sit within a Cybersecurity programme, so previous experience of working within similar programmes is advantageous. For the senior role experience delivering projects with Identityaccessmanagement is key. What you’ll be doing Working on a range of Projects that deliver business and technical … gained by working on multiple projects. Experience of successfully delivering Business Analysis and readiness work across the project lifecycle including: requirements gathering, stakeholder management, use cases, Business Impact assessments, process mapping as is & To be, creating and delivering communications & training plans, creation of support models & operating models and … Accessmanagement including; Identity & Accessmanagement, Privileged accessmanagementandIdentity Governance Administration. Experience/exposure to standard industry tooling e.g. CyberArk for PAM, SailPoint/Savyint for IGA spanning on premise and cloud More ❯
sit within a Cybersecurity programme, so previous experience of working within similar programmes is advantageous. For the senior role experience delivering projects with Identityaccessmanagement is key. What you’ll be doing Working on a range of Projects that deliver business and technical … gained by working on multiple projects. Experience of successfully delivering Business Analysis and readiness work across the project lifecycle including: requirements gathering, stakeholder management, use cases, Business Impact assessments, process mapping as is & To be, creating and delivering communications & training plans, creation of support models & operating models and … Accessmanagement including; Identity & Accessmanagement, Privileged accessmanagementandIdentity Governance Administration. Experience/exposure to standard industry tooling e.g. CyberArk for PAM, SailPoint/Savyint for IGA spanning on premise and cloud More ❯
Microsoft 365 security tools and services, including the Microsoft Defender suite, Microsoft Purview, and Microsoft Entra ID. Strong expertise in identityandaccessmanagement concepts, including role-based access, conditional access, and multifactor authentication. Solid understanding of regulatory and compliance … compliance centres, PowerShell scripting, and relevant automation techniques. Industry-recognised certifications highly desirable, particularly: SC-100 (Cybersecurity Architect), SC-300 (IdentityandAccess Administrator), MS-500 (Security Administrator), and AZ-500 (Security Engineer Associate). Disclaimer: This vacancy is being advertised by either Advanced Resource Managers … Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged IdentityManagement (PIM) Provide security input and guidance on identityandaccessmanagement, conditional access … security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, accessmanagement, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security and compliance portals, PowerShell scripting, and … Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena More ❯
features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged IdentityManagement (PIM) Provide security input and guidance on identityandaccessmanagement, conditional access … security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, accessmanagement, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security and compliance portals, PowerShell scripting, andMore ❯
features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience of implementing MS Privileged IdentityManagement (PIM) Provide security input and guidance on identityandaccessmanagement, conditional access … security technologies, including Defender suite, Purview, and Entra ID. Strong understanding of identity, accessmanagement, and conditional access controls. Familiarity with regulatory and compliance frameworks such as GDPR, HIPAA, and ISO 27001. Proficient with Microsoft security and compliance portals, PowerShell scripting, andMore ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk, outsourcing compliance, andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct …/third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools. Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews. Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST frameworks More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk, outsourcing compliance, andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Compliance & Security: Advise on vulnerability management, endpoint security (EDR/XDR), and cloud compliance. Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct …/third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools. Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews. Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST frameworks More ❯
manage Azure Virtual Machines and cloud-based workloads and integrations with cloud-based solutions. To administer Azure Active Directory for identityandaccessmanagementand associated MFA and privileged accessmanagement security solutions. Integrating on-premises infrastructure with Azure and … and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the implementation andmanagement of CyberSecurity controls Including compliance and a standards-based approach to systems implementation and management. Working to develop and maintain the CyberSecurity documentation … Power Automate. Understanding of networking systems, including TCP/IP, routers, firewalls, and VPNs. Experience with SQL Experience of supporting identityandaccessmanagement solutions. Knowledge of backup solutions, disaster recovery, and high-availability configurations. Familiarity with security best practices and compliance frameworks, including More ❯
manage Azure Virtual Machines and cloud-based workloads and integrations with cloud-based solutions. To administer Azure Active Directory for identityandaccessmanagementand associated MFA and privileged accessmanagement security solutions. Integrating on-premises infrastructure with Azure and … and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the implementation andmanagement of CyberSecurity controls Including compliance and a standards-based approach to systems implementation and management. Working to develop and maintain the CyberSecurity documentation … Power Automate. Understanding of networking systems, including TCP/IP, routers, firewalls, and VPNs. Experience with SQL Experience of supporting identityandaccessmanagement solutions. Knowledge of backup solutions, disaster recovery, and high-availability configurations. Familiarity with security best practices and compliance frameworks, including More ❯
bedford, east anglia, United Kingdom Hybrid / WFH Options
Tilo Consulting
Microsoft Technologies Location: Fully Remote (UK-based candidates only) Our client is seeking a Solutions Architect with deep expertise in IdentityandAccessManagement (IAM) , particularly within Microsoft Entra and its associated ecosystem (including Entra ID , Azure AD , and Active Directory ). This is … designing, and implementing enterprise-wide IAM solutions that align with business and compliance needs. Proficient in Microsoft Entra ID , Azure Active Directory , and hybrid identity environments. Skilled in managing full project lifecycles—from initial concept through to deployment, integration, and user enablement. Strong understanding of identity governance , conditional access , and Zero Trust principles . Excellent communication and stakeholder management skills. 🛠️ Desirable Experience: Microsoft certifications Familiarity with other IAM platforms such as MicroFocus NetIQ or IBM IAM . Experience working in cloud-first or hybrid enterprise environments . Ability to influence More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Tilo Consulting
