Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
Help set up monitoring, alerting, and performance optimisation for cloud systems using tools like CloudWatch, Datadog, or Prometheus Security & Compliance : Support cloud security efforts, including identityandaccessmanagement, encryption, and compliance monitoring CI/CD Pipelines : Work with DevOps teams to automate build, test, and deployment workflows using tools like GitHub Actions, Jenkins More ❯