with a globally respected investment manager known for its rigorous risk discipline and advanced technical stack, seeking a Security Engineer to play a hands-on role in strengthening identity, access, and cloud security infrastructure. This is a rare opportunity to join a close-knit, London … based team with direct ownership over security tooling, architecture and operations - all within a fast-paced, high-stakes trading environment... Key Responsibilities Take ownership of IdentityandAccessManagement (IAM) platforms, including Entra ID (Azure AD), ensuring secure accessand role governance across systems Design and implement security controls for hybrid cloud … security engineering, ideally within financial services or another regulated sector Proven expertise in IAM technologies - particularly Microsoft Entra ID/Azure AD, MFA, Conditional Access, and related policy management Strong familiarity with public cloud security controls across Azure and AWS Working knowledge of networking concepts and how they intersect with modern security architectures Exposure to automation More ❯
threats across hybrid environments. Managing and enhancing security configurations for Windows VMs, SQL databases, and PaaS solutions like Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. … Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identityandaccessmanagement (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and existing solutions. Managing third parties delivering … IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with IdentityandAccessManagement (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems to adhere to security guidelines proactively and reactively. What More ❯
threats across hybrid environments. Managing and enhancing security configurations for Windows VMs, SQL databases, and PaaS solutions like Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. … Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identityandaccessmanagement (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and existing solutions. Managing third parties delivering … IaC). Strong understanding of compliance frameworks (ISO 27001, NIST, CIS Benchmarks, GDPR). Experience in threat detection, incident response, and forensic analysis. Familiarity with IdentityandAccessManagement (IAM) principles, Azure AD, and MFA. Experience working in a DevSecOps environment and improving IT systems to adhere to security guidelines proactively and reactively. Job More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Searchability®
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
and hybrid cloud integrations. To manage Azure Virtual Machines and cloud-based workloads and integrations with cloud-based solutions. To administer Azure Active Directory for identityandaccessmanagementand associated MFA and privileged accessmanagement security solutions. Integrating on-premises infrastructure with Azure and other federated services in a … ensure compliance with industry standards and company policies. Maintain system logs and documentation for compliance reporting. Supporting the groups PCI-DSS and GDPR compliance. Leading on the implementation andmanagement of CyberSecurity controls Including compliance and a standards-based approach to systems implementation and management. Working to develop and maintain the CyberSecurity documentation, including appropriate procedures, standards and … Proficiency in PowerShell scripting and Power Automate. Understanding of networking systems, including TCP/IP, routers, firewalls, and VPNs. Experience with SQL Experience of supporting identityandaccessmanagement solutions. Knowledge of backup solutions, disaster recovery, and high-availability configurations. Familiarity with security best practices and compliance frameworks, including PCI-DSS and GDPR. Strong More ❯
Social network you want to login/join with: Identity & AccessManagement/IAM Operations Manager, london (city of london) col-narrow-left Client: Harrington Starr Location: london (city of london), United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 16.06.2025 Expiry Date: 31.07.2025 col-wide … services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Reporting and documentation – user access policies and audit logs Cross team collaboration – technology, security and group risk. More ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
and engineers within infrastructure, network, application and business teams to ensure that solutions are developed and managed as per GCIS policies and standards Advise on identityandaccessmanagement using Azure AD, RBAC, and conditional access. Support compliance efforts (e.g., ISO 27001, SOC 2, GDPR). Solid knowledge and experience in enterprise architecture frameworks … not discriminate on the basis of race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression. We celebrate diversity and are committed to create inclusive working environments for all our clients. More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
components have access to the correct resources at the appropriate time, while preventing unauthorised accessand maintaining a secure environment. The IdentityandAccess Manager role heads up this crucial security function within the Cyber Security Team and will Lead strategic development and operational management of identity services. … Develop and manage identityandaccess related tooling and processes to ensure mature, efficient, and secure working practices. Be an advocate for best practices in IdentityandAccess Management. Ensure compliance and risk management standards are met. Main Responsibilities: Lead the IdentityandAccess function within … regular MI and reporting on the current state of identity related risks and controls, whilst managing a programme of work to continually reduce identityandaccess risks. Keep abreast of emerging and developing security threats, tactics and techniques. Helping the senior leadership team understand potential security problems including those that might arise from acquisitions More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
Manager to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity andIdentity & AccessManagement (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing … with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder managementand experience in matrixed environments. Proficiency in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Develop and enforce security policies, standards, and guidelines. Collaborate with the Compliance Manager/CISO to ensure adherence to regulatory requirements (e.g., GDPR, ISO 27001). Incident Response andManagement: Establish and maintain incident response plans and procedures. Lead technical response efforts during security incidents or breaches. Conduct post-incident analyses to prevent future occurrences. Collaboration: Promote a … tools like SIEM/SOAR (preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identityandaccessmanagement, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or DevSecOps methodologies. Please click APPLY More ❯
