IDAM Engineer 12 Month Contract Onsite - London We're supporting a government client in strengthening their IdentityandAccessManagement (IDAM) capabilities and seeking an experienced IDAM Engineer to join the Live Services team. You … ll help maintain and monitor key identity infrastructure, support project delivery, and drive continuous service improvement. Key Responsibilities: Provide 2nd/3rd line support for Active Directory andIDAM solutions. Support privileged accessmanagementand certificate-based authentication. Collaborate with support and project teams to implement changes. Monitor system health, respond to incidents, and … Manager. Excellent communication and stakeholder engagement skills. ITIL or service management qualifications (desirable). If you're a proactive engineer with a passion for secure infrastructure andidentity services, apply now to join a high-performing team. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
service operations experience in the field of cyber security. You have experience in the design/implementation in multiple areas of cyber security, such as identityandaccessmanagement, infrastructure security, data security, application security, or incident detection and response. You've been hands-on as a software developer, system administrator, network engineer, or … on your knowledge and experience related to security. Experience in cyber security design and implementation in one or more of the following areas (application security, identityandaccessmanagement/data protection/infrastructure security such as networks/logging and monitoring, incident detection and response). Business level Korean reading, document writing, and … one or more of the following: Next Generation Firewalls, Web Application Firewalls, Intrusion Detection/Prevention, Incident Response, and Security Information and Event Management (SIEM), Identify andAccessManagement (IAM) controls. Implementation experience with compliance frameworks such as NIST, PCI-DSS, ISO/IEC 27001, ISO/IEC 27017, FISC, etc Amazon is an More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Project Support Office/Analyst ((Identity & AccessManagement Programme) - Banking Client - London Duration: 12 months Rate: 400 - 600 per day (inside of IR35) Hybrid: 8 days onsite per month, the rest is remote working Locations: London, Paris, Brussels or Amsterdam Role description PSO Analyst - Planning & Budgeting … Identity & AccessManagement Programme) We're looking for a hands-on PSO Analyst to help managing the budgeting and planning side in the IDAM programme, which has a portfolio of 20 projects. You'll work closely with project managers, the central PMO team and other delivery teams across to keep finances on track, support … slides and collect input from several contributors. Meeting minutes and action tracking: Summarise key discussion points, actions and decisions and follow-up with action owners. Quality assurance and controls management: Frequent checkpoints with project managers to maintain a high standard in terms of project life cycle documents, monthly reports and status updates, and steer and support where needed. More ❯
days weekly from office) We at Cofoge are looking for Technical Business Analyst in Sheffield. Project Overview Top bank is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement , Access Governance , Secrets Managementand API More ❯
month basis. If you are an experienced IAM professional with a background in the banking/financial services sector then this role is for you. Experience in Identity or AccessManagement Experience in standardising accessmanagement operating models, creating documentation, and onboarding new access models from projects . … of IAM principles such as least privilege, RBAC/ABAC, and Zero Trust. Define IAM requirements and work closely with cross-functional teams to ensure secure and compliant access controls. Transition IAM from projects into BAU IAM models Design and implement solutions for identity lifecycle management, authentication (MFA/SSO), andaccessMore ❯
What you’ll bring: Strong experience with Microsoft 365, CoPilot, and Intune deployment and migration. Deep knowledge of Microsoft productivity and security solutions. Expertise in identityandaccessmanagement, including Microsoft security tools. Familiarity with CoPilot capabilities and its impact on user productivity. Excellent communication and leadership skills. Proven experience facilitating complex customer workshops … and co-design sessions. It would be great if you had: Microsoft Cyber Security Expert or Identity & AccessManagement certifications. M365 Endpoint or Collaboration certification. Knowledge of Azure security services. Experience with M365 Security & Compliance and Apps Productivity Suite including SharePoint. If you are interested in this role but not sure if your skills More ❯
rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering … the future direction of secrets management within the bank Enabling identity sharing and single sign-on across different organisations or domains. Securing, controlling, and monitoring access to critical systems by privileged users. Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. CISSP/CISM certification SABSA or TOGAF certified preferred If you are interested More ❯
factored into and underpin development and operational decision making. Collaborate with cybersecurity peers to incorporate vulnerability management, governance, risk and compliance, cyber defense, continuous controls monitoring, andidentity governance into cybersecurity standards as a cohesive cybersecurity organization. Minimum Qualifications Bachelor's degree in a related discipline and 8 years of experience in a related field. The … on-premises environments. Relevant experience with application security, SaaS, network security, DevSecOps, and software-defined networking across a variety of environments and deployments. Knowledge of IdentityandAccessManagement (IAM), cryptography/key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC). More ❯
required About the Role We are seeking an experienced Lead DevOps Engineer to take ownership of the development and delivery of a strategic product roadmap for our clients Identity & AccessManagement (IAM) platform (SailPoint), alongside supporting systems that enhance cyber defence capability. This role requires a balance of technical leadership, CI/CD oversight … acting as an Employment Business in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged AccessManagement (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments … decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & Dependency Management Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME across IT … transformation teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & AccessManagement (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design More ❯
