Identity Access Management Jobs in England

51 to 75 of 170 Identity Access Management Jobs in England

Senior IDAM Engineer

Manchester Area, United Kingdom
Hybrid / WFH Options
The University of Manchester
Overall purpose of the job Based within the Identity and Access Management (IDAM) team, the Senior IDAM Engineer is responsible for designing, implementing, testing, and maintaining the IDAM frameworks, systems, and protocols. The role will build and maintaining the infrastructure and tools used to … platforms. The post holder will lead the development of IDAM related services, whilst being an advocate for automation and security. Key responsibilities, accountabilities and duties IDAM design and development Produces detailed design specifications to form the basis for the construction of IDAM systems, including, for example,: physical data flows; user … Access reviews etc.). Possess significant experience with advanced engineering practices (e.g. Azure DevOps) and taking a lead on developing innovative and secure IDAM solutions. Demonstrable experience of providing technical understanding on strategic, large/complex security and/or identity and access management more »
Posted:

SailPoint Architect / SailPoint Admin

Leeds, England, United Kingdom
Tata Consultancy Services
Ready to utilise your skills in Cyber Security? Are you passionate about Identity and Access Management? We have an exciting role for you – SailPoint Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not …/Knowledge/Experience: Experience in Engineering & architecting IAM solutions using SailPoint IIQ. Engineering background with knowledge and experience of Identity and Access Management principles and practices. Experience in the installation and configuration of solutions using a wide range of IAM related technologies such … access control (RBAC), entitlement management, policy management, data access governance, cloud access governance and identity analytics. Strong collaboration, influencing and communication skills, with an enthusiasm for problem solving, solutioning, and idea sharing. A proven ability to listen, coach more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, England, United Kingdom
Areti Group
required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … remote access products LAN & WAN networking using routers, switches, and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defense against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function more »
Posted:

Security Engineer

Greater London, England, United Kingdom
RBW Consulting
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identity and access management, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identity and access management, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Posted:

PAM and EPM Specialist

Warwick, England, United Kingdom
Maclean Moore
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within Identity and Access Management, in particular deep technical knowledge of identity management and privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Management more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Silicon Logic UK Ltd
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and access management initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and access management strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
Posted:

Linux Engineer

London Area, United Kingdom
Miller Maxwell Ltd
Exciting Opportunity for a Linux Engineer! 🌐. Amazing opportunity to work on a highly visable Identity and Access Management programme of work. Ideally the client seeks a Linux Engineer with IAM - IDAM - PAM or SIEM Tooling experience. In the rapidly evolving world of electronic … a pivotal member of the team the Linux Engineer can expect to: 🔧 Craft and maintain robust Linux server environments. 🔒 Be heavily involved in Identity Access Management project. ⚡ Support lightning-fast high-frequency trading systems. 💡 Deploy the latest upgrades to Linux Servers ensuring peak performance. … Unix – Linux support and engineering. 🛠 Mastery in enterprise Linux, with a preference for Red Hat, CentOS, or Oracle Linux. 🔒 Recent hands-on exposure with IDAM, PAM, or SIEM tooling. 👁️‍🗨️ A track record with monitoring tools like Prometheus or Nagios. 🖥️ Scripting skillset in Python, Shell, Bash, or Ruby. 🌐 In-depth understanding more »
Posted:

Software Engineer

Birmingham, England, United Kingdom
Maxegan Recruitment
Our client is a Midlands based Software Development company offering Identity Access Management, Secure Payments, personal data management to companies Nationally. They are looking for a permanent individual to join their expanding team and who is able and willing to attend their more »
Posted:

Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Next Ventures
using Go or Kotlin for IAM tasks. Implement and manage SCIM provisioning for automated user lifecycle management Integrate identity and access management systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. Configure and manage access controls to ensure secure and role-based access to resources. For more information or to apply please reach out to Luke Finn on +44 203 053 3723/luke@next-ventures.com more »
Posted:

Senior Analyst - Cyber Advisory

London Area, United Kingdom
Hybrid / WFH Options
S-RM
transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation plans Work … internal client project teams, subcontractors and partners Understand and utilise the full range of S-RM’s people and expertise Client Engagement, Account Management and Business Development Our delivery team is at the heart of our business development activities. You will: Support engagement with clients to understand their … of: Cyber Security frameworks, standards and regulations Information security principles, tools, technologies and techniques Technical cyber knowledge, including: Cloud Security Identity and Access Management Software development lifecycle Operational Technology OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their more »
Posted:

