to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … similar roles including in-depth troubleshooting, mentoring and managerial skills. KEY RESPONSIBILITIES 1. Provide strong and experienced leadership. 2. Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical workshops and 1:1 coaching sessions, to ensure alignment to business strategy. 3. Creation and maintenance of technical guides to convey facts … simply and effectively to both peers and those less experienced. 4. Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. 5. Balance technical fact/opinion against business risk/delivered service to provide well thought More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
Identity & AccessManagement (IDAM) Analyst – Contract Contract Details 6 months initially, with potential extension. £500 to £550 P/d Inside IR35 Full-time, Monday to Friday. Hybrid role (3 Days a week in London Office) We are seeking an experienced Identity & AccessManagement (IDAM) Analyst to join … role will suit a hands-on analyst with strong technical knowledge of IDAMand PAM platforms with a focus on Entra ID, as well as excellent communication and stakeholder management skills. Key Responsibilities Manage user account lifecycle (creation, modification, deletion). Ensure consistency of IDAM processes in line with policies and standards. Administer and support enterprise PAM solutions … Movers-Leavers (JML) processes. Conduct periodic audits of user identities and access. Provide adoption training and liaise with stakeholders regarding process changes. Requirements Significant hands-on experience in an IDAM or Security Analyst role. Solid knowledge of Microsoft Active Directory and Azure AD/Entra ID. Strong background in identitymanagement/provisioning tools (e.g., CyberArk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
Senior Identity & AccessManagement Engineer London – Hybrid | £110,000 We are working with one of our best financial services clients to hire a Senior Engineer – IT Security (Identity & AccessManagement/Directory Services). This is a senior technical role focused on shaping and managing the firm’s hybrid identity environment, ensuring secure, efficient, and scalable access to critical enterprise systems. If you’re a specialist in Active Directory, Entra ID, DNS/DHCP/IPAM, and IAM strategy, this … is an opportunity to lead impactful initiatives within a highly regulated, enterprise-scale financial services environment. The Role As Senior IAM Engineer, you will: Lead the design, implementation, andmanagement of hybrid identity infrastructure (Active Directory, Entra ID, Infoblox) Drive improvements in authentication, access governance, automation, and compliance across a global organisation Act as More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
IdentityAccess Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identityandaccessmanagement (IAM) solutions across a large-scale enterprise environment, as part of our clients strategic migration project. Day-to-day of the role: Lead the architecture … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP IdentityManagement (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
occasional onsite) Salary: Competitive + Benefits Permanent: 2-Year Apprenticeship, Full-time Key Essential Skills: Strong motivation and enthusiasm for a long-term career in IT. Interest in Identity & AccessManagementand information security principles (training will be provided). Basic understanding of Microsoft Office tools and general IT familiarity. Excellent communication skills, with … learn technical concepts quickly. Training & Career Development Comprehensive 2-year apprenticeship programme with structured milestones. Full technical training in IAM, including Microsoft Entra/Active Directory, role-based access control (RBAC), and audit processes Mentorship from experienced IAM professionals. Opportunities to gain industry-recognised certifications (eg, ITIL, IAM-specific qualifications). A clear Pathway to becoming an Identity … Administrator. This role is designed for individuals who may not yet have the technical skills but are eager to build a long-term career in IdentityandAccessManagement (IAM). Full training, mentoring, and hands-on experience will be provided to help you develop into a skilled Identity & AccessMore ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture andidentity & accessmanagement to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful … practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & AccessManagementand Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged AccessManagement (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out for a confidential discussion. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
