available IAM tools such as ISIM/ISAM, Cloud Identity/Okta/Sailpoint/MS Entra, to provide SingleSign-On (SSO) and manage user identities effectively. The consultant is proficient in directory services like TDI and AD, and has hands-onMore ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
systems, cloud platforms (e.g., Microsoft 365/Azure AD), and business applications. Secure Authentication: Support secure authentication solutions like singlesign-on (SSO), multi-factor authentication (MFA), and identity federation for staff and partners. Documentation and Improvement: Maintain and improve access governance documentation and More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
Experis
teams to ensure IAM solutions aligned with organization's information and cybersecurity standards and principles. Defined the requirements for the configuration and management of SSO and MFA solutions to streamline user authentication and improve security across cloud and on-premise applications. Proficient in data analysis, data lineage, data … needed to design efficient pipelines Must have worked on digital identity projects, singlesign-on's (SSO), biometrics, retina scans. NOT cyber security Technical Skills: Ability to analyze large datasets, identify trends, and use data to inform decision-making. Proficiency in SQL More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factor authentication (MFA), singlesign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory requirements (e.g., ISO27001, Cyber Essentials) by helping to complete More ❯
key skills: Technical Acumen: Identity Management: Deep understanding of identity and access management (IAM) solutions, including technologies like federation, singlesign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk More ❯
key skills: Technical Acumen: Identity Management: Deep understanding of identity and access management (IAM) solutions, including technologies like federation, singlesign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
key skills: Technical Acumen: Identity Management: Deep understanding of identity and access management (IAM) solutions, including technologies like federation, singlesign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including rules engines, threat modelling, and risk More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Saviynt, One Identity). Security Principles: Ensure segregation of duties and least privilege principles are enforced. IAM Management: Manage IAM processes and tools, including SSO, MFA, and federation solutions (e.g., Okta, Azure AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work More ❯
engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identity management, authentication, authorization and identity federation. Expertise with singlesignon, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM, PingIDM and … links between internal and external LDAPS, JDBC, SOAP, HTTPS and other data sources. Some other highly desirable skills include: Experience in implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in partnering with security, product More ❯
with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identity management, authentication, authorization and identity federation. br br Expertise with singlesignon, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM, PingIDM and … external LDAPS, JDBC, SOAP, HTTPS and other data sources. br br Some other highly desirable skills include: br br Experience in implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links br br Experience in partnering with More ❯