Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Salt Search
Business Analyst within the IDAM 2.0 Programme , you will play a key role in delivering new systems and enhancing existing ones across the organisation's identityandaccess ecosystem. Acting as the bridge between business and technology, you will analyse needs, define requirements, and guide delivery teams to ensure the successful implementation of IAM solutions. This … role blends traditional Business Analysis expertise with a strong understanding of IdentityandAccessManagement principles, tools, and processes. Key Objectives Support the Project Lead in defining the scope, objectives, and constraints within the IAM domain. Collect, analyse, and document business and technical requirements, transforming them into actionable deliverables. Develop and maintain the benefits … standards. Required Skills and Experience 3-5 years' experience as a Business Analyst, ideally within cybersecurity, IAM, or a regulated IT environment. Strong understanding of IdentityandAccessManagement concepts, including access provisioning/deprovisioning, RBAC, JML processes, ServiceNow integration, and security standards (e.g. SAML, OAuth). Hands-on experience onboarding applications More ❯
Job description We have an exciting new opportunity for an Identity & AccessManagement Senior Architect to join the A&O Shearman London office. About the team The firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large andMore ❯
managing CyberArk core components ( PVWA,CPM,PSM vault ),EPM and SCA solutions. Strong understanding of cybersecurity principles, privileged accessmanagement, andIdentityandAccessManagement (IAM) Proficient in configuring and managing CyberArk components. Experience with integrating CyberArk solution with other IAM tools and Infrastructure. Strong knowledge of cloud platforms such … any programming languages . Professional certifications in CyberArk and/or information security (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) Must have CyberArk Implementation hands on experience. Privileged AccessManagement tool technical certification More ❯
international repute and one of the largest employers in Liverpool. They are looking to an IT Applications Support Manager to join their established IT Services team.This is a management role that combines operational oversight, technical strategy, and hands-on delivery across a broad portfolio of business-critical applications. Reporting into senior IT leadership, you will guide the development … design authority, leading on product configuration, integrations, service upgrades and best-practice processes. You will bring deep knowledge of IT support functions, with experience across tools such as IdentityAccessManagement, ITSM, and Microsoft enterprise technologies . Whilst not essential, knowledge of SailPoint or ServiceNow would be highly advantageous. You will also ensure effective … design to implementation and support- Experience leading multi-disciplinary teams and developing technology strategies and roadmaps- Experience working with ServiceNow, SailPoint, Atlassian tools and Microsoft platforms- Knowledge of Identity & AccessManagement technologies (highly desirable)- Ability to produce high-quality documentation and manage complex data flows and API integrations This is an outstanding opportunity for More ❯
ASAP | IR35: Outside | Clearance: SC required The Role We're seeking an experienced IAM/PAM Specialist to lead the design and delivery of greenfield IdentityandAccessManagementand Privileged AccessManagement solutions. You'll provide hands-on technical leadership, ensure secure-by-design implementation, and contribute to the … Responsibilities Lead end-to-end IAM/PAM design and delivery. Integrate IAM/PAM telemetry into SIEM tooling. Provide technical oversight for MSPs and vendors. Develop and manage Conditional Access, MFA, and RBAC policies. Mentor junior team members and build internal capability. Maintain IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven … IAM/PAM implementation experience (e.g. Entra ID, CyberArk, BeyondTrust). Hands-on with Azure AD/Entra ID , Conditional Access & Identity Protection. Understanding of OAuth2.0, SAML, OpenID Connect . Familiarity with ISO 27001, NIST CSF, CAF & GDPR . Experience leading or overseeing MSPs. Current SC clearance . Desirable: Knowledge of Microsoft Sentinel, Splunk, or Elastic More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Humanoid
IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identityandaccessmanagement, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google … Workspace, Slack, Miro etc.). Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM … Lead , who manages service process, managementand support The IT Director , to align on overall strategy, operational reliability, governance, and security maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching More ❯
IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identityandaccessmanagement, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google … Workspace, Slack, Miro etc.). Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM … Lead , who manages service process, managementand support The IT Director , to align on overall strategy, operational reliability, governance, and security maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching More ❯
recommends improvements and enhancements to mitigate risks and threats. Roles & Responsibilities Shaping, leading and delivering value through technology advisory consultancy and through guiding transformational delivery engagements Strong stakeholder managementand relationship building skills at senior levels that will enable consensus building and shaping technology direction Leading in the development and presentation of client proposals collaborating with teams across … proposals, that includes presentations, specimen RFI/RFP content, methodologies, toolkits and deliverables. The Security Architect will have a strong foundation in the design of identityandaccessmanagement, web service security, and data protection solutions implemented in a Java and AWS environment. They will have experience of creating high-level designs (HLDs) from … non-technical and technical stakeholders. Core skills and experience Architecture design (HLD, SAD) Cloud-native (Microservice, EDA) Amazon Web Services (AWS) Security Web Gateway (WAF, API Gateway, Nginx) Identity & AccessManagement (IAM, WSO2) Key management (KMS, Entrust) Database security (RDS, PostgreSQL) Network security (GardDuty, Shield) Security frameworks (e.g., OWASP, NIST) UK legislation More ❯