rolling 6 months We are seeking an experienced IAM Technical Analyst to join a leading financial services organisation. This role will be part of a large-scale Cybersecurity andIdentity & AccessManagement (IAM) programme, delivering business-critical solutions across a complex and highly regulated environment. Key Responsibilities Gather requirements across the IAM stack, working … ensuring on-time, high-quality outcomes. Operate as a self-sufficient, proactive team player within a large programme environment. Key Skills & Competencies Deep understanding of IdentityandAccessManagement (IAM), including: Authentication Governance AccessManagement Privileged AccessManagement Strong analysis and requirements-gathering skills in a … technical environment. Process mapping expertise, with proficiency in MS Excel, Visio, and Confluence. Experience delivering within large-scale Cybersecurity and IAM programmes. Excellent stakeholder managementand communication skills, with the ability to engage effectively across global, cross-functional teams. Strong presentation skills, able to clearly communicate progress and delivery roadmaps. Knowledge of financial services and the regulatory environment More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Manpower Group Internal Talent
IDAM Operations Manager Location: Uxbridge (Hybrid) - with up to 10% international travel About the Role: We are seeking an experienced and proactive IDAM Operations Manager to lead the operational delivery of IdentityandAccessManagement (IDAM) services across our global footprint. This is a strategic role within our enterprise infrastructure transformation programme, supporting over … countries and $20+ billion in revenue. You will be responsible for overseeing the daily operations, governance, and security of IDAM systems, ensuring compliance, efficiency, and alignment with global standards. This role offers the opportunity to shape future-state IDAM processes and technologies, while collaborating with cross-functional teams across IT, HR, and business units. Key Responsibilities: Leadership & Strategy Lead and … IDAM-related projects from planning to execution Coordinate cross-functional teams and ensure timely delivery Manage initiatives between Global Technology and People & Culture Process Redesign & Automation Redesign Active Directory andIDAM operations for efficiency and compliance Implement automation strategies to reduce manual intervention Establish governance standards for Global Identity Services About You: Bachelor's degree in IT, Engineering More ❯
Uxbridge, Middlesex, United Kingdom Hybrid / WFH Options
Manpower Group
IDAM Operations Manager Location: Uxbridge (Hybrid) - with up to 10% international travel About the Role: We are seeking an experienced and proactive IDAM Operations Manager to lead the operational delivery of IdentityandAccessManagement (IDAM) services across our global footprint. This is a strategic role within our enterprise infrastructure transformation programme, supporting over … countries and $20+ billion in revenue. You will be responsible for overseeing the daily operations, governance, and security of IDAM systems, ensuring compliance, efficiency, and alignment with global standards. This role offers the opportunity to shape future-state IDAM processes and technologies, while collaborating with cross-functional teams across IT, HR, and business units. Key Responsibilities: Leadership & Strategy Lead and … IDAM-related projects from planning to execution Coordinate cross-functional teams and ensure timely delivery Manage initiatives between Global Technology and People & Culture Process Redesign & Automation Redesign Active Directory andIDAM operations for efficiency and compliance Implement automation strategies to reduce manual intervention Establish governance standards for Global Identity Services About You: Bachelor's degree in IT, Engineering More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Project Support Office/Analyst ((Identity & AccessManagement Programme) - Banking Client - London Duration: 12 months Rate: 400 - 600 per day (inside of IR35) Hybrid: 8 days onsite per month, the rest is remote working Locations: London, Paris, Brussels or Amsterdam Role description PSO Analyst - Planning & Budgeting … Identity & AccessManagement Programme) We're looking for a hands-on PSO Analyst to help managing the budgeting and planning side in the IDAM programme, which has a portfolio of 20 projects. You'll work closely with project managers, the central PMO team and other delivery teams across to keep finances on track, support … slides and collect input from several contributors. Meeting minutes and action tracking: Summarise key discussion points, actions and decisions and follow-up with action owners. Quality assurance and controls management: Frequent checkpoints with project managers to maintain a high standard in terms of project life cycle documents, monthly reports and status updates, and steer and support where needed. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
momentum without overengineering. Key Responsibilities Infrastructure & End-User Technology Own the internal IT environment, including Microsoft 365, Azure AD, endpoint management (Intune), and core collaboration and file management tools. Manage secure provisioning and support of laptops and devices (in partnership with our external IT provider). Ensure an excellent end-user experience for onboarding, access … workforce. Security, Risk & Governance Develop proportionate, business-friendly policies across acceptable use, access control, data handling, and device security. Implement practical controls for identityandaccessmanagement, encryption, endpoint protection, and incident response. Use your understanding of frameworks like Cyber Essentials, ISO 27001, or SOC 2 to guide scalable, pragmatic governance - even … IT in a high-growth organisation (50-500 headcount), ideally PE-backed or professional services-led. Strong practical knowledge of Microsoft 365, Azure AD, endpoint management, andidentity/access controls. Familiarity with frameworks like ISO27001, SOC 2, or NIST - and the judgment to apply what's appropriate for scale. Experience working with (or More ❯