Microsoft Technologies Location: Fully Remote (UK-based candidates only) Our client is seeking a Solutions Architect with deep expertise in IdentityandAccessManagement (IAM) , particularly within Microsoft Entra and its associated ecosystem (including Entra ID , Azure AD , and Active Directory ). This is … designing, and implementing enterprise-wide IAM solutions that align with business and compliance needs. Proficient in Microsoft Entra ID , Azure Active Directory , and hybrid identity environments. Skilled in managing full project lifecycles—from initial concept through to deployment, integration, and user enablement. Strong understanding of identity governance , conditional access , and Zero Trust principles . Excellent communication and stakeholder management skills. 🛠️ Desirable Experience: Microsoft certifications Familiarity with other IAM platforms such as MicroFocus NetIQ or IBM IAM . Experience working in cloud-first or hybrid enterprise environments . Ability to influence More ❯
a pivotal role in our Cyber Security Programme . This is a critical contract role focused on delivering technical and business change across Identity & AccessManagement (IAM) and Privileged AccessManagement (PAM) . 🔍 Key Responsibilities: Lead end-to-end business More ❯
a pivotal role in our Cyber Security Programme . This is a critical contract role focused on delivering technical and business change across Identity & AccessManagement (IAM) and Privileged AccessManagement (PAM) . 🔍 Key Responsibilities: Lead end-to-end business More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
ARM
infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identityandaccessmanagement, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identityandaccessmanagement (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation … Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena More ❯
Luton, England, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identityandaccessmanagement, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identityandaccessmanagement (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation More ❯
Luton, south east england, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identityandaccessmanagement, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identityandaccessmanagement (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation More ❯
Luton, south west england, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identityandaccessmanagement, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identityandaccessmanagement (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
infrastructure, network, cloud, and application teams to embed security by design in the migration process Oversee security tool integration, including identityandaccessmanagement, logging/monitoring (SIEM), encryption, and vulnerability management Your skillset may include: Proven experience as a Security Architect … cloud security tools and services (e.g., Azure Security Center, AWS Security Hub, Microsoft Defender Suite, Zscaler etc.) Solid knowledge of identityandaccessmanagement (IAM), encryption, network security, and secure workload migration Experience with security governance, risk, and compliance in regulated environments Strong documentation More ❯
DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, accessmanagement, data protection, device management, and threat protection within the M365 ecosystem. Collaborate with stakeholders across IT … regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC, and privileged access management. Proficiency with automation and scripting (e.g., PowerShell, Microsoft Graph API) for configuration and monitoring. Microsoft certifications such as SC-100 (Cybersecurity Architect More ❯
DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, accessmanagement, data protection, device management, and threat protection within the M365 ecosystem. Collaborate with stakeholders across IT … regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC, and privileged access management. Proficiency with automation and scripting (e.g., PowerShell, Microsoft Graph API) for configuration and monitoring. Microsoft certifications such as SC-100 (Cybersecurity Architect More ❯
DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, accessmanagement, data protection, device management, and threat protection within the M365 ecosystem. Collaborate with stakeholders across IT … regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC, and privileged access management. Proficiency with automation and scripting (e.g., PowerShell, Microsoft Graph API) for configuration and monitoring. Microsoft certifications such as SC-100 (Cybersecurity Architect More ❯
DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, accessmanagement, data protection, device management, and threat protection within the M365 ecosystem. Collaborate with stakeholders across IT … regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC, and privileged access management. Proficiency with automation and scripting (e.g., PowerShell, Microsoft Graph API) for configuration and monitoring. Microsoft certifications such as SC-100 (Cybersecurity Architect More ❯
bedford, east anglia, United Kingdom Hybrid / WFH Options
GIOS Technology
Role Title: Identity verification Business Analyst Location: Northampton, UK(Hybrid … Role Description: A digital identity verification Business Analyst needs a mix of technical and soft skills to effectively analyze, implement, and optimize digital identity verification processes. They should possess strong analytical, problem-solving, and communication skills, along with knowledge of relevant technologies and security concepts. Technical … analyze large datasets, identify trends, and use data to inform decision-making. • Proficiency in SQL for database querying and manipulation. • IdentityandAccessManagement (IAM) Concepts: Understanding of directory services, identity lifecycle management, and privilege management. • Familiarity with technologies like More ❯
luton, bedfordshire, east anglia, United Kingdom Hybrid / WFH Options
GIOS Technology
Role Title: Identity verification Business Analyst Location: Northampton, UK(Hybrid … Role Description: A digital identity verification Business Analyst needs a mix of technical and soft skills to effectively analyze, implement, and optimize digital identity verification processes. They should possess strong analytical, problem-solving, and communication skills, along with knowledge of relevant technologies and security concepts. Technical … analyze large datasets, identify trends, and use data to inform decision-making. • Proficiency in SQL for database querying and manipulation. • IdentityandAccessManagement (IAM) Concepts: Understanding of directory services, identity lifecycle management, and privilege management. • Familiarity with technologies like More ❯