momentum without overengineering. Key Responsibilities Infrastructure & End-User Technology Own the internal IT environment, including Microsoft 365, Azure AD, endpoint management (Intune), and core collaboration and file management tools. Manage secure provisioning and support of laptops and devices (in partnership with our external IT provider). Ensure an excellent end-user experience for onboarding, access … workforce. Security, Risk & Governance Develop proportionate, business-friendly policies across acceptable use, access control, data handling, and device security. Implement practical controls for identityandaccessmanagement, encryption, endpoint protection, and incident response. Use your understanding of frameworks like Cyber Essentials, ISO 27001, or SOC 2 to guide scalable, pragmatic governance - even … IT in a high-growth organisation (50-500 headcount), ideally PE-backed or professional services-led. Strong practical knowledge of Microsoft 365, Azure AD, endpoint management, andidentity/access controls. Familiarity with frameworks like ISO27001, SOC 2, or NIST - and the judgment to apply what's appropriate for scale. Experience working with (or More ❯
related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
London, Finsbury Square, United Kingdom Hybrid / WFH Options
Morson Talent
Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation’s vulnerability management programme across multiple business units, technologies, and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerability management platform. You’ll be expected … Metrics - Power BI ServiceNow dashboards Excel (advanced analysis) Frameworks & Standards - NIST CSF, ISO 27001, OWASP, CE/CE+, GDPR, NIS2, ONR Security Domains/Capabilities - IdentityandAccessManagement (IAM) Network Security Data Protection Cloud Security Controls Application Security Security Monitoring Processes & Practices - Vulnerability Management Programmes Incident Response and Threat Assessment Emergency … Patch Governance Risk-based Prioritisation (CVEs, exploit intelligence, asset criticality, business impact) Audit Support (internal assurance, penetration test follow-ups, external audits) Exception and exemption management Automation of manual tasks Dashboarding for risk and SLA metrics What's on Offer - A leadership role with significant influence across a major UK organisation. Opportunity to work with a forward-thinking More ❯
workflows and eliminate manual tasks Familiarity with containerisation using Docker and orchestration best practices, along with configuration management using Ansible. Knowledge of secrets managementandaccess control using tools like Vault and IAM policies, ensuring secure handling of credentials and sensitive information Strong understanding of AWS security best practices, including encryption, patching, monitoring, least … environments Understanding of routing, traffic management, and load balancing, including configuration of NGINX and AWS-native tools for optimizing traffic flow. Experience with structured release and change management processes, including deployment governance, rollback strategies, and versioning control. Awareness of Java application environments and deployment considerations is a plus for supporting platform-wide consistency and integrations Proactive … Confluence and Bitbucket to support Agile delivery, documentation, collaboration, and CI/CD pipeline management Working knowledge of Active Directory and ADFS for identityandaccessmanagement, including group policy management, SSO, and integration with cloud authentication services Application Requirements: Hands-on experience: in any programming language e.g. python, bash More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQor SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level Design … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQ or SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £100,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with a proven track record in designing security roadmaps and influencing at executive level. You'll combine hands-on IAM expertise with strategic leadership … shaping global identity strategies while engaging with CISOs and senior stakeholders. Experience with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're looking for an Identity & AccessManagement (IAM) and Security specialist to own and drive a global … priorities into scalable, actionable security solutions. Key Responsibilities: Design, own, and deliver the Global Technology Operations security roadmap Build and implement IAM frameworks (Saviynt preferred; Okta, SailPoint, Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Partner with CISO and senior leadership to define security strategy and mitigate risks Provide expert guidance during More ❯
The Role This role involves the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security … scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: * Design, Implementation and Deployment: o Install, configure, and deploy ForgeRock and PingOne AIC components in various environments (on-premise, cloud, hybrid). o Develop custom workflows, authentication/authorization policies, and integrations using … with the IAM platforms. o Automate deployment and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. * Managementand Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to identify and resolve More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & AccessManagement (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled … in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
for risks, issues, and deadlines Deliver initiatives across people, process, technology, and governance Manage smaller internal cyber security projects outside the partner's scope Maintain programme governance, risk management, and resource planning Collaborate with senior stakeholders, IT teams, and external suppliers Drive change managementand embed new security disciplines across the organisation Monitor progress against KPIs … Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and … information security Deep understanding of Microsoft Azure security architecture Experience managing vendor selection and consultancy engagement Proven track record of delivering security programmes end to end Excellent stakeholder managementand communication skills Relevant certifications (e.g. SC-100, CISSP, CISM, ISO 27001 Lead Implementer More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