Identity Access Management Jobs in England

101 to 125 of 289 Identity Access Management Jobs in England

Senior Data Engineer

London, United Kingdom
Hybrid / WFH Options
VivaCity
with colleagues. This role has the option to grow towards either a principal engineering role (a technical specialist leader) or an engineering manager (a team leader with line management) position at Vivacity, through structured career progression pathways. About us At VivaCity, we make cities smarter, safer, and more sustainable. We have over 5,000 AI sensors around the … familiar with the problem space, and you know when and how to ask for help. Requirements for the role: Expertise in Apache Kafka (ideally Kafka Strimzi), including broker management, scaling, upgrades, and integration with high-throughput data pipelines. Experience managing PostgreSQL databases, including load analysis, query optimisation, and role management. Experience with modern cloud infrastructure as GCP/… common DevOps tools and CI/CD processes. Proficiency with infrastructure management tools (e.g. Ansible, Chef, Puppet) Knowledge of information security principles, including identity and access management and authentication/authorisation processes. Experience in a start-up or scale-up environment. Passion for sustainability, transport or smart cities. You don't need More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Architect ( Artefact )

Bristol, United Kingdom
Pontoon
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Employment Type: Contract
Posted:

Senior Security Architect

Bristol, United Kingdom
Pontoon
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Employment Type: Contract
Posted:

Cyber Security Officer

London, United Kingdom
Hybrid / WFH Options
McDonald's Corporation
and maturity aligned to McDonald's Global Technology approaches Providing subject matter expertise and acting as incident lead in support of cyber security incidents Provide regular cadence of management reporting that identifies trends, priorities and opportunities for improvements which demonstrates a practice of continuous improvement and aligns to segment KPIs for the function What Team will I be … and working towards or obtained CISSP. Strong experience in technical cyber security role such as security analysis or engineering Excellent knowledge in key cyber security domains such as identity and access management, risk management, network security and security operations Experience providing cyber subject-matter expertise for transformational security improvements in a complex … Technology organisation Proven experience at engaging and influencing stakeholders across departmental and organisational and global/segment stakeholders An excellent understanding of best practice within cyber security and risk management including standards such as ISO/IEC 27001, Cyber Essentials and NIST CSF Demonstrable creativity and a commitment to future-proofing processes and security controls in a fast More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Infrastructure Specialist

Bristol, Gloucestershire, United Kingdom
Just Eat Takeaway.com
Pagerduty). Scripting skills (PowerShell, JavaScript, Bash, Python preferred). Knowledge of backup and recovery tools (e.g., Veeam, Azure Backup, AWS Backup). Understanding of identity and access management (Azure AD, LDAP, SAML). Experience with Azure AD Administration. Knowledge of Infrastructure as Code tools (e.g. Terraform, Ansible, Serverless Framework) Basic knowledge in Github More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Defence Services - Consultant

England, United Kingdom
Hybrid / WFH Options
KPMG UK
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & Access Management this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
Posted:

Cyber Defence Services - Consultant

London, England, United Kingdom
Hybrid / WFH Options
KPMG UK
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & Access Management this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
Posted:

Identity Management Consultant

Northampton, England, United Kingdom
Avance Consulting
Role: Identity and Access Management (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced Identity and Access Management (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Posted:

Identity Management Consultant

Northampton, England, United Kingdom
Avance Consulting
Role: Identity and Access Management (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced Identity and Access Management (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Posted:

Identity and Access Management SME

London, United Kingdom
i-confidential Limited
We are currently looking for an Identity and Access Management SME to join one of our financial services clients, on a contract basis. The role requires someone who has extensive knowledge and experience in designing, implementing, and managing Identity and Access Management systems. Acting as advisor and consultant … value of IAM to various stakeholders, including technical and non-technical audiences. Identify and design the most appropriate IAM solutions for specific organisational needs. Oversee the implementation and ongoing management of IAM systems, ensuring they are configured correctly and functioning effectively. Keep updated on the latest IAM trends and best practices, providing guidance on security, compliance, and performance. … controlling access to information and systems. Key Skills and Knowledge : Deep understanding of IAM principles: A strong grasp of authentication, authorization, access control, and user management processes. Familiarity with different IAM technologies: Knowledgeable about various IAM platforms, including IDM, PAM, and cloud-based solutions. Security expertise: Solid understanding of cybersecurity threats, vulnerabilities, and best More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technology Planning and Governance Manager

London
Nexus Jobs Limited
and maintenance of the technology alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support and management of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our Corporate Intranet ensuring that delivery … across the Company where corporate applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as Identity and Access Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit teams. Develop and adapt innovation … Experience Required Significant and relevant progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, Identity and Access Management Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability mapping, data management More ❯
Employment Type: Permanent
Posted:

Architect

Warwick, England, United Kingdom
PRACYVA
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and Access Management (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and access management, including hybrid identity scenarios. Conditional Access Management : Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business : Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identity and access management, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Posted:

Architect

Royal Leamington Spa, England, United Kingdom
PRACYVA
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. Identity and Access Management (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identity and access management, including hybrid identity scenarios. Conditional Access Management: Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business: Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identity and access management, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Posted:

Infrastructure Security Engineer - Microsoft Entra

Cheadle, Staffordshire, United Kingdom
Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identity and access solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identity and access issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identityand governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identity and access management (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Network Engineer

Northampton, England, United Kingdom
Hybrid / WFH Options
undisclosed
Role Title: Identity and Access Management (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced Identity and Access Management (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Posted:

Cyber Security Analyst

City of London, London, United Kingdom
Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge More ❯
Posted:

Cyber Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge More ❯
Posted:

Cyber Security Analyst

South East London, England, United Kingdom
Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk management and identity access management solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception and management reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge More ❯
Posted:

Azure DevOps - SC Cleared

City of London, London, United Kingdom
Simon James IT Ltd
in several of the following technologies: 🔷Infrastructure as Code (IaC) tools: 🔹ARM templates, Azure Bicep 🔷Azure DevOps (ADO) and YAML Pipeline 🔷Logic Apps, Function Apps, Service Bus 🔷API Management Services (APIM) and APIs 🔷App Services, User Managed Identity 🔷Certificate management and renewal 🔷App Registration, Managed Identities, Key Vault, Storage Account 🔷Azure networking core components … subnets, NSG, Routing 🔷Azure Monitoring: 🔹Log Analytics Workspace (LAW), Application Insights (App Analytics) 🔷Scripting languages: 🔹PowerShell, Python, Bash 🔷Knowledge of Azure Security: 🔹Defender for Cloud, identity and access management (IAM), network security groups (NSGs), and encryption best practices. 🔷Branching strategies 🔷Continuous integration, deployment, delivery, and testing 🔷Modern DevSecOps and GitOps practices 🔷Monitoring and alerting More ❯
Posted:

Azure DevOps - SC Cleared

London Area, United Kingdom
Simon James IT Ltd
in several of the following technologies: 🔷Infrastructure as Code (IaC) tools: 🔹ARM templates, Azure Bicep 🔷Azure DevOps (ADO) and YAML Pipeline 🔷Logic Apps, Function Apps, Service Bus 🔷API Management Services (APIM) and APIs 🔷App Services, User Managed Identity 🔷Certificate management and renewal 🔷App Registration, Managed Identities, Key Vault, Storage Account 🔷Azure networking core components … subnets, NSG, Routing 🔷Azure Monitoring: 🔹Log Analytics Workspace (LAW), Application Insights (App Analytics) 🔷Scripting languages: 🔹PowerShell, Python, Bash 🔷Knowledge of Azure Security: 🔹Defender for Cloud, identity and access management (IAM), network security groups (NSGs), and encryption best practices. 🔷Branching strategies 🔷Continuous integration, deployment, delivery, and testing 🔷Modern DevSecOps and GitOps practices 🔷Monitoring and alerting More ❯
Posted:

Azure DevOps - SC Cleared

City of London, England, United Kingdom
Simon James IT Ltd
in several of the following technologies: Infrastructure as Code (IaC) tools: ARM templates, Azure Bicep Azure DevOps (ADO) and YAML Pipeline Logic Apps, Function Apps, Service Bus API Management Services (APIM) and APIs App Services, User Managed Identity Certificate management and renewal App Registration, Managed Identities, Key Vault, Storage Account Azure networking core components … subnets, NSG, Routing Azure Monitoring: Log Analytics Workspace (LAW), Application Insights (App Analytics) Scripting languages: PowerShell, Python, Bash Knowledge of Azure Security: Defender for Cloud, identity and access management (IAM), network security groups (NSGs), and encryption best practices. Branching strategies Continuous integration, deployment, delivery, and testing Modern DevSecOps and GitOps practices Monitoring and alerting More ❯
Posted:

Azure DevOps - SC Cleared

South East London, England, United Kingdom
Simon James IT Ltd
in several of the following technologies: Infrastructure as Code (IaC) tools: ARM templates, Azure Bicep Azure DevOps (ADO) and YAML Pipeline Logic Apps, Function Apps, Service Bus API Management Services (APIM) and APIs App Services, User Managed Identity Certificate management and renewal App Registration, Managed Identities, Key Vault, Storage Account Azure networking core components … subnets, NSG, Routing Azure Monitoring: Log Analytics Workspace (LAW), Application Insights (App Analytics) Scripting languages: PowerShell, Python, Bash Knowledge of Azure Security: Defender for Cloud, identity and access management (IAM), network security groups (NSGs), and encryption best practices. Branching strategies Continuous integration, deployment, delivery, and testing Modern DevSecOps and GitOps practices Monitoring and alerting More ❯
Posted:

Security Operations Manager

Reading, Berkshire, South East, United Kingdom
Hays
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & Access Management Provide expert technical leadership for identity and access management, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security and access management capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security and identity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

IT Administrator / Systems Administrator

Cambridge, Cambridgeshire, East Anglia, United Kingdom
Hybrid / WFH Options
AWD Online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identity and access management across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identity and access management, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
Employment Type: Permanent, Work From Home
Salary: £30,000
Posted:

IT Administrator

London, United Kingdom
Hybrid / WFH Options
Costello Medical
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identity and access management across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identity and access management, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Identity Access Management
England
10th Percentile
£45,000
25th Percentile
£52,000
Median
£75,000
75th Percentile
£90,000
90th Percentile
£116,250