AD B2C.Solid full-stack development background (front-end + back-end integration).Proven experience designing and deploying external identity solutions for enterprise environments.Deep understanding of OAuth2, OpenID Connect, and SAML protocols.Knowledge of API security, custom policies, and user journey configuration.Excellent communication, problem-solving, and stakeholder management skills.Desirable:Experience with large-scale consumer or partner identity deployments.Familiarity with CI/CD More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
full-stack development background (front-end + back-end integration). Proven experience designing and deploying external identity solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable: Experience with large-scale consumer or partner identity deployments. Familiarity More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Configuration of Data Lake storage, ensuring security hardening. Compliance of backup and restoration. Integration of IAAS, PAAS and SAAS application with Microsoft Entra ID (AAD) for secure access through SAML SSO. Maintain the lifecycle of Enterprise Application and App registration certificate. Closely working With Security Architect and Team to adhere zero-trust architecture by securing server policy, group policy, defender More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
PL/SQL, Java, Python, Shell Scripting. Experience with data and reporting tools such as Oracle Analytics Cloud, Power BI, Tableau. Understanding of security and compliance standards including OAuth2, SAML, RBAC, encryption standards. We are proud to be a Disability Confident Committed employer. If you have a disability and would like to apply to one of our UK roles under More ❯
IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identity and access management systems Integrate IAM solutions with existing infrastructure and applications Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure More ❯
swindon, wiltshire, south west england, united kingdom
Stable
IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identity and access management systems Integrate IAM solutions with existing infrastructure and applications Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure More ❯
technical logic that enables agents to perform tasks like creating records, triggering notifications, and updating systems. Authentication and Security: Implement and manage secure authentication and authorization protocols (e.g., OAuth, SAML) to ensure that all agent actions are secure and comply with enterprise security policies. Data Flow and Transformation: Manage the real-time flow of data to and from the AI More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. • Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). • Experience with application security implementations and standard methodologies. • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