initial assessment and discovery phase of enterprise authentication systems. This role focuses on understanding and documenting existing Kerberos implementations , uncovering risks, and defining improvements to strengthen authentication and password management processes across complex environments. Key Responsibilities Lead the discovery phase for authentication and password management across large enterprise environments. Investigate existing Kerberos implementations , configurations, and integrations … Experience leading discovery and analysis phases within complex enterprise environments. Strong background in Active Directory, Windows Server security, and Linux Kerberos integration . Practical experience with password reset andidentity lifecycle management processes. Skilled in authentication troubleshooting tools (Wireshark, klist, setspn, event logs). Strong analytical and documentation skills — able to capture “as-is” states and … comfortable working with both technical and non-technical stakeholders. Desirable Experience documenting Kerberos-related operational processes and risks within government or regulated sectors. Familiarity with identityandaccessmanagement (IAM) platforms and password management solutions. Exposure to risk mitigation and remediation planning for authentication or identity services. More ❯
initial assessment and discovery phase of enterprise authentication systems. This role focuses on understanding and documenting existing Kerberos implementations , uncovering risks, and defining improvements to strengthen authentication and password management processes across complex environments. Key Responsibilities Lead the discovery phase for authentication and password management across large enterprise environments. Investigate existing Kerberos implementations , configurations, and integrations … Experience leading discovery and analysis phases within complex enterprise environments. Strong background in Active Directory, Windows Server security, and Linux Kerberos integration . Practical experience with password reset andidentity lifecycle management processes. Skilled in authentication troubleshooting tools (Wireshark, klist, setspn, event logs). Strong analytical and documentation skills — able to capture “as-is” states and … comfortable working with both technical and non-technical stakeholders. Desirable Experience documenting Kerberos-related operational processes and risks within government or regulated sectors. Familiarity with identityandaccessmanagement (IAM) platforms and password management solutions. Exposure to risk mitigation and remediation planning for authentication or identity services. More ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
Lead periodic risk and security assessments (e.g. penetration testing, threat modeling, audit readiness) for all product modules (registration, returns, payment, analytics). Oversee third-party/vendor risk management, especially for integrations with government tax systems or external data sources. Serve as the principal liaison with regulators, audit bodies, and government clients on security posture, compliance audits, certifications … for the business. Security Architecture & Operations Oversee secure design, architecture, and deployment of Digital Infrastructure Products across cloud, hybrid and on-premise infrastructure. Ensure strong identityandaccessmanagement, encryption (in transit and at rest), and cryptographic key management. Lead security operations functions: threat detection, incident response, forensic investigations, resiliency planning, and business continuity … frameworks (GDPR, DORA, local tax/financial regulatory requirements, cross-border data transfer frameworks). Strong track record in securing cloud-native/hybrid systems, identityandaccessmanagement, encryption & key management, threat detection, incident response, resilience, and secure development. Experience in data-sensitive environments, particularly dealing with personally identifiable data, government More ❯
Identity Manager | Permanent | £63,655 – £71,157 + benefits Location: Hybrid – London (1–2 days per week on-site) - this can be flexible I’m hiring for … an Identity Manager role with one of our key Higher Education clients. This is a pivotal position where you’ll take ownership of identityandaccessmanagement strategy, shaping the organisation’s move towards a cloud-first model. It’s a hands-on role with strategic influence, covering IAM design, lifecycle management … include: Leading the design and delivery of IAM solutions Managing platforms such as One Identity, EnsureID, Okta, and Azure AD/Entra ID Implementing SSO, MFA, andaccess governance controls Ensuring compliance with GDPR, ISO27001, and Cyber Essentials We are looking for: Proven IAM experience within a complex organisation (3+ years) Strong knowledge of One IdentityMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
Practicus
Identity Manager | Permanent | £63,655 – £71,157 + benefits Location: Hybrid – London (1–2 days per week on-site) - this can be flexible I’m hiring for … an Identity Manager role with one of our key Higher Education clients. This is a pivotal position where you’ll take ownership of identityandaccessmanagement strategy, shaping the organisation’s move towards a cloud-first model. It’s a hands-on role with strategic influence, covering IAM design, lifecycle management … include: Leading the design and delivery of IAM solutions Managing platforms such as One Identity, EnsureID, Okta, and Azure AD/Entra ID Implementing SSO, MFA, andaccess governance controls Ensuring compliance with GDPR, ISO27001, and Cyber Essentials We are looking for: Proven IAM experience within a complex organisation (3+ years) Strong knowledge of One IdentityMore ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
