for us. In January, we announced a game changing deal to become part of the IG Group. We'll continue to operate as an independent business while gaining access to the resources and support of an established leader in the space. This year, we're accelerating our roadmap and taking our products to the next level. We're … a comprehensive cloud security program in partnership with DevOps and Platform teams. Define Policies and Implement Key Controls: Develop and enforce cloud security policies, including IdentityandAccessManagement (IAM) , Web Application Firewalls (WAFs) , and network segmentation strategies . Review System Architecture and Design: Conduct in-depth architecture and infrastructure reviews to uncover insecure … as-code, CI/CD pipelines, and cloud-native applications. Deploy and Manage Security Tooling: Select, implement, and operate key tools across GCP , such as Cloud Armor , Cloud Identity , Security Command Center , and VPC Service Controls for ongoing threat detection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage More ❯
and application issues, driving resolution end-to-end. Collaborate with development teams, infrastructure, and vendors to diagnose and resolve bugs, performance issues, and outages. Lead application upgrades, patch management, UAT, and post-deployment support. Ensure data integrity, system reliability, and compliance with internal IT governance and policies. Develop and maintain technical documentation, support procedures, and knowledge base articles. … configurations. Familiarity with macOS, iOS, iPadOS. Jamf Pro or Kandji experience. Basic SQL proficiency. Experience with Java and Oracle-based applications. Experience with Azure Virtual Desktop and cloud identity/access management. Basic Linux skills. Strong understanding of network protocols and troubleshooting skills. Familiarity with PAM tools like BeyondTrust is a plus. Scripting or automation skills More ❯
playbooks for most frequent or critical incident types. 2+ years of working with security tools such as SIEM, Analytics & Intelligence, Intrusion Detection, Email Forensics, Data Loss Protection, andIdentity & Access Management. Solid understanding of system and security controls on at least two OSs (Windows, Linux/Unix, and MacOS (Advantage). Familiarity with cloud infrastructure (e.g. … Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure). Fireblocks' mission is to enable every business to easily and securely access digital assets and cryptocurrencies. In order to do that, we strongly believe our workforce should be as diverse as our clients, and this is why we embrace diversity andMore ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
Scarborough, Yorkshire, United Kingdom Hybrid / WFH Options
Intello Technologies Inc
Select how often (in days) to receive an alert: Senior Software Developer - IdentityAccessManagement (IAM) Location: Scarborough, ON, CA, Burnaby, BC, CA, Calgary, AB, CA, Edmonton, AB, CA, Ottawa, ON, CA, Toronto, ON, CA, Vancouver, BC, CA Jobs by Category: Technology Solutions Job Function: Engineering & Development Status: Full Time Schedule: Regular Join our … TELUS entities. What you will do Design, develop, and implement high-quality Identity platform solutions and enhancements Utilize Identity domain knowledge, including OAuth, SAML, andIdentity provider customization, to implement secure and scalable authentication and authorization mechanisms. Lead and mentor junior developers in best practices and coding standards. Collaborate with product managers, architects, and … remarkable human outcomes in a digital world. You'll find our engaging, high-performance culture personally fulfilling, professionally challenging, and financially rewarding. We're committed to diversity and equitable access to employment opportunities based on ability. Your unique contributions and talents will be valued and respected here. When you join our team, you're helping us make the More ❯
Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth knowledge of Conditional Access, Azure Active Directory (Azure AD), andidentity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid … identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, andaccess reviews. Monitor and respond to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth knowledge of Conditional Access, Azure Active Directory (Azure AD), andidentity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid … identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, andaccess reviews. Monitor and respond to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on More ❯
IAM Security Engineer Job Description Who we are looking for State Street cyber IdentityandAccessManagement is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. A robust strategy, architecting zero trust building blocks, deployment, and a passion for effecting change across the … the organization Collaborative leadership and work style with the ability to effectively interact with and earn the trust of peers, CTO, development teams across the organization Project and process management skills, including proven ability to manage multiple projects simultaneously. Self-starter with a keen sense of ownership and commitment to work, and passion for delivering results. Education & Preferred … around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs andaccess to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. State Street's Speak Up More ❯
Senior Software Engineer - IdentityandAccessManagement (f/m/d) Join Contentful as a Senior Software Engineer and take a central role in enhancing our IdentityandAccessManagement ( IAM ) capabilities. Our platform serves billions of requests daily, with customers trusting us with their content-making … with a track record of developing practical solutions that drive product growth. Team Player : Excellent English communication skills with proven ability to work effectively in collaborative environments. Time Management : Strong organizational skills with ability to prioritize tasks in fast-paced settings. Development Practices : Experience with continuous development methods ( XP experience is beneficial). Initiative : Self-motivated with a … are proud to be an equal opportunity employer. All qualified applications will receive consideration for employment without regard to race, color, national origin, religion, sexual orientation, gender, gender identity, age, physical dis ability, or length of time spent unemployed. We invite you to apply and join us! If you need reasonable accommodations at any point during the application More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity Verification Product Owner needs a … and make informed decisions. Here's a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including … Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk management principles and the More ❯
any adjustments to assist you in applying, please contact We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identityandaccessmanagement efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. The … Governance Access Manager at Nottingham Building Society: - Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security … federation solutions (e.g., Okta, Azure AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work with stakeholders to define and enforce user access policies and workflows. About you: - Experience: Extensive background in accessmanagement, IGA implementation, and endpoint security. Knowledge: Familiarity with industry best practices andMore ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
Engineer to join our cyber security team! Working alongside the team you will help to design, develop, and mature the company's cybersecurity capability, including the selection, implementation, andmanagement of security tools/technologies, focused on detection, prevention, and analysis of security threats. This role offers a great opportunity to help define and shape the security function … needs. Support the definition, execution and continuous improvement of key cybersecurity processes including vulnerability & patch management, security incident response, security monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist with developing and maintaining security policies, processes and incident response management plans and playbooks. Prepare and document standard … technology development & acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at increasing enterprise security capabilities e.g., identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 2 years' experience in a Security Engineer/Analyst role focusing on designing and implementing security solutions andMore ❯
pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & AccessManagement (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially available IAM tools such … is proficient in directory services like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. The consultant is also proficient in developing scripts to automate the provisioning and migration of identities across … Cloud, OT, IOT and enterprise IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in IdentityandAccessManagement (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high-level and low-level design More ❯
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
EC2M, Coleman Street, Greater London, Broad Street, United Kingdom
Qualserv Consulting Limited
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of … single box - we're looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We're building a world where Identity belongs to you. JOB PURPOSE: The Technical Support Engineer is an articulate and seasoned technical guru who understands and can appreciate the challenges organizations face in implementing and integrating … customers) Real passion for solving customer issues and advocating for their success, in a fast paced, highly technical environment. Ability to learn new technologies quickly. Excellent relationship management, customer service and communication skills in variety of forms (written, live chat, conference calls, in-person.) Ability to work independently with little direct supervision and as a part of a More ❯
of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in IdentityandAccessManagement, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture … a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office fit-outs, including tech like network infrastructure, AV andaccess controlSaaS migrations for acquisitions, including Microsoft 365 to Google Workspace What you'll need Experience leading on a range of technical projects across various technologies and platforms. Experience … & AccessManagement systems, including Okta, Microsoft Entra, JumpCloud, PingIdentity. Experience administering and troubleshooting Single Sign-On (SSO) technologies such as OAuth, OIDC and SAML andIdentity provisioning technologies such as SCIM. Understanding at a protocol level of Single Sign-On (SSO) andidentity provisioning technologies such as OAuth, OIDC, SAML andMore ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