London, Finsbury Square, United Kingdom Hybrid / WFH Options
Morson Talent
Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation’s vulnerability management programme across multiple business units, technologies, and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerability management platform. You’ll be expected … Metrics - Power BI ServiceNow dashboards Excel (advanced analysis) Frameworks & Standards - NIST CSF, ISO 27001, OWASP, CE/CE+, GDPR, NIS2, ONR Security Domains/Capabilities - IdentityandAccessManagement (IAM) Network Security Data Protection Cloud Security Controls Application Security Security Monitoring Processes & Practices - Vulnerability Management Programmes Incident Response and Threat Assessment Emergency … Patch Governance Risk-based Prioritisation (CVEs, exploit intelligence, asset criticality, business impact) Audit Support (internal assurance, penetration test follow-ups, external audits) Exception and exemption management Automation of manual tasks Dashboarding for risk and SLA metrics What's on Offer - A leadership role with significant influence across a major UK organisation. Opportunity to work with a forward-thinking More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £100,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with a proven track record in designing security roadmaps and influencing at executive level. You'll combine hands-on IAM expertise with strategic leadership … shaping global identity strategies while engaging with CISOs and senior stakeholders. Experience with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're looking for an Identity & AccessManagement (IAM) and Security specialist to own and drive a global … priorities into scalable, actionable security solutions. Key Responsibilities: Design, own, and deliver the Global Technology Operations security roadmap Build and implement IAM frameworks (Saviynt preferred; Okta, SailPoint, Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Partner with CISO and senior leadership to define security strategy and mitigate risks Provide expert guidance during More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & AccessManagement (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled … in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
for risks, issues, and deadlines Deliver initiatives across people, process, technology, and governance Manage smaller internal cyber security projects outside the partner's scope Maintain programme governance, risk management, and resource planning Collaborate with senior stakeholders, IT teams, and external suppliers Drive change managementand embed new security disciplines across the organisation Monitor progress against KPIs … Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and … information security Deep understanding of Microsoft Azure security architecture Experience managing vendor selection and consultancy engagement Proven track record of delivering security programmes end to end Excellent stakeholder managementand communication skills Relevant certifications (e.g. SC-100, CISSP, CISM, ISO 27001 Lead Implementer More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
As the Head of Information Security you'll collaborate with the Group CISO to lead and manage information security strategy with a focus on 3rd party security risk management, DLP (Data Loss Prevention), Policy Governance, Security training and awareness and IAM (IdentityAccessManagement). You'll manage vendor relationships, implement and … of IAM/PAM principles and technologies in both on-premise and cloud-native environments * You have experience of leading or collaborating on third-party/vendor risk management programs * You have a strong working knowledge of global regulations such as: GDPR, DORA, APRA CPS 234, CCPA * You have experience of supporting complex security transformations across global businesses … and continually learn. We're an equal opportunities employer whose people come from all walks of life and will never discriminate based on race, colour, religion, sex, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. The clients we work with share our values. Benefits: * Company pension * Gym membership * Life insurance * Paid volunteer More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Robert Walters
of systems Hands on, automation, cross-functional collaboration Manage Azure and M365 Cloud Platforms Oversee enterprise application stack - M365, Azure, Atlassian, Telephony, IT Service tools Manage/Develop IdentityandAccessManagement solutions Identity/Automate tasks - streamline workflows Implement/Manage monitoring tools Troubleshoot and Incident Response: Investigate, Resolve issues Security … systems procedures CI/CD Support: Implementation of Continuous Integration/Deployment pipelines Provide tech config on cyber security controls Lead tech implementation of enterprise solutions Provide daily management of digital workplace tech stack Act as senior escalation point Tech Ops Engineer: Technical Skills Networking, Azure Cloud Platforms, AVD Virtualization, M365 Collaboration solutions Experience to Azure and M365 More ❯