Initially based from the office, but hybrid after 3 months. Company description Focus on M365 New role based on company growth and tech investment Free access to company holiday homes Buy & sell holidays Discretionary annual bonus plus an additional Shared Reward Bonus Matched pension contribution Health cash plan plus Private medical insurance Life assurance and Critical illness cover … Travel season ticket loans and Ride to work scheme Free local gym access Local bar/restaurant discounts Please note: whilst this role is ultimately hybrid; during the first three months, you will be based full time from the office whilst you get up to speed. We re Together. For over 50 years, we ve helped thousands of … of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, data loss prevention (DLP), and compliance centre configurations. Identity & AccessManagement (IAM) Familiarity with conditional access policies, role-based access control (RBAC), andidentity lifecycle managementMore ❯
City of London, London, United Kingdom Hybrid/Remote Options
TRIA
to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & accessmanagement, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and … Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder managementand communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure More ❯
to: Global EDR consolidation (Microsoft Defender) MFA rollout Implementation of a new SIEM platform Key Responsibilities Lead the delivery of cyber security projects such as endpoint protection, vulnerability management, identity & accessmanagement, and network security. Develop and manage project plans, milestones, risks, and budgets. Coordinate delivery across regional teams, ensuring consistency and … Essential Skills & Experience Proven experience managing complex cyber security projects within multi-region or federated organisations. Strong technical understanding across key cyber domains within Microsoft environments. Excellent stakeholder managementand communication skills. Familiarity with structured project management methodologies (e.g. PRINCE2, PMP, Agile). Relevant security certifications such as CISSP, CISM, CompTIA Security+, or AWS/Azure More ❯
about enhancing lives through data and technology? We're offering a 12-month fixed term until 11 January 2027 Senior Project Manager role within our IdentityandAccessManagement (IAM) portfolio. IAM enables secure, reliable, and convenient access to patient data for over one million health and social care professionals via the … Care Identity Service, overseeing essential national authentication platforms. Our team supports products and services aimed at simplifying and securing authentication, identity verification, andaccessmanagement for staff. As Senior Project Manager, you'll be a vital member of our agile delivery team, leading the NHS National Single Sign-On programme and providing … every relevant level of decision making. Champion best practice by learning from experience and others, and encourage innovation throughout the organisation. Contribute to the evolution of project and programme management approaches and working methods across the organisation as part of a Project and Programme Management community of practice. Effectively monitor and manage budgets, following all organisational More ❯
Corsham, Wiltshire, England, United Kingdom Hybrid/Remote Options
Sanderson
Business Analyst with strong consulting instincts - someone who thrives on turning complex requirements into clear, actionable outcomes. You'll play a key role in delivering a range of Identity, Access, Governance, and Onboarding initiatives, bridging the gap between business needs and delivery teams. This is a hands-on role where you'll take ownership of the … technical discussions, ensuring that outcomes deliver real value. What You'll Bring Proven experience as a Business Analyst in consulting or client-facing environments . Strong communication and stakeholder management skills - comfortable engaging with execs, delivery teams, and governance boards. Confidence in taking ownership of deliverables and outcomes, not just documentation. Experience in requirements gathering, analysis, and process … mapping (e.g. BPMN, Visio, Lucidchart, Miro). Workshop facilitation and problem-solving expertise. Familiarity with IT Service Management or governance frameworks (JSM/ITIL experience desirable). A curious mindset and ability to quickly grasp new technologies - exposure to Identity & AccessManagement is a plus. Excellent written and verbal communication skills with More ❯
solutions against real-world threats. Strong cloud security engineering and/or architecture experience in the fundamental Cloud Security Domains - Governance, Risk and Control (GRC), IdentityandAccessManagement, Cloud Network and Compute Infrastructure Security, Data Protection (at-rest/in-transit), Workload Security, SIEM, Logging and Monitoring. Experience with Cloud Security Frameworks e.g. … threat modelling. Experience in Cloud Security Risk Assessment/Cloud Security Assurance. Strong engineering and/or architecture experience in the fundamental Cloud Security Domains - IdentityandAccessManagement, Cloud Network and Compute Infrastructure Security, Data Protection (at-rest/in-transit), Workload Security, SIEM, Logging and Monitoring. In depth knowledge of various Cloud … is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition andmanagement consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most More ❯