col-wide Job Description: Robert Half Technology are assisting a global retail organisation to recruit a IAM Consultant/Engineer to design, implement, and maintain IdentityandAccessManagement solutions using One Identity Manager and Safeguard . You will play a key role in managing identity life cycles, role-based … regulatory requirements. Role Design & Implementation : Architect and deploy IAM solutions with One Identity Manager , focusing on user provisioning, de-provisioning, role-based access control, andidentity life cycle management. Safeguard Administration : Implement and maintain One Identity Safeguard to manage privileged access, including session monitoring, password vaulting, and secure access … integrate One Identity with systems such as Active Directory, LDAP, SQL databases, and cloud services . User Life Cycle Management : Oversee onboarding, offboarding, and regular access reviews, ensuring alignment with security and compliance requirements. Access Governance & Compliance : Support audits and compliance initiatives (e.g., SOX, GDPR ) through effective identity governance, logging More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
City of London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
enterprise clients to design, implement, and optimize their Active Directory and Windows Server environments . As a trusted advisor, you'll help organizations: Modernize their identityandaccessmanagement solutions Migrate and consolidate complex AD environments Enhance security through proper Group Policy implementation Design highly available Windows Server architectures Integrate on-premises AD with … configuration policies Architect and deploy Windows Server solutions with a focus on high availability and scalability Implement Active Directory Federation Services (ADFS) and Certificate Services (ADCS) for secure identitymanagement Provide technical consultancy to both technical and non-technical stakeholders Mentor junior team members and contribute to the development of best practices Ensure seamless delivery of … design, deployment, and migration 3+ years' experience in Azure integration with AD and Windows environments Strong knowledge of Windows Server architecture, clustering, and virtualization Experience with ADFS, ADCS, andidentitymanagement solutions Excellent problem-solving, communication, and client-facing skills Ability to lead small/medium engagements and work independently Desirable Certifications ? Microsoft Certified Solutions Expert More ❯
and response. Cloud Security Leadership Serve as the subject matter expert on AWS security and threat modeling methodologies. Provide guidance on cloud security principles, including identityandaccessmanagement (IAM), data protection, network security, and incident response in AWS environments. Stay current on the latest cloud security trends, AWS security features, and emerging threats. … of security awareness across engineering and operations teams. Lead workshops and training sessions to raise security awareness and improve threat modeling practices within the organization. Incident Response & Vulnerability Management Lead post-incident reviews related to security breaches or vulnerabilities in AWS infrastructure. Assist in the identification and resolution of security vulnerabilities related to AWS resources. Collaborate with the … with cloud-native security tools for monitoring, vulnerability management, and threat detection. Understanding of encryption, tokenization, and data protection strategies in the cloud. Expertise in IAM andaccess controls, including role-based access control (RBAC), policies, and permissions in AWS. Certifications (Preferred): AWS Certified Security – Specialty. Certified Information Systems Security Professional (CISSP). Certified More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
Azure, or GCP. Define and execute Infrastructure as Code (IaC) strategies using Terraform, Ansible, and CI/CD pipelines. Oversee Kubernetes-based architectures Implement cloud security best practices, identityaccessmanagement, and governance models. Drive DevSecOps adoption Work with senior stakeholders to align cloud strategy Optimize cloud environments using FinOps, modern operations tooling, andMore ❯
per day Inside ir35 - Umbrella only Active SC or eligible candidates Some blend of the following: Low-level design and implementation of IAM services for single sign-on, identity governance … and privilege user/secrets management in AWS (using ServiceNow for governance) AWS IAM AWS Identity Centre (SSO) AWS Secrets Manager IdentityandAccessManagement Active Directory Customer Identity & AccessManagement (CiDAM)/IBM Security Verify Access API authentication Integration & development Platform More ❯
automation skills (e.g., Python, PowerShell, Bash) Experience with cloud logging and monitoring (AWS CloudTrail, Azure Monitor, GCP etc.) Experience with threat modelling, cloud security or IdentityandAccessManagement is desirable More ❯
/Lead Java Developer Familiarity with Kong API Gateway. Prior experience in the financial services domain. Exposure to Open Banking frameworks and standards. Experience with identityandaccessmanagement tools, particularly Ping Identity IAM. Hands-on experience in production support and monitoring tools. Proven experience leading application development teams and delivering complex More ❯
The Senior Project Manager is responsible for leading teams to deliver strategic security projects to replace and modernise key security services, starting with a Customer IdentityandAccessManagement (CIAM) solution. These will span across one or more business areas. They are responsible for managing resources, schedules, financials and adherence to stage gate quality … gates and control guidelines throughout the full development life cycle. This also includes management of issues, risks and project change requests to ensure successful and on-time project delivery. The Senior Project Manager has the authority to run the project on a day-to-day basis. Verify that the project produces the required deliverables of quality, within the … constraints of time and cost and to achieve the potential benefits defined in the business case. Reporting into the change team you will plan and support strategic change management projects as well as significant tactical projects. This will include implementing changes to MDU policy/strategy coupled with technology enhancements, organisational change and major business process reviews andMore ❯