Cloud Engineer - Azure

London Area, United Kingdom
Silicon Logic UK Ltd
Clearance Certificate We are seeking a skilled Cloud Engineer with expertise in Azure to join our team and contribute to the design, implementation, and management of our cloud infrastructure. The ideal candidate will be responsible for provisioning and configuring Azure resources, managing security and compliance, setting up monitoring … Azure Resource Manager (ARM) templates, Azure CLI, or Azure PowerShell. Experience in implementing security and compliance controls in Azure, including identity and access management, network security, encryption, and data protection. Knowledge of monitoring and alerting tools such as Azure Monitor, Azure Security Center, Azure more »
Posted:

Developer

London Area, United Kingdom
Hybrid / WFH Options
Janus Henderson Investors
be a developer in the Client Reporting Product Team within Distribution Technology. The Client Reporting Product team partners with Marketing, Reporting Operations and Data Management teams in Technology to build data integration solutions for the automation of a wide variety and high volume of reports. This role requires … an understanding of timing of data loads, data transformation, and optimization of ETL load performance. Provide production support and test approaches for data management projects Work within the agile delivery methodology, picking up data development tasks within a 2-week sprint, providing work estimates for tasks to project … tools to expedite UI development. Azure Active Directory B2C: Experience in configuring and integrating Azure Active Directory B2C for user identity and access management in web applications. NET Development: Strong proficiency in .NET development, including ASP.NET Core, ASP.NET MVC, C#, and related technologies for more »
Posted:

Interim Oracle Cloud ERP/Fusion Controls Specialist

Greater London, England, United Kingdom
Grant Thornton UK LLP
Oracle ERP/Fusion Experience is Essential Exposure to Configuring Oracle Access and Segregation of Duties Experience with Identity and Access Management, Roles and Permissions including custom roles, along with Privileged Access The minimum criteria you’ll need is a … day. This means that our working environment is one where everyone’s experience is important. Where people are treated fairly, everyone has equal access to opportunities and where everyone feels safe to be themselves. We want to create a culture where it’s okay to ask questions and more »
Posted:

DevOps Engineer

London Area, United Kingdom
Hybrid / WFH Options
Modo Energy
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions and identity/access management across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
Posted:

IT Auditor - Independent Consultant - London Based

Greater London, England, United Kingdom
Grant Thornton UK LLP
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, Identity and Access Management, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide e... APCT1_UKTJ more »
Employment Type: Full Time
Posted:

Security Engineer- Cloud WAF

London Area, United Kingdom
Wipro
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents General connectivity/network issue management/service management experience OTHER SKILLS Strong stakeholder management skills Attention to detail in analysing large data sets Excellent interpersonal skills with strong communication skills both written and verbally more »
Posted:

Senior Associate - Cyber Advisory

London Area, United Kingdom
Hybrid / WFH Options
S-RM
work closely with our clients to understand their challenges, lead project teams and deliver innovative solutions across a full spectrum of cyber risk management and governance activities. Our aim is to become trusted advisors to our clients as we help them to navigate dynamic and evolving security risks. … transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management S-RM Consultants are organised and dynamic project managers and team leaders. You will: Lead complex projects independently Manage client engagement, communication and project … the full range of S-RM’s people and expertise Manage junior colleagues and oversee their career development where appropriate Client Engagement, Account Management and Business Development Our consultants are at the heart of our business development activities. You will: Engage with clients to understand their cyber security more »
Posted:

Cloud Application Architect

London Area, United Kingdom
Hybrid / WFH Options
Tata Consultancy Services
of data processing fundamentals, Event driven architecture/message driven architecture and best practices. Experience with Agile software development. Azure certified architect Knowledge of IDAM and APIM implementation. Proficiency in WebApps and Event Driven Architectures. Proficiency in security standards. Leadership skills. Deep knowledge of: Microservices MBaaS Azure Cloud Services Agile … is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network. Diversity, Inclusion & Wellbeing At TCS, we believe in building and sustaining a culture … sports events (we even sponsor the London Marathon). We are open to all and treat applications equally, regardless of ethnicity, disability, gender identity, gender reassignment, age, sexual orientation, or beliefs. If you are an applicant who needs a reasonable accommodation due to Disability or Neurodiverse Condition to more »
Posted:

