55,000 - £62,000 per annum
data pipelines.Power BI & Reporting Foundation- Finalise a governed Power BI architecture, including standardised semantic models and dataflows;- Ensure robust Identity and Access Management (IAM) across Power BI workspaces, enabling true self-service analytics without compromising data privacy.Data Stewardship & Leadership- Proactively identify data and logic … Expert-level SQL and Python (ideally PySpark).- A strong understanding of DataSecOps; experience with PII handling, data obfuscation, and RBAC (Role-Based Access Control).- Proven ability to design data systems (preferably Medallion architectures).- Advanced knowledge of Power BI security and administration.- Familiarity with git and ...