HLD) Location: Harbour Exchange Square, London Hybrid: 2 days to office Job Type: Permanent role JD: Experience in authoring substantial quality high level designs-Must IdentityandAccessManagement (IAM) is Must Expertise in producing security solutions Expertise in designing and integrating various security tools specially. Expertise in Infrastructure cloud solutions (AWS, GCP, Azure … architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
HLD) Location: Harbour Exchange Square, London Hybrid: 2 days to office Job Type: Permanent role JD: Experience in authoring substantial quality high level designs-Must IdentityandAccessManagement (IAM) is Must Expertise in producing security solutions Expertise in designing and integrating various security tools specially. Expertise in Infrastructure cloud solutions (AWS, GCP, Azure … architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
security tools and systems (e.g., firewalls, SIEM, IDS/IPS, endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user accessandidentitymanagement controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing … Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data Loss Prevention. • IdentityAccessManagement … deployment Azure AD, MFA, SSO, RBAC • Security auditing and monitoring. • Experience in deploying security solutions across business projects. • Excellent analytical and problem-solving abilities. • Strong communication skills and stakeholder management skills. EDUCATION & EXPERIENCE • Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). • 3–5+ years of experience in cybersecurity or information security More ❯
About the Role Support delivery of multiple identity, access, governance and onboarding initiatives by owning the business analysis activities end-to-end. Act as the bridge between business stakeholders and delivery teams, ensuring clarity, alignment and measurable outcomes. Key Responsibilities Own the BA deliverables across projects including onboarding, IDP integration, support/change processes, governance and … resolution. Act as the “voice of the business” in technical discussions, ensuring outcomes deliver business value. Maintain clear documentation for handover and future audit. Required Skills Strong stakeholder management: able to communicate confidently with execs, governance forums and delivery teams. Comfortable taking ownership of outcomes, not just producing requirements. Skilled in requirements elicitation, analysis and documentation. Experience with … process mapping (e.g. BPMN, swimlanes, Visio, Lucidchart, Miro). Strong facilitation and workshop skills. Familiar with IT service management concepts (e.g. JSM/ITIL) and governance processes. Knowledge of identity/accessmanagement concepts is a plus, but willingness and ability to learn specifics is more important. Excellent written and verbal communication More ❯
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
infrastructures at technical and managerial levels. Ability to conduct Red Team security testing tasks in GCP to continuously assess security posture in GCP platform Drive IdentityandAccessManagement (IAM), configuration management, and monitoring strategy for GCP platform. Provide security consultancy and engineering support for cloud security solutions including analysis and development … GCP security controls and best practices to secure cloud resources in a hybrid environment. Knowledge of VPC Service Controls is a plus. Deep expertise with IdentityandAccessManagement (IAM) in GCP, including but not limited, Workload Identity Federation, IAM role usage analysis, Organizational Constraints, Cloud Identity, etc. Proficiency in … this personal data with a client (or a third party working on behalf of the client) by email or by upload to the Client/third parties vendor management system. By giving us permission to send your CV to a client, this constitutes permission to share the personal data that would be necessary to consider your application, interview More ❯
expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identitymanagement, key management, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses to Requests for Proposals (RFPs), Requests for Information (RFIs), and … Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across IdentityandAccessManagement (IAM), key management, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of … cryptographic key management, Hardware Security Modules (HSMs), and Key Management Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. More ❯
expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identitymanagement, key management, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses to Requests for Proposals (RFPs), Requests for Information (RFIs), and … Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across IdentityandAccessManagement (IAM), key management, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of … cryptographic key management, Hardware Security Modules (HSMs), and Key Management Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. More ❯
cybersecurity industry is seeking an IAM BAU Process Analyst to join the team for a 6-month contract. You will support the transition of an IdentityandAccessManagement (IAM) programme into Business-as-Usual (BAU) operations, reporting to the Head of Identity. The role focuses on maintaining service quality and ensuring compliance with … transition to BAU. Align delivery with IAM Programme KPIs and approved service design. Provide business support and process analysis for IAM operations. Assist with Joiner, Mover, Leaver (JML) andaccessmanagement processes. Influence IAM service delivery and resolve non-technical IAM issues. Requirements Minimum 5 years’ experience in operational process analysis. Proven background in IAM lifecycle … processes (JML, accessmanagement). Familiarity with IAM platforms, tools, and service delivery frameworks. Strong stakeholder communication and influencing skills. Problem-solving mindset for operational IAM challenges. Ability to work independently and collaboratively in a BAU setting. SC clearance is required. Details Start date: January 5 2026 Duration: 6 months, potential for longer-term opportunity Day More ❯
