and a desire to keep learning. About iC Consult At iC Consult, we are the leading independent consultancy, systems integrator, and managed services provider for IdentityandAccessManagement (IAM), with over 800 experts worldwide. What You’ll Do Support the design, implementation, andmanagement of IAM solutions for enterprise clients. Learn … to configure and deploy technologies. Work closely with experienced consultants to solve real-world identity challenges. Gain hands-on experience across IAM projects. … What You’ll Bring A degree in Computer Science, IT, Cybersecurity, or related field (or equivalent practical experience). Interest in cybersecurity and/or identityandaccess management. What We Offer Structured training and mentoring from IAM experts. Support to gain industry certifications. Exposure to leading global clients and cutting-edge technologies. Collaborative culture. Competitive More ❯
AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure, and troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and … and Incident Response Monitor AWS security alerts and incidents using AWS tools. Respond to and mitigate threats in real-time, conducting post-incident analysis and documentation. Risk and Compliance Management Conduct regular security assessments and audits to ensure compliance with industry standards (ISO 27001, SOC 2, etc.). Develop strategies to address vulnerabilities and mitigate risks. Collaboration and … Expertise in Checkpoint Firewall managementand troubleshooting Proficiency in Infrastructure as Code (IaC) tools like AWS CloudFormation and Terraform In-depth knowledge of IdentityandAccessManagement (IAM), VPC security, and encryption techniques Experience with network defense, vulnerability management, and incident response Familiarity with DevSecOps and integrating security within CI More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … front-end technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
bring to the team: Enthusiasm for collaboration and excellent communication skills (written and verbal). An interest in keeping up with emerging tools, techniques, and technologies. Effective time managementand organisational skills. A flexible and Agile way of working within a fast paced and everchanging environment. Attention to detail with a pragmatic and enthusiastic attitude to work. Desirable … front-end technologies Understanding the nature of asynchronous programming, its quirks and workarounds. Understanding of database schemas and query languages. Knowledge of source control technologies Awareness of security identity, accessmanagementand authentication using products This role will require you to be willing and eligible to undergo a high level of UK security clearance More ❯
security strategy. Role Description Develop, implement, and maintain cutting-edge security solutions to protect sensitive systems and data. Act as a subject matter expert on security engineering, encryption, andaccess management. Conduct regular audits, identify vulnerabilities, and drive remediation initiatives across infrastructure and applications. Collaborate with cross-functional teams to ensure cryptographic and IAM solutions align with business … in Identity & AccessManagement (IAM) and cryptographic technologies. Skilled in conducting risk assessments, vulnerability analysis, and developing secure protocols. Excellent communication and stakeholder management skills, with the ability to influence decision-making. Desired Skills Advanced knowledge of internal controls, governance, and audit frameworks. Experience leading or mentoring teams, particularly within a complex More ❯
reviews ensuring secure integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army … & accessmanagement, and secure system integration. Skilled in architectural modelling (Sparx EA) and familiarity with Defence standards and frameworks. Excellent communication and stakeholder management across technical and non-technical teams. More ❯
Andover, Hampshire, South East, United Kingdom Hybrid/Remote Options
Data Careers
reviews ensuring secure integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army … & accessmanagement, and secure system integration. Skilled in architectural modelling (Sparx EA) and familiarity with Defence standards and frameworks. Excellent communication and stakeholder management across technical and non-technical teams. More ❯
this opening, the following experience is required: Wealth of experience in Security and/or DevSecOps capacities (at least 4-5 years) Strong knowledge of Security practices, including Identity & AccessManagement Hands-on Cloud experience with GCP (AWS is also a nice to have) Capable across IaC and Automation from a Cloud/DevOps More ❯
this opening, the following experience is required: Wealth of experience in Security and/or DevSecOps capacities (at least 4-5 years) Strong knowledge of Security practices, including Identity & AccessManagement Hands-on Cloud experience with GCP (AWS is also a nice to have) Capable across IaC and Automation from a Cloud/DevOps More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
EMEA Channel Account Manager Location: London (Hybrid) Territory: UK&I Industries: Agnostic Selling: IdentityAccessManagement (IAM), Public Key Infrastructure (PKI), Crypto Agility, and Digital Trust Solutions Compensation: £220K OTE About the business: This global leader in digital trust and cybersecurity enables organisations to secure every digital identity, machine, and interaction across … compliance at scale, trusted by some of the world’s largest enterprises, service providers, and governments. With innovation rooted in cryptographic agility, zero trust, and automated certificate lifecycle management , they’re defining the future of secure digital transformation across industries. The Position: As Channel Account Manager for UK&I, you’ll own a strategic, partner-led territory responsible More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Amberes