position is central to strengthening digital security, enabling innovation, and ensuring compliance across all business operations. Key Responsibilities Provide expert knowledge and guidance on security systems, cryptographic engineering, andidentitymanagement best practices. Design, develop, and implement protocols, algorithms, and software applications to safeguard confidential data and systems. Manage and protect secrets by ensuring secure generation … developers, architects, and security teams to align cryptographic and IAM solutions with business goals, regulatory standards, and internal security policies. Build, deploy, and maintain robust IdentityandAccessManagement (IAM) systems and frameworks that support organisational security objectives. Leadership and Collaboration Expectations Provide expert consultation, shaping policies and operational decisions while ensuring effectiveness across … effectively with stakeholders during service outages or security events. A strategic mindset focused on risk management, digital resilience, and the continuous improvement of identityandaccess controls. More ❯
knowledge of the Sarbanes-Oxley Act (Sections 302 and 404), COSO or COBIT frameworks, and risk-assessment practices; IAM & Segregation of Duties (SoD): Expertise in identityandaccessmanagement (IAM) principles, including least privilege and segregation of duties, within a SOX context; Audit & Documentation Skills: Ability to perform and document user access reviews, identify control deficiencies, and work with process owners on remediation; Process Management: Experience in evaluating new operations or processes for SOX implications and managing "Joiner, Mover, Leaver" (JML) processes to ensure compliance; Collaboration: Strong interpersonal skills to coordinate with internal and external auditors, as well as various departments (IT, HR, Finance); and Technical Acumen: Ability … days in the London (City) office and is inside IR35/Umbrella Company only. Key skills: IAM, IAM SOX Audit Control, IAM leaver process, IdentityandAccessManagement, SOX, Sarbanes-Oxley, COBIT, COSO, SoD, JML, GRC, banking, investment banking, financial services, London. More ❯
Central London, London, United Kingdom Hybrid/Remote Options
McCabe & Barton
across the organisation. Identity & AccessManagement - Expert knowledge of Active Directory, Azure AD/Entra ID, group policy management, and privileged access management. Experience with VIP account provisioning, security group memberships, RBAC, conditional access policies, MFA troubleshooting, and understanding of zero-trust security models and compliance requirements. Incident … analysis, and implementing preventative measures with detailed post-incident reporting. Network & Connectivity Excellence - Advanced understanding of TCP/IP, DNS, DHCP, VPN technologies, SD-WAN, wireless networking, and remote access solutions. Ability to rapidly diagnose and resolve connectivity issues for remote users, troubleshoot complex network problems, work with ISPs for home office connectivity, and ensure reliable access … including MDM solutions (Intune), VPN clients, secure email configurations, and mobile application troubleshooting. Expert in resolving issues for remote workers including home network setup, video conferencing quality, and secure access to corporate systems. Audio-Visual & Conferencing Systems - Proficient in supporting enterprise video conferencing platforms (Teams, Zoom), boardroom AV systems, presentation setups, and hybrid meeting technologies. Experience troubleshooting audio More ❯
City of London, London, United Kingdom Hybrid/Remote Options
McCabe & Barton
across the organisation. Identity & AccessManagement: Expert knowledge of Active Directory, Azure AD/Entra ID, group policy management, and privileged access management. Experience with VIP account provisioning, security group memberships, RBAC, conditional access policies, MFA troubleshooting, and understanding of zero-trust security models and compliance requirements. Incident … analysis, and implementing preventative measures with detailed post-incident reporting. Network & Connectivity Excellence: Advanced understanding of TCP/IP, DNS, DHCP, VPN technologies, SD-WAN, wireless networking, and remote access solutions. Ability to rapidly diagnose and resolve connectivity issues for remote users, troubleshoot complex network problems, work with ISPs for home office connectivity, and ensure reliable access … including MDM solutions (Intune), VPN clients, secure email configurations, and mobile application troubleshooting. Expert in resolving issues for remote workers including home network setup, video conferencing quality, and secure access to corporate systems. Audio-Visual & Conferencing Systems: Proficient in supporting enterprise video conferencing platforms (Teams, Zoom), boardroom AV systems, presentation setups, and hybrid meeting technologies. Experience troubleshooting audio More ❯
