4 of 4 Identity Access Management Jobs in the East Midlands

Identity & Security Technical Consultant

Hiring Organisation
RedTech Recruitment Ltd
Location
Leicester, Leicestershire, East Midlands, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£55,000
Technical Consultant, Security Consultant, or similar client-facing role within enterprise software environments Proven experience delivering or deploying identity and access management or cybersecurity-related solutions Strong understanding of identity technologies such as authentication, access control, and credential management … Services Consultant/Implementation Consultant/Systems Consultant/Infrastructure Consultant/Pre-Sales Consultant/Post-Sales Consultant/Identity and Access Management/IAM/IDAM/PKI/Active Directory/Windows Server/SQL Server/Networking/MFA/ ...

IT Systems Cyber Security Lead

Hiring Organisation
Gleeson Recruitment Group
Location
Nottinghamshire, England, United Kingdom
Employment Type
Full-Time
Salary
£70,000 - £85,000 per annum
large team. Strong cyber security background across infrastructure and systems environments Experience delivering or supporting Cyber Essentials/ISO 27001 Knowledge of: Identity & access management (Entra ID, MFA, Conditional Access) Endpoint & network security (EDR/MDR, firewalls) Vulnerability management & patching ...

Site Reliability Engineer (Security Cleared)

Hiring Organisation
Profile 29
Location
Derby, Derbyshire, UK
DevOps, cloud engineering, and automation with a focus on reliability, observability, and scalability. Youll also work with event-driven technologies, identity and access management, and data platforms, ensuring our orchestration solutions are resilient, secure, and future-ready. This is an exciting opportunity ...

VP Information Security

Hiring Organisation
GXO Logistics
Location
Northampton, Northamptonshire, England, United Kingdom
Employment Type
Full-Time
Salary
£197,000 per annum
governance mechanisms. Architecture & Engineering Oversee Security Architecture and Engineering; ensure “secure-by-default” across cloud, application, data, identity, and infrastructure landscapes. Establish IDAM function with clear RACI and coherent operating model. Govern the security tooling strategy and operating model (build vs. buy vs. MSSP); maximize value from SIEM … communications, regulator notifications, and post-incident improvements. Act as escalation point for any security related service failures or major incidents. Threat and Vulnerability Management Support the TVM team in continuously reducing vulnerability levels in the organisation. Recommend procedural improvements and reporting to drive constant improvement. Drive secure ...