ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of … single box - we're looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We're building a world where Identity belongs to you. JOB PURPOSE: The Technical Support Engineer is an articulate and seasoned technical guru who understands and can appreciate the challenges organizations face in implementing and integrating … customers) Real passion for solving customer issues and advocating for their success, in a fast paced, highly technical environment. Ability to learn new technologies quickly. Excellent relationship management, customer service and communication skills in variety of forms (written, live chat, conference calls, in-person.) Ability to work independently with little direct supervision and as a part of a More ❯
of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in IdentityandAccessManagement, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture … a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office fit-outs, including tech like network infrastructure, AV andaccess controlSaaS migrations for acquisitions, including Microsoft 365 to Google Workspace What you'll need Experience leading on a range of technical projects across various technologies and platforms. Experience … & AccessManagement systems, including Okta, Microsoft Entra, JumpCloud, PingIdentity. Experience administering and troubleshooting Single Sign-On (SSO) technologies such as OAuth, OIDC and SAML andIdentity provisioning technologies such as SCIM. Understanding at a protocol level of Single Sign-On (SSO) andidentity provisioning technologies such as OAuth, OIDC, SAML andMore ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
using Azure DevOps and YAML . Support the migration of on-prem systems and workloads to Azure cloud services . Integrate and manage Azure Active Directory for secure identityandaccess management. Implement cloud governance aligned with security and compliance standards. Collaborate with stakeholders to ensure the delivery of robust, repeatable infrastructure. Contribute to the continuous … using Azure DevOps and YAML . Support the migration of on-prem systems and workloads to Azure cloud services . Integrate and manage Azure Active Directory for secure identityandaccess management. Implement cloud governance aligned with security and compliance standards. Collaborate with stakeholders to ensure the delivery of robust, repeatable infrastructure. Contribute to the continuous More ❯
more sensitive workloads to AWS. You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site to customers to deliver projects More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
components have access to the correct resources at the appropriate time, while preventing unauthorised accessand maintaining a secure environment. The IdentityandAccess Manager role heads up this crucial security function within the Cyber Security Team and will Lead strategic development and operational management of identity services. … Develop and manage identityandaccess related tooling and processes to ensure mature, efficient, and secure working practices. Be an advocate for best practices in IdentityandAccess Management. Ensure compliance and risk management standards are met. Main Responsibilities: Lead the IdentityandAccess function within … regular MI and reporting on the current state of identity related risks and controls, whilst managing a programme of work to continually reduce identityandaccess risks. Keep abreast of emerging and developing security threats, tactics and techniques. Helping the senior leadership team understand potential security problems including those that might arise from acquisitions More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton. Hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
team, you will design, develop, and maintain core authentication and authorisation services. Your work will enhance the security and usability of identity governance workflows andaccessmanagement for Palantirians and our customers globally. Your approach will emphasise secure-by-design principles, embedding security considerations into every phase of the software development lifecycle. … with minimal impact on productivity. You will also play a key role in mentoring teammates and leading projects, driving both individual and team growth. Core Responsibilities Architect and design new identityand security services with a focus on scalability and resiliency Develop scalable services for workforce, customer and workload authentication and authorisation Build services that help with mitigating … scale operational workflows in AWS, Azure and Google Cloud Platform (GCP) Design and build REST APIs that enable zero-touch, end-to-end automation of IdentityandAccessManagement resources Research and drive the implementation of secure authentication protocols (like passwordless auth) by collaborating with Security Engineers What We Value Ability to work backwards More ❯
AI ENGINEER Intragen are a leading IdentityandAccessManagement partner in Europe. With solutions spanning IAM, PAM, IGA and CIAM, utilising tools from One Identity, United Identity, Okta, SailPoint, CyberArk and Workato, Intragen are a trusted partner for securing identities for businesses. To support our internal innovation and enhance … English Key Responsibilities: Drive the development of AI/ML features to improve internal tools and automate business workflows across the business. Assist in adding AI functionality to identity security solutions (such as detecting unusual login patterns or automating access control suggestions). Collaborate with engineers, IAM consultants, and architects to learn and contribute to real … world AI use cases in cybersecurity. Help collect, clean, and prepare data for model training and analysis. Stay curious and up to date with developments in AI, identity, and security fields. Participate in internal research and proof-of-concept projects. Requirements: You must be an AI enthusiast that can bring innovative ideas to our exciting business. 12 months More ❯
and maintenance of the technology alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our Corporate Intranet ensuring that delivery … across the Company where corporate applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit teams. Develop and adapt innovation … Experience Required Significant and relevant progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability mapping, data managementMore ❯
Lead will be responsible for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g., GDPR) and addressing customer security … implement security controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerability management activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information security or IT risk/compliance … understanding of cloud environments (AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identityandaccessmanagement (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. Familiarity with a range of security tools for endpoint protection, SSO/IAM More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Artis Recruitment Ltd
optimise cloud resources, driving automation and efficiency Ensure high levels of uptime and strong disaster recovery planning for Azure services Enforce device and system security through Intune and Azure policy management Spearhead the shift from on-premise infrastructure to a cloud-first environment, including migrating from Active Directory to Entra ID Oversee the transition of device management … Strong scripting and automation skills using PowerShell, Python, or Bash Solid foundation in networking concepts (VPNs, Load Balancing, DNS, Firewalling, VNet peering, etc.) Expertise in identityandaccessmanagement, including Entra ID (formerly Azure AD), Conditional Access, RBAC, and endpoint protection Familiarity with Azure cost optimisation and billing best practices Hands-on More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also Have More ❯
and actively exploring opportunities for European and global reach. Our digital current account comes with all the essentials and more. Account holders receive a contactless Mastercard® debit card, access to key banking-like features, cashback rewards at major retailers, and an easy onboarding process with no credit checks or lengthy paperwork. At Suits Me®, we believe that everyone … teams to ensure IT operations meet regulatory obligations. Support vulnerability management efforts, including patching and system hardening. Assist in maintaining secure and efficient identityandaccessmanagement practices, including integration with M365 and Azure AD. Contribute to incident response planning and participate in post-incident reviews. Continuously improve IT security posture by … and the ability to respond quickly to technical issues. Good documentation skills and an ability to work with non-technical stakeholders to explain security concepts. Knowledge of endpoint management tools (e.g., Intune, SimpleMDM). Experience with SIEM tools and log analysis. Ability to work independently and manage multiple priorities in a dynamic environment. Standout candidates will also... Have More ❯