Strategize the Future: Translate business goals into a robust architecture for IAM and cybersecurity. Champion Strategic Vision: Partner with customers to define Diageo's vision and capabilities in Identity and Access Management. Develop a 3-5 year roadmap to leverage technology for secure, streamlined access to critical assets, while prioritizing user experience. Architect of Change: Design target and interim … years of experience as an Enterprise Architect or a similar role. Experience and expertise in developing capability models, reference architecture and technology roadmap artefacts. In-depth knowledge of Identity & Access Management (IAM) principles and frameworks, Privileged Access Management, Identity Governance and B2B/B2C Identity & Access Management Experience with cybersecurity standard methodologies and frameworks … e.g., NIST CSF). Understanding of risk management and security concepts Experience with enterprise architecture frameworks (e.g., TOGAF, Zachman) is a plus. Familiarity with relevant IAM and security solutions and technologies. Experience working in a large and complex enterprise environment is a plus. Security certifications (e.g., CISSP, CISA) are a plus. Daring and strategic thin problem solvable to develop More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
out of our Bristol office. The Lead Solution Architect will lead and be responsible for the architecting and designing large complex supply chain and logistics solutions employing commercial fleet management, supply chain management, ERP, business intelligence, web portal and integration with 3PL systems using EDI and modern integration capabilities. What will I be doing? This role will work … and into sustainment of the solution. What does Leidos need from me? Previous experience as a Solution Architect on large customer projects, government customer experience preferred. Experience architecting Inventory Management, and complex multi-stakeholder logistics/supply chain management solutions using modern commercial solutionsi.e. Manufacturing Building IT solutions in Manufacturing/Repairs systems/domain, WMS Warehouse Management System, TMS Transport Management System, IBM Sterling OMS Order Management System, ERP, ESB, Procurement, Business Intelligence, Data Warehouse, etc.), within a government customer environment Experience managing Application Architecture and/or Integration architectural development at an enterprise level including knowledge of application integration concepts and technologies e.g. SOA, ESBs, EAI, XML, Web Services, E-Commerce Solutions, Service More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
portfolio of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture and identity & access management to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful architecture for large … guidance. Key Skills & Expertise Cybersecurity expertise in one or more domains: Security Operations, Threat & Vulnerability, IAM, Cryptography, Infrastructure, Application, Data, or Cloud. Strong understanding of cybersecurity practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & Access Management and Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged Access … Management (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
and build of SAP Security and GRC solutions Contribute to the SAP security strategy aligned with enterprise security requirements Interpret business requirements for SAP GRC modules including: Access Request Management (ARM), Access Risk Analysis (ARA) & Emergency Access Management (EAM) Ensure compliance with Segregation of Duty (SoD) and Sensitive Access rules in ARA Maintain Risk and Access Controls compliance … role build Support user provisioning and access review workflows in ARM Maintain and support SAP Security and GRC modules Provide technical support for SAP technologies including Centralised User Administration, IdentityManagement (IdM), Single Sign-On, and SAP GRC Ensure audit compliance and support privacy standards in reporting Share SAP Security best practices and mentor junior team members Stay … functional roles based on design outputs Strong understanding of SAP Security fundamentals, including authorization concepts, roles/activity groups, and user administration Expertise in SAP GRC modules: Access Request Management (ARM) Access Risk Analysis (ARA) Emergency Access Management (EAM) Ability to configure Segregation of Duty (SoD) and Sensitive Access rules in ARA Experience with SAP IdentityManagementMore ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
and build of SAP Security and GRC solutions Contribute to the SAP security strategy aligned with enterprise security requirements Interpret business requirements for SAP GRC modules including: Access Request Management (ARM), Access Risk Analysis (ARA) & Emergency Access Management (EAM) Ensure compliance with Segregation of Duty (SoD) and Sensitive Access rules in ARA Maintain Risk and Access Controls compliance … role build Support user provisioning and access review workflows in ARM Maintain and support SAP Security and GRC modules Provide technical support for SAP technologies including Centralised User Administration, IdentityManagement (IdM), Single Sign-On, and SAP GRC Ensure audit compliance and support privacy standards in reporting Share SAP Security best practices and mentor junior team members Stay … functional roles based on design outputs Strong understanding of SAP Security fundamentals, including authorization concepts, roles/activity groups, and user administration Expertise in SAP GRC modules: Access Request Management (ARM) Access Risk Analysis (ARA) Emergency Access Management (EAM) Ability to configure Segregation of Duty (SoD) and Sensitive Access rules in ARA Experience with SAP IdentityManagementMore ❯
Identity & Access Management (IDAM) Analyst – Contract Contract Details 6 months initially, with potential extension. £500 to £550 P/d Inside IR35 Full-time, Monday to Friday. Hybrid role (3 Days a week in London Office) We are seeking an experienced Identity & Access Management (IDAM) Analyst to join a growing technology function on a initial … role will suit a hands-on analyst with strong technical knowledge of IDAM and PAM platforms with a focus on Entra ID, as well as excellent communication and stakeholder management skills. Key Responsibilities Manage user account lifecycle (creation, modification, deletion). Ensure consistency of IDAM processes in line with policies and standards. Administer and support enterprise PAM solutions (e.g. … process changes. Requirements Significant hands-on experience in an IDAM or Security Analyst role. Solid knowledge of Microsoft Active Directory and Azure AD/Entra ID. Strong background in identitymanagement/provisioning tools (e.g., CyberArk, SailPoint, Saviynt, Microsoft Identity Manager). Experience supporting and troubleshooting enterprise PAM solutions. Strong analytical and problem-solving skills. Excellent communication More ❯
computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end … user support across all UKAEA sites. The IAM/PAM Specialist will play a pivotal role in designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the Security Information and Event Management (SIEM) and Security Operations Centre (SOC) capabilities. You will lead … development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. Define and maintain IAM and PAM architecture artefacts, roadmaps, and design standards aligned with enterprise governance. Monitor and manage security configurations across Active Directory, Microsoft More ❯
computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services. Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end … user support across all UKAEA sites. The IAM/PAM Specialist will play a pivotal role in designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the Security Information and Event Management (SIEM) and Security Operations Centre (SOC) capabilities. You will lead … development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements. Mentor and train junior team members, building internal capability in identity and access management. Define and maintain IAM and PAM architecture artefacts, roadmaps, and design standards aligned with enterprise governance. Monitor and manage security configurations across Active Directory, Microsoft More ❯
controls, and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identitymanagement, cloud security, network defence, vulnerability management, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers … and delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable … Committed to continuous improvement and professional development. Can-do attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
controls, and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identitymanagement, cloud security, network defence, vulnerability management, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers … and delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable … Committed to continuous improvement and professional development. “Can-do” attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
Identity and Access Management Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of application. Accenture is a leading global … which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identity and access governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG solutions with business … Design workflows for user provisioning, de-provisioning, access requests, approvals, and certifications. Collaborate with software development teams to integrate IAG solutions with existing IT infrastructure and applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identity and access management and recommend mitigation strategies. More ❯
who are delivering digital transformation to the MoD. They are seeking an experienced Solution Architect or Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. Key Duties and … Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality … delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems." Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business and security requirements. Collaborate with stakeholders across security, networking, infrastructure, and application teams to ensure integration and operational More ❯
who are delivering digital transformation to the MoD. They are seeking an experienced Solution Architect or Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. Key Duties and … Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality … delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems." Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business and security requirements. Collaborate with stakeholders across security, networking, infrastructure, and application teams to ensure integration and operational More ❯
Cox family of companies, we offer best-in-class benefits, a commitment to work-life balance, and an award-winning workplace experience. RapidScale is looking for a Privileged Access Management Engineer who will report to the Director of Cybersecurity Infrastructure and Operations. As a member of the Cybersecurity team, you will have the opportunity to design and deploy Privileged … Access Management solutions supporting internal and customer environments across the organization. Building on those experiences, you'll collaborate with the business to design enterprise architecture that enables new features, satisfies compliance objectives across multiple frameworks, and drive continuous improvement through automation. This position operates within a small team responsible for identity and privileged access management, that will … also possess the desire to drive efforts within their domain to completion and meet or exceed security requirements. Primary Responsibilities/Tasks: Provide subject matter expertise for Privileged Access Management services across multiple technologies with strong knowledge of compliance requirements and good security practices. Implementation of role-based access control (RBAC) for privileged user account access. Work closely with More ❯
would love to hear from you! Your opportunity The Head of Corporate Technology leads the strategy and execution of technology initiatives supporting all internal corporate functions of an asset management firm. This role ensures that enterprise applications and systems for departments like Finance, HR, Compliance, and Legal are robust, integrated, and aligned with business goals. By providing modern, efficient … to identify technology needs and prioritize projects. Facilitate solutions that improve process efficiency (such as automation of reporting and approvals) and enhance data integrity across corporate functions. Integration & Data Management: Ensure seamless data flow and integration between corporate systems (for example, linking finance and procurement systems or HR and payroll systems) to create a single source of truth. Implement … data governance practices so that management reports and analytics are accurate and timely. Governance, Risk & Compliance: Implement strong IT governance and security practices for all corporate tech systems. Proactively use technology to strengthen compliance and risk management for instance, deploying tools for monitoring regulatory compliance and internal controls, as asset managers are leveraging tech to transform compliance functions. More ❯
on site North West Wiltshire ( 5 days per week) Looking for a DV Cleared Solution/Technical Architect to lead the design and delivery of a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identity and access management (IAM) platform. This position requires … and technical execution, working closely with engineering teams to ensure successful delivery and ongoing support. Key Duties and Responsibilities Lead the end-to-end design of an on-premise identity solution using Microsoft Windows Server 2022, Active Directory (AD), and Active Directory Federation Services (ADFS). Take ownership of the solution architecture, setting technical direction, standards, and design principles … for the new identity environment." Lead and mentor engineers throughout implementation and support phases, ensuring high-quality delivery aligned with architectural intent. Design and configure federation services with other on-premise identity providers to enable secure and seamless authentication across systems. Develop and implement Single Sign-On (SSO) and Role-Based Access Control (RBAC) models aligned with business More ❯