EMEA Channel Account Manager Location: London (Hybrid) Territory: UK&I Industries: Agnostic Selling: IdentityAccessManagement (IAM), Public Key Infrastructure (PKI), Crypto Agility, and Digital Trust Solutions Compensation: £220K OTE About the business: This global leader in digital trust and cybersecurity enables organisations to secure every digital identity, machine, and interaction across … compliance at scale, trusted by some of the world’s largest enterprises, service providers, and governments. With innovation rooted in cryptographic agility, zero trust, and automated certificate lifecycle management , they’re defining the future of secure digital transformation across industries. The Position: As Channel Account Manager for UK&I, you’ll own a strategic, partner-led territory responsible More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Atrium Workforce Solutions Ltd
/Hybrid (hybrid: 2 days in office) Contract Type: Contract Duration: 12 months Sector: Banking Good understanding of Cyber Security Standards and compliance needs and including Network Security, Identity & AccessManagement, Data Security, and Cyber Governance Strong and experienced professional able to derive and drive the remediation activities (with minimum guidance from CISO) for … a complex technology divestment process Strong stakeholder management skills able to engage with key stakeholders including, coordinating with RTB and CTB Teams and teams within wider CISO and Technology functions. Strong organisational and project reporting skills. Attention to details and at the same time ability to communicate complex issues in simplest terms for the higher management. Ability to More ❯
Contract Solution Architect - Identity & AccessManagement (DV Cleared) Location: Wiltshire Duration: 9 months initial Rate: £700 per day Clearance: Active and transferable DV clearance required Nationality Requirement: Sole British nationals only Overview We are seeking a highly experienced Solution Architect or Technical Architect to lead the design and delivery of a greenfield, on-premise More ❯
vision and delivery. Every day will bring fresh challenges as you collaborate with teams across the business to shape what is being built. You'll be driving Security, Identity & AccessManagement, and system resiliency alongside feature development. What We're Looking For Experienced in leading Software engineering teams. You would have been a Developer More ❯
Oracle Database Developer-IAM Project Oracle Database Developer with expereince of Oracle RDBMS (v19c or later), is urgently needed to support our higher education client their Identity & AccessManagement (IAM) project on a 12-month contract. Oracle Database Developer-IAM Project-Essential Expereince Oracle RDBMS - version 19 or later: good knowledge of its structure More ❯
Oracle Database Developer-IAM Project Oracle Database Developer with expereince of Oracle RDBMS (v19c or later), is urgently needed to support our higher education client their Identity & AccessManagement (IAM) project on a 12-month contract. Oracle Database Developer-IAM Project-Essential Expereince Oracle RDBMS - version 19 or later: good knowledge of its structure More ❯
Containerisation and orchestration (Docker, Kubernetes) Modern development frameworks (React, Node.js, Next.js, Python) Databases such as DynamoDB, MongoDB, or RDS CI/CD pipelines (GitHub Actions) Identityandaccessmanagement (SSO, federated identity, Okta) Exposure to high-availability architectures, monitoring, and troubleshooting Strong communication skills, with the ability to engage both technical andMore ❯
Oracle Database Developer-IAM Project Oracle Database Developer with expereince of Oracle RDBMS (v19c or later), is urgently needed to support our higher education client their Identity & AccessManagement (IAM) project on a 12-month contract. Oracle Database Developer-IAM Project-Essential Expereince Oracle RDBMS - version 19 or later: good knowledge of its structure More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Principal Consultant, you'll work directly with major enterprise customers, playing a strategic role in advisory, design … engagements Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Sanderson
using tools like GitHub Actions , Terraform , and Argo CD for seamless and secure deployments. Enhance observability using Prometheus , Grafana , Datadog , and CloudWatch , enabling proactive incident prevention. Own incident managementand post-mortem practices — guiding the team through challenges calmly and driving meaningful improvement. Collaborate with global engineering and product teams to align architectural standards and deliver strategic initiatives. … with messaging, caching, and database systems — Kafka, Redis, MongoDB, Cassandra, PostgreSQL. Hands-on experience in monitoring, observability, and incident response frameworks using modern tooling. Strong leadership, mentoring, and stakeholder management skills — able to scale teams, set OKRs, and foster engineering excellence. An ability to remain composed, analytical, and decisive in high-pressure, production-critical scenarios. Desirable Experience Deep … flows , and transaction risk monitoring . Proven ability to deliver platform migrations or Open Banking integrations. Cross-cloud exposure (AWS and GCP). Experience integrating identityandaccessmanagement systems (e.g. Ping Identity, OAuth2 frameworks). Experience leading initiatives in regulated environments or supporting compliance with operational resilience standards. Who You Are More ❯
using tools like GitHub Actions , Terraform , and Argo CD for seamless and secure deployments. Enhance observability using Prometheus , Grafana , Datadog , and CloudWatch , enabling proactive incident prevention. Own incident managementand post-mortem practices — guiding the team through challenges calmly and driving meaningful improvement. Collaborate with global engineering and product teams to align architectural standards and deliver strategic initiatives. … with messaging, caching, and database systems — Kafka, Redis, MongoDB, Cassandra, PostgreSQL. Hands-on experience in monitoring, observability, and incident response frameworks using modern tooling. Strong leadership, mentoring, and stakeholder management skills — able to scale teams, set OKRs, and foster engineering excellence. An ability to remain composed, analytical, and decisive in high-pressure, production-critical scenarios. Desirable Experience Deep … flows , and transaction risk monitoring . Proven ability to deliver platform migrations or Open Banking integrations. Cross-cloud exposure (AWS and GCP). Experience integrating identityandaccessmanagement systems (e.g. Ping Identity, OAuth2 frameworks). Experience leading initiatives in regulated environments or supporting compliance with operational resilience standards. Who You Are More ❯