across the organisation. Identity & AccessManagement: Expert knowledge of Active Directory, Azure AD/Entra ID, group policy management, and privileged access management. Experience with VIP account provisioning, security group memberships, RBAC, conditional access policies, MFA troubleshooting, and understanding of zero-trust security models and compliance requirements. Incident … analysis, and implementing preventative measures with detailed post-incident reporting. Network & Connectivity Excellence: Advanced understanding of TCP/IP, DNS, DHCP, VPN technologies, SD-WAN, wireless networking, and remote access solutions. Ability to rapidly diagnose and resolve connectivity issues for remote users, troubleshoot complex network problems, work with ISPs for home office connectivity, and ensure reliable access … including MDM solutions (Intune), VPN clients, secure email configurations, and mobile application troubleshooting. Expert in resolving issues for remote workers including home network setup, video conferencing quality, and secure access to corporate systems. Audio-Visual & Conferencing Systems: Proficient in supporting enterprise video conferencing platforms (Teams, Zoom), boardroom AV systems, presentation setups, and hybrid meeting technologies. Experience troubleshooting audio More ❯
business risks and designing secure, scalable solutions for Bring Your Own Device (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies andidentityaccessmanagement Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure compliance and improve security posture Work closely … with cross-functional teams to implement best-practice security controls Provide guidance on device security, user access models, and threat mitigation strategies Skills Proven experience in enterprise security architecture Strong knowledge of authentication protocols, identitymanagementand endpoint security Ability to translate business needs into secure technical solutions Relevant security certifications (e.g., CISSP, CISM More ❯
business risks and designing secure, scalable solutions for Bring Your Own Device (BYOD) environments and modern authentication mechanisms. Analyse business and technical risks associated with BYOD policies andidentityaccessmanagement Design and architect secure authentication solutions aligned with organisational requirements Develop recommendations to mitigate threats, ensure compliance and improve security posture Work closely … with cross-functional teams to implement best-practice security controls Provide guidance on device security, user access models, and threat mitigation strategies Skills Proven experience in enterprise security architecture Strong knowledge of authentication protocols, identitymanagementand endpoint security Ability to translate business needs into secure technical solutions Relevant security certifications (e.g., CISSP, CISM More ❯
messaging and event-driven architectures. · Implement and maintain observability solutions, including logging, monitoring, and tracing, to ensure system health and performance. · Integrate applications with ForgeRock IdentityandAccessManagement (IAM) suite for authentication and authorization. · Troubleshoot and resolve technical issues across the application stack, including those related to observability, AWS SQS, and ForgeRock integrations. … practices. · Experience with version control systems (e.g., Git). · Experience with cloud platforms (e.g., AWS, Azure, GCP). Desirable Skills · Experience integrating applications with ForgeRock IdentityandAccessManagement (IAM) suite for authentication and authorization. · Experience with scripting languages (e.g., JavaScript, Groovy). · Knowledge of security best practices and common security vulnerabilities. · Experience with More ❯
messaging and event-driven architectures. · Implement and maintain observability solutions, including logging, monitoring, and tracing, to ensure system health and performance. · Integrate applications with ForgeRock IdentityandAccessManagement (IAM) suite for authentication and authorization. · Troubleshoot and resolve technical issues across the application stack, including those related to observability, AWS SQS, and ForgeRock integrations. … practices. · Experience with version control systems (e.g., Git). · Experience with cloud platforms (e.g., AWS, Azure, GCP). Desirable Skills · Experience integrating applications with ForgeRock IdentityandAccessManagement (IAM) suite for authentication and authorization. · Experience with scripting languages (e.g., JavaScript, Groovy). · Knowledge of security best practices and common security vulnerabilities. · Experience with More ❯
dartford, south east england, united kingdom Hybrid/Remote Options
Europa Worldwide Group
Prisma Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, andidentitymanagement to ensure robust and secure environments. Manage identityandaccessmanagement (IAM), encryption mechanisms, and key management systems across Azure. Maintain and optimise AKS environments, ensuring best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in … package Hybrid working Generous Time Off: Benefit from 25 days of annual leave. Enhanced Family Leave: Benefit from enhanced maternity, paternity, and adoption pay. Benefits portal: where you access a wide range of exclusive discounts, company benefits, wellbeing resources and much more. Wellbeing Focus: Access our employee wellbeing programme for your overall health and happiness. Referral More ❯