Cloud Security Consultant

London Area, United Kingdom
Experis UK
projects. The ideal candidate will have a strong background in threat assessments, architectural design reviews, third-party risk assessments, RFP security requirements, network security, IDAM projects, ransomware remediation, pen test scoping, and HLD/LLD reviews. Responsibilities: Perform threat modelling to identify potential security vulnerabilities and risks. Assess high and … understanding of security principles, standards, and best practices. Experience with threat modelling, architectural design reviews, RFP security requirements, third-party risk assessments, network security, IDAM projects, ransomware remediation, pen test scoping, and HLD/LLD reviews. Excellent communication skills with the ability to articulate technical concepts to non-technical stakeholders. more »
Posted:

Linux Engineer

City Of London, England, United Kingdom
McGregor Boyall
Linux Engineer, IdM, IDAM, PAM, SIEM, Bash, Puppet, Ansible, Python, DNS, LAN, WAN, F5 Linux Engineer Permanent - up to £120,000 + bonus/benefits Hybrid (1 day a week onsite in London) Sponsorship not available The role A Leading leading equity firm is looking for a Linux Engineer to … and performance of the Linux-based infrastructure. Technical skills: Linux proficiency - Red Hat Enterprise Linux, CentOS, Linux Kernel Must have recent involvement in implementing IDAM, PAM or SIEM tooling At least one scripting/programming language, i.e. Bash, Ansible, Puppet, python Basic Networking such as TCP/IP, DNS, LAN …/WAN Experience managing full lifecycle, from design to build stage Linux Engineer, IdM, IDAM, PAM, SIEM, Bash, Puppet, Ansible, Python, DNS, LAN, WAN, F5 McGregor Boyall is an equal opportunity employer and do not discriminate on any grounds. more »
Posted:

IAM Delivery Consultant

Warwickshire, West Midlands, United Kingdom
Henderson Scott
Architect - SME - SC Cleared based onsite in either Warwickshire, Hampshire or Wiltshire The IAM Delivery Consultant will be responsible for designing the Certificate Management services, use of On and off-line root certificate authority (CA) service as endpoint trust anchors and using certificates within a CNI environment. Microsoft … demonstrate experience in the following areas: Identity Access Management (IAM) User and Group Management, Security and Access Control, Directory Replication and Availability, use of Lightweight Directory Access Protocol (LDAP) and Kerberos Authentication. CA/PKI aspects Certificate Templates more »
Employment Type: Contract
Posted:

IAM Principal Engineer

London
LA International Computer Consultants Ltd
solutions and solving complex IT technical problems, with the strong knowledge and proven experience over a long period in: * Enterprise Identity and access management with a focus on Identity governance * Technical design and implementation within IAM and/or adjacent area technology … solutions such as SailPoint IDN, CyberArk, Microsoft Entra ID, Microsoft AD or ServiceNow Access management module. * Software deployment and change management process. * Hands on agile software development and deployment delivery model Due to the nature and urgency of this post, candidates holding or who more »
Employment Type: Contract
Rate: £600 - £625
Posted:

Senior IAM Analyst - Identity and Access Management

City of London, London, United Kingdom
Hybrid / WFH Options
Stott & May Professional Search Limited
Stott & May are currently looking for a Senior IAM Analyst - Identity and Access Management to work for a large & very well-known organisation on an initial 6-month contract. Location: London (City) | Hybrid - Office and home based Rate: £400 - £500 per day/Outside … supporting the development and delivery of Privileged Account Management (PAM) solutions within the Cloud infrastructure. Senior IAM Analyst - Identity and Access Management - Requirements: * Hands-on PAM experience, SaaS/Cloud based vendors preferred * Proven experience with automation, CI/CD, orchestration, and … configuration management * Experience with CI/CD tools (Jenkins) * Experience with image lifecycle management using tools such as Packer * Experience with Infrastructure as Code (IaC) using tools such as Terraform, CloudFormation, and Chef * Proficiency in explaining concepts, use cases, and technologies in DevOps, operations, security, cloud more »
Employment Type: Contract, Work From Home
Rate: £400 - £500 per day
Posted:

Cyber Security Engineer

Bristol, United Kingdom
Opus Recruitment Solutions
OT/ICS Systems Security: Proven experience in securing Operational Technology and Industrial Control Systems (e.g., SCADA, HMI, PLC). Identity and Access Management: In-depth knowledge of identity and access management. Threat Mitigation: Familiar with common cybersecurity threats and more »
Employment Type: Contract
Rate: £600 - £750/day
Posted:
Identity Access Management
England
10th Percentile
£42,000
25th Percentile
£55,750
Median
£72,500
75th Percentile
£92,500
90th Percentile
£107,500