cybersecurity industry is seeking an IAM BAU Process Analyst to join the team for a 6-month contract. You will support the transition of an IdentityandAccessManagement (IAM) programme into Business-as-Usual (BAU) operations, reporting to the Head of Identity. The role focuses on maintaining service quality and ensuring compliance with … transition to BAU. Align delivery with IAM Programme KPIs and approved service design. Provide business support and process analysis for IAM operations. Assist with Joiner, Mover, Leaver (JML) andaccessmanagement processes. Influence IAM service delivery and resolve non-technical IAM issues. Requirements Minimum 5 years’ experience in operational process analysis. Proven background in IAM lifecycle … processes (JML, accessmanagement). Familiarity with IAM platforms, tools, and service delivery frameworks. Strong stakeholder communication and influencing skills. Problem-solving mindset for operational IAM challenges. Ability to work independently and collaboratively in a BAU setting. SC clearance is required. Details Start date: January 5 2026 Duration: 6 months, potential for longer-term opportunity Day More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Noir
Software Development Manager - Enterprise Software - Peterborough/Hybrid (Key skills: Software Development Manager, Agile, Software Engineering Leadership, Product Delivery, Application Security, Identity & AccessManagement, .NET 4.8 & 8, SQL Server, Microservices, Cloud (AWS/Azure), DevOps, CI/CD, Jenkins, Ansible, Stakeholder Engagement, Resilience Engineering, Full Stack Development) Are you an experienced and inspiring software … cross-functional collaboration. You will manage agile teams working on a mix of internal and client-facing applications, with a strong focus on application security, identityandaccessmanagement, and platform resiliency. Working closely with architecture, design, infrastructure, and product teams, you will ensure the successful delivery of new and enhanced software solutions across More ❯
Partner who are seeking a highly skilled External Identity Architect to join their team.This is an exciting opportunity to work on cutting-edge identityandaccessmanagement projects, helping enterprise clients design and implement scalable solutions for external users using Microsoft Entra External ID (Azure AD B2C).Key ResponsibilitiesDesign, build, and maintain … AD B2C) solutions for customer- and partner-facing applications.Collaborate with full-stack development teams to integrate authentication and authorization flows across multiple platforms.Develop custom policies, user journeys, and secure identity workflows tailored to business needs.Provide guidance on identitymanagement best practices, authentication, and security.Lead architecture reviews, ensuring scalability, compliance, and performance.Mentor and support teams … identity solutions for enterprise environments.Deep understanding of OAuth2, OpenID Connect, and SAML protocols.Knowledge of API security, custom policies, and user journey configuration.Excellent communication, problem-solving, and stakeholder management skills.Desirable:Experience with large-scale consumer or partner identity deployments.Familiarity with CI/CD pipelines, DevOps practices, and cloud-native architectures.Relevant Microsoft identity or More ❯
Coventry, England, United Kingdom Hybrid/Remote Options
WEG Tech
Delivery Manager - (IDAM) - Hybrid 12 Months FTC Salary c£50,000 - £56,535 36.5 Hours Per Week 42 Days Holidays (Including Bank Hols) Hybrid Working – (1 – 2 Days in office per week) We are seeking an experienced … Delivery Manager for an exciting 12 Month FTC position within a leading university in the Midlands. We are seeking a Delivery Manager to lead strategic IdentityandAccessManagement (IDAM) implementation, supporting secure and seamless access to systems and data across academic, student and administrative communities The post will be working within … and effective delivery of the programme. You will also manage relationships with third-party suppliers, ensuring alignment with the University’s processes and monitoring SLAs, escalation procedures, and configuration management issues. Duties and responsibilities Project Delivery & Product Release Management Lead the planning, scheduling, implementation and tracking of project activities to ensure timely delivery of project andMore ❯
who are seeking a highly skilled External Identity Architect to join their team. This is an exciting opportunity to work on cutting-edge identityandaccessmanagement projects, helping enterprise clients design and implement scalable solutions for external users using Microsoft Entra External ID (Azure AD B2C). Key Responsibilities Design, build … solutions for customer- and partner-facing applications. Collaborate with full-stack development teams to integrate authentication and authorization flows across multiple platforms. Develop custom policies, user journeys, and secure identity workflows tailored to business needs. Provide guidance on identitymanagement best practices, authentication, and security. Lead architecture reviews, ensuring scalability, compliance, and performance. Mentor … solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable : Experience with large-scale consumer or partner identity deployments. Familiarity with CI/CD pipelines, DevOps practices, and cloud-native architectures. Relevant Microsoft identityMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
CPS Group (UK) Limited
who are seeking a highly skilled External Identity Architect to join their team. This is an exciting opportunity to work on cutting-edge identityandaccessmanagement projects, helping enterprise clients design and implement scalable solutions for external users using Microsoft Entra External ID (Azure AD B2C). Key Responsibilities Design, build … solutions for customer- and partner-facing applications. Collaborate with full-stack development teams to integrate authentication and authorization flows across multiple platforms. Develop custom policies, user journeys, and secure identity workflows tailored to business needs. Provide guidance on identitymanagement best practices, authentication, and security. Lead architecture reviews, ensuring scalability, compliance, and performance. Mentor … solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable: Experience with large-scale consumer or partner identity deployments. Familiarity with CI/CD pipelines, DevOps practices, and cloud-native architectures. Relevant Microsoft identityMore ❯