our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts … and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. IdentityandAccessManagement: Manage user access controls, authentication mechanisms, andidentitymanagement systems to ensure appropriate levels … of accessand privilege. Have you got what it takes? At least 5 years of experience in information security, with a focus on hands-on security engineering and operations. In-depth knowledge of networking protocols, operating systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks More ❯
and their role in best-in-class operating models across industries. Complementary Technologies: Experience with associated technologies, including: Major cloud platforms (IaaS & PaaS) Identity & AccessManagement Data platforms Service management & automation IoT & Operational Technology API management (For Workday specialists) Strong … strong relationships with internal teams, senior leadership, and strategic alliance partners. Mentorship & Development: Support and mentor junior digital architects, fostering growth through formal managementand informal coaching. As part of your role you will also have the opportunity to contribute to the business and your own personal growth … architecting solutions for key operating model domains. Experience in at least two of the following areas, including their integration, is essential: Supply Chain Management Resource & Material Planning Product Lifecycle Management Inventory & Warehouse Management Manufacturing Execution Service Operations Customer Engagement, Experience & Relationship ManagementMore ❯
AWS services (such as Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon DynamoDB/RDS databases, AWS IdentityandAccessManagement (IAM), Security, Identity, & Compliance, etc). Solutions: Provide advice and support the delivery technical engagements with partners and … internally and externally, including technical activities such as solution review. Key job responsibilities Experience in IT/cyber security, security or compliance and security risk management, including privacy, controls, etc. Sound knowledge of cloud computing concepts, technologies and/or workload transition. Notable consulting experience and collaboration skills. … nothing we can't achieve in the cloud. - 7+ years of technical specialist, design and architecture experience - 10+ years of security, compliance and risk management experience - 5+ years of cloud based solution (AWS or equivalent), system, network and operating system experience - 7+ years of external or internal customer More ❯
A Career with Point72's Global Information Security Team Our Global Information Security team's mission is to ensure the development, implementation, andmanagement of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of security professionals with … solutions integrating on-premise AD with EntraID (Azure AD) and Okta Configure and manage AD delegation models following least privilege principles Implement and maintain identity protection solutions (eg: Defender for Identity, CrowdStrike Identity Protection, Quest Active Roles, etc) Develop and enforce security standards for … of Windows infrastructure Monitor and respond to security incidents related to Windows infrastructure Collaborate with infrastructure and security teams on identityandaccessmanagement initiatives What's required Bachelor's degree in Computer Science, Information Security, or related field 7+ years of experience in More ❯
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
South West London, London, United Kingdom Hybrid / WFH Options
Syntax Consultancy Limited
an IAM solutions projects for a global Telecommunications client. Start ASAP in May 2025. Key experience + tasks will include: IdentityandAccessManagement (IAM) Architect needed to join the Cloud Security Team. Hands-on experience with IAM tools such as Entra ID (Azure … IAM solutions within multi-cloud environments. Designing + implementing IAM solutions across AWS, GCP + Microsoft Entra environments. IAM standards, authentication protocols + identity frameworks: OAuth 2.0, SAML, OIDC, Kerberos, LDAP, SCIM, MFA, Zero Trust, Identity Federation + Identity as the Perimeter. Strong hands … on experience of IAM tools, cloud identity integration, security frameworks, authentication protocols, IAM systems, API gateway security + token-based access strategies. Integrating IAM controls with applications, APIs and cloud services to support secure accessand authentication. Implementing advanced IAM capabilities including: SSO, identityMore ❯
CD pipelines and managing complex integration challenges. Identity & AccessManagement: Deep understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Must be capable of effectively implementing and troubleshooting SSO and … belong. We value and respect individual differences, so all applications will receive fair and equal consideration without regard to ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability or age. More ❯
security designs. Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identityandaccessmanagement (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices … including secure coding and vulnerability management, throughout the software development lifecycle for all the projects. Drive Security Tool Implementation: Lead the evaluation, selection, and implementation of enterprise security tools and technologies that align with organizational business and security requirements, while owning and operating these tools effectively. Maintain Cyber … development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer IdentityandAccessManagement (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement More ❯
security designs. Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identityandaccessmanagement (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices … including secure coding and vulnerability management, throughout the software development lifecycle for all projects. Drive Security Tool Implementation: Lead the evaluation, selection, and implementation of enterprise security tools and technologies that align with organizational business and security requirements, while owning and operating these tools effectively. Maintain Cyber Resiliency … development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer IdentityandAccessManagement (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identitymanagementand data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange … become smarter and much more. More than 30,000 organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed … Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & AccessManagement (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of … IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to More ❯
developing Security team, your role will be varied including implementation and maintenance of all security tooling across the bank, development of automation scripts, andmanagement of AWS security including platform identity. The successful candidate will be an experienced security engineer with strong AWS and Terraform and scripting skills … and knowledge of cryptography and/or identityaccess management. The role is offered as hybrid and the office is in central London. No visa sponsorship is available at this time. Minimum Requirements Experience with AWS and Terraform Strong scripting skills Knowledge of cryptography and/… or identityaccessmanagement We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.' This is a great opportunity on a long running programme of work. Apply now for your CV to reach More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle." Experience: "5+ years experience in Hands-on ForgeRock developer experience with PingGateway, PingAM, PingIDM and PingDS working with Agile More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.? PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training More ❯
A growing and forward-thinking security team is looking for a skilled IAM Engineer with expertise in Identity Governance and Administration (IGA) to support a threat-led security programme and drive maturity across identityandaccess controls. With over 50 professionals already in the … team, this role plays a key part in evolving identity governance capabilities, enhancing access security, and ensuring robust management of digital identities. What you’ll be doing Design, implement, and support enterprise-grade IGA solutions – with a focus on SailPoint IdentityNow . Lead on … access certifications, application onboarding, and lifecycle management (Joiner, Mover, Leaver). Work closely with cross-functional teams to align IAM strategy with business needs. Develop and enforce IAM governance standards, controls, and best practices across cloud and on-prem environments. Monitor access logs, resolve More ❯
priorities, and overseeing daily operations. Invest in the professional growth of team members by identifying training opportunities and skill-building activities. Budgeting and Resource Management: Manage the IT budget and allocate resources for various projects and operational needs. Evaluate costs and seek opportunities to optimise spending, including renegotiating … Service Level Agreements (SLAs) for IT support to maintain high service availability. Manage Okta IAM to ensure secure and efficient identityandaccess management. Security and Risk Management: Implement and manage security measures to protect IT systems and data, including establishing security policies and … monitoring for potential threats. Perform regular risk assessments and implement disaster recovery plans. Vendor and Stakeholder Management: Maintain relationships with technology vendors and service providers, negotiating contracts and reviewing performance. Collaborate with department heads and senior management, gathering feedback to align IT strategies with business needs. More ❯
#IAM # IdentityAccessManagement # IAM Solution Architect #solution Architect #Ping #PingOne Advanced Identity Cloud A leading Finance company is looking for a I AM Solution Architect to work on partnering with their customers Below are the job specs for your … working : Hybrid (3 days in office) Duration : 6 months Contract+ possibility of extension Key Responsibilities 10-15+ years in ForgeRock \ PingOne Advanced Identity Cloud Strong is setting up and configuring PingOne Advanced Identity cloud. Proficiency in ForgeRock OpenAM, OpenDJ, OpenIDM, and OpenIG. Strong understanding of … identity lifecycle management, authentication, authorization, and federation. Familiarity with web protocols (HTTP, HTTPS, REST, SOAP) and security standards (OAuth, SAML, JWT). Experience with scripting and programming languages such as Java, Groovy, Python, or JavaScript. Experience in designing, implementing, and managing Continuous Integration/Continuous Deployment More ❯
solutions such as: GRC solutions aligned with clients' regulatory frameworks, risk assessments, and compliance goals. Security Operations (SecOps) solutions including incident response, vulnerability management, and security automation. Your skills and experience We seek a ServiceNow Developer with experience in GRC and/or SecOps who wants to grow … and delight customers. You will have: Experience with ServiceNow GRC: IRM Implementation Experience with ServiceNow SecOps and related products Knowledge in Identity & AccessManagement, Vulnerability Management, Security Monitoring, Incident Management, Platform, Network, and Application Security Broad experience across the Now … communication skills (written and spoken) Attention to detail Eligibility checks If offered a role at Capgemini, you will undergo pre-employment checks including identity, nationality or immigration status, employment history for the past 3 years, and criminal record checks. Some roles may require Security Check (SC) clearance, andMore ❯
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability More ❯
Responsibilities: MFA Implementation using Microsoft Common (MS Entra ID) Microsoft Entra ID (formerly known as Azure AD) is a comprehensive identityandaccessmanagement solution. Implementing Multi-Factor Authentication (MFA) using Microsoft Entra ID involves several steps and considerations: Deployment Planning: Before starting the … deployment, it's essential to plan and ensure all prerequisites are met. This includes having a cloud-only identity environment or a hybrid identity scenario where user identities are synchronized between on-premises Active Directory and Microsoft Entra ID. Choosing Authentication Methods: Various methods can be … and voice call verification Configuration: Setting up MFA involves configuring policies and settings in the Microsoft Entra admin center. This includes creating Conditional Access policies to require MFA for specific users or groups and managing the authentication methods available in the tenant. User Experience: Ensuring a smooth user More ❯
Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. · Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). · Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. · Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. · Familiarity with Android OS and Apple Mac OS, including iOS. · IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: · Proven experience in cloud-based IT support, systems administration More ❯
Qualifications: Strong experience in managing Microsoft 365 (in a cloud-based environment, Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. Familiarity with Android OS and Apple Mac OS, including iOS. IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: Proven experience in cloud-based IT support, systems administration More ❯
St Neots, Saint Neots, Cambridgeshire, United Kingdom
Interaction Recruitment
Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. · Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). · Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. · Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. · Familiarity with Android OS and Apple Mac OS, including iOS. · IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: · Proven experience in cloud-based IT support, systems administration More ❯
challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight andmanagement to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. … following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing, Ransomware and other key threats IDAM (IdentityandAccess Mgmt) JML (Joiners, Movers and Leavers Processes) Security Awareness Information Classification Experience (Nice to have) Previous experience managing More ❯