will involve the following: * Endpoint monitoring and analysis. * Incident readiness and handling as part of the Computer Security Incident Response (CSIRT) team. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert … knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing * Knowledge of Cloud computing, computer network defence, identitymanagement, incident management and network security. * Significant experience within a SOC environment. * Incident response experience * Qualification/Certification in Cyber Security Desirable * IT Qualifications/Certifications such More ❯
seeking an experienced Security Tester to join an established testing team working on large scale, secure systems within the public sector. The role focuses on manual security testing, vulnerability management, and cyber resilience, supporting ongoing work around identity and access management and data protection. This is a hands on position where you will identify risks, validate security … in developing the team's cyber testing capability Technical Skills and Experience Essential Strong background in manual testing of systems and APIs Practical experience with security testing and vulnerability management Scripting skills in Python or JavaScript Familiarity with tools such as Jira, Confluence, Jenkins and Splunk Understanding of Azure security risks, particularly relating to storage and data protection Experience … twelve months validity remaining Ideal Candidate This position is suited to a hands on Security Tester or Quality Assurance Engineer with strong manual testing experience, solid understanding of vulnerability management and cyber resilience, and recent exposure to Azure and identitymanagement security. The successful candidate will be proactive, detail focused and capable of working effectively within a More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Exalto Consulting ltd
seeking an experienced Security Tester to join an established testing team working on large scale, secure systems within the public sector. The role focuses on manual security testing, vulnerability management, and cyber resilience, supporting ongoing work around identity and access management and data protection. This is a hands on position where you will identify risks, validate security … in developing the team's cyber testing capability Technical Skills and Experience Essential Strong background in manual testing of systems and APIs Practical experience with security testing and vulnerability management Scripting skills in Python or JavaScript Familiarity with tools such as Jira, Confluence, Jenkins and Splunk Understanding of Azure security risks, particularly relating to storage and data protection Experience … twelve months validity remaining Ideal Candidate This position is suited to a hands on Security Tester or Quality Assurance Engineer with strong manual testing experience, solid understanding of vulnerability management and cyber resilience, and recent exposure to Azure and identitymanagement security. The successful candidate will be proactive, detail focused and capable of working effectively within a More ❯
is responsible for designing, implementing, and managing strategies that protect sensitive data accessed and used by end users across the enterprise. The ideal candidate will have deep expertise in identity and access management (IAM), data loss prevention (DLP), secure authentication, and regulatory compliance. This position plays a critical role in ensuring that data protection measures align with business … and implement scalable data protection solutions across diverse platforms and user environments. Deep understanding of IAM technologies, authentication protocols, and secure access controls. Experience integrating data protection with enterprise identity platforms such as Okta, Azure AD, and Ping Identity. Strong knowledge of regulatory frameworks (e.g., GDPR, GLBA, HIPAA) and their impact on data protection strategies. Ability to collaborate across … protection strategies across enterprise systems. Design and implement secure authentication and authorization mechanisms using protocols such as OAuth 2.0, OpenID Connect, SAML, and Kerberos. Participate in the deployment and management of DLP, encryption, and secure collaboration tools. Collaborate with IAM, DLP, and application teams to integrate data protection into identity workflows. Define and enforce policies for secure data More ❯
TransUnion's Job Applicant Privacy Notice What We'll Bring: We Are TransUnion: TransUnion is a major credit reference agency, and we offer specialist services in fraud, identity and risk management, automated decisioning and demographics. We support organisations across a variety of sectors including finance, retail, telecommunications, utilities, gaming, government and insurance. What You'll Bring: We're … Marketing Solutions portfolio while balancing client satisfaction, timing and budget targets. You will develop project scopes, project plans, risk mitigation strategies, and manage the daily implementation commensurate with project management and TransUnion best practices. Essential Skills & Experience: Track record years of experience in analytics, strategy consulting and/or marketing consulting. Client facing experience required. Exceptional data, analytics, and … quantitative acumen with an understanding of solutions like marketing mix models, multi-touch attribution, customer segmentation, identitymanagement and/or data management platforms (or similar experiences in predictive analytics) Great to have: degree in Statistics, Data and/or Analytics (or equivalent) Significant presentation experience with client audiences explaining data, marketing optimization and analytics. Strong client More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Castlefield Recruitment
with internal and external teams to ensure secure and reliable operations. Manage and maintain key infrastructure components including servers, networks, and cloud platforms. Deliver technical input into IT service management and improvement projects. Ensure systems are compliant with relevant security standards and best practices. Identify and mitigate risks through regular assessments and reviews. Drive continuous improvement in monitoring, automation … cyber security principles, tooling, and incident response. Ability to troubleshoot complex technical issues across systems and services. Comfortable working both independently and collaboratively across teams. Familiarity with IT service management frameworks (e.g. ITIL) and best practice methodologies. Desirable Skills and Qualifications Relevant industry certifications (e.