Manager to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity andIdentity & AccessManagement (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing … with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder managementand experience in matrixed environments. Proficiency in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
Manager to lead the end-to-end delivery of critical security projects for a global leader in financial market infrastructure. This role focuses on driving Security Maturity andIdentity & AccessManagement (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing … with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ITIL desirable). Strong stakeholder managementand experience in matrixed environments. Proficiency in More ❯
s critical information and relevant information systems, assuring the integrity, availability, authentication, confidentiality and non-repudiation. As well as the protection of information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Role Responsibilities Key responsibilities for this role may include: Lead and Manage all … the completion of IT Health Checks (ITHC) Co-ordinate and support with MOD and other authority assurance activities To support the Development and maintenance of our Information Security Management System (ISMS) to best support the Company's activities, including Risk Managementand Accreditation Document Sets (RMADS) and Company Security Policies. To examine any risks to the … Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, encryption, identityandaccessmanagement (IAM), and security information and event management (SIEM) systems. Strong understanding of security frameworks, standards, and regulations, including ISO 27001, NIST Cybersecurity Framework More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
service operations experience in the field of cyber security. You have experience in the design/implementation in multiple areas of cyber security, such as identityandaccessmanagement, infrastructure security, data security, application security, or incident detection and response. You've been hands-on as a software developer, system administrator, network engineer, or … on your knowledge and experience related to security. - Experience in cyber security design and implementation in one or more of the following areas (application security, identityandaccessmanagement/data protection/infrastructure security such as networks/logging and monitoring, incident detection and response). - Business level Korean reading, document writing, and … one or more of the following: Next Generation Firewalls, Web Application Firewalls, Intrusion Detection/Prevention, Incident Response, and Security Information and Event Management (SIEM), Identify andAccessManagement (IAM) controls. - Implementation experience with compliance frameworks such as NIST, PCI-DSS, ISO/IEC 27001, ISO/IEC 27017, FISC, etc Our inclusive culture More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Develop and enforce security policies, standards, and guidelines. Collaborate with the Compliance Manager/CISO to ensure adherence to regulatory requirements (e.g., GDPR, ISO 27001). Incident Response andManagement: Establish and maintain incident response plans and procedures. Lead technical response efforts during security incidents or breaches. Conduct post-incident analyses to prevent future occurrences. Collaboration: Promote a … tools like SIEM/SOAR (preferably Rapid7), IDS/IPS, vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identityandaccessmanagement, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or DevSecOps methodologies. Please click APPLY More ❯
with colleagues. This role has the option to grow towards either a principal engineering role (a technical specialist leader) or an engineering manager (a team leader with line management) position at Vivacity, through structured career progression pathways. About us At VivaCity, we make cities smarter, safer, and more sustainable. We have over 5,000 AI sensors around the … familiar with the problem space, and you know when and how to ask for help. Requirements for the role: Expertise in Apache Kafka (ideally Kafka Strimzi), including broker management, scaling, upgrades, and integration with high-throughput data pipelines. Experience managing PostgreSQL databases, including load analysis, query optimisation, and role management. Experience with modern cloud infrastructure as GCP/… common DevOps tools and CI/CD processes. Proficiency with infrastructure management tools (e.g. Ansible, Chef, Puppet) Knowledge of information security principles, including identityandaccessmanagementand authentication/authorisation processes. Experience in a start-up or scale-up environment. Passion for sustainability, transport or smart cities. You don't need More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
and maturity aligned to McDonald's Global Technology approaches Providing subject matter expertise and acting as incident lead in support of cyber security incidents Provide regular cadence of management reporting that identifies trends, priorities and opportunities for improvements which demonstrates a practice of continuous improvement and aligns to segment KPIs for the function What Team will I be … and working towards or obtained CISSP. Strong experience in technical cyber security role such as security analysis or engineering Excellent knowledge in key cyber security domains such as identityandaccessmanagement, risk management, network security and security operations Experience providing cyber subject-matter expertise for transformational security improvements in a complex … Technology organisation Proven experience at engaging and influencing stakeholders across departmental and organisational and global/segment stakeholders An excellent understanding of best practice within cyber security and risk management including standards such as ISO/IEC 27001, Cyber Essentials and NIST CSF Demonstrable creativity and a commitment to future-proofing processes and security controls in a fast More ❯
London, England, United Kingdom Hybrid / WFH Options
KPMG UK
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
Role: IdentityandAccessManagement (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
We are currently looking for an IdentityandAccessManagement SME to join one of our financial services clients, on a contract basis. The role requires someone who has extensive knowledge and experience in designing, implementing, and managing IdentityandAccessManagement systems. Acting as advisor and consultant … value of IAM to various stakeholders, including technical and non-technical audiences. Identify and design the most appropriate IAM solutions for specific organisational needs. Oversee the implementation and ongoing management of IAM systems, ensuring they are configured correctly and functioning effectively. Keep updated on the latest IAM trends and best practices, providing guidance on security, compliance, and performance. … controlling access to information and systems. Key Skills and Knowledge : Deep understanding of IAM principles: A strong grasp of authentication, authorization, access control, and user management processes. Familiarity with different IAM technologies: Knowledgeable about various IAM platforms, including IDM, PAM, and cloud-based solutions. Security expertise: Solid understanding of cybersecurity threats, vulnerabilities, and best More ❯
and maintenance of the technology alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our Corporate Intranet ensuring that delivery … across the Company where corporate applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit teams. Develop and adapt innovation … Experience Required Significant and relevant progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability mapping, data managementMore ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement : Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business : Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement: Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business: Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