stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
Solid understanding of Identity Governance and Administration platforms (preferably One Identity) with extensive demonstrable recent experience in the field. Strong understanding of IAM concepts and protocols such as LDAP, SAML, OAuth, and OpenID Connect. Expertise in cross platform scripting (TSQL, Powershell, bash etc ) On premise and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
stack in both cloud and on-premises environments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
london (city of london), south east england, united kingdom
Hyerhub
develop a client IAM strategy Experience of working in professional services consulting, ideally experience with the ‘Big-4’ or similar Understanding of the following concepts/technologies: LDAP; FIDO; SAML; OAUTH; Active Directory; Linux; Databases (SQL/JDBC); Networking (including High Availability, Fault Tolerance, etc), Virtualisation technology Implementation and project methodologies (e.g. PRINCE2/AGILE More ❯
including Microsoft Entra Connect, Conditional Access, MFA, Microsoft Entra Roles, Azure PIM, Azure Subscription RBAC, and Access Policies for major Azure Services. o Authentication and Authorization protocols, both modern (SAML, OAuth, OIDC) and legacy (NTLM, Kerberos, basic) o Azure technologies like Azure Policy & Blueprints, Graph API, Azure Resource Management, Entra ID Health, Azure Security Center, etc. o IAM Integration and More ❯
the architecture supports scalability, security, modularity, and maintainability. Embed secure-by-design principles in the architecture (aligned with OWASP, ISO 27001, GDPR) and ensure authentication and authorization standards (OAuth2, SAML, OpenID Connect) are implemented consistently. Maintain up-to-date architecture diagrams, decision logs, and system documentation. Evaluate and select technologies, frameworks, and tools aligned with business goals and platform strategy. More ❯
clear, actionable operational tasks What we need from you: 4+ years' experience in IAM or cybersecurity leadership Hands-on expertise with IAM tools (Saviynt preferred) and authentication protocols (LDAP, SAML, OAuth) Cloud security experience (AWS, Azure, OCI) Knowledge of scripting/automation (PowerShell, Python) Relevant certifications desirable: CISSP, CISM, CompTIA Security+, Microsoft Identity Strong communication and stakeholder engagement skills If More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯
networking across a variety of environments and deployments. Knowledge of Identity and Access Management (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). Experience with application security implementations and standard methodologies. Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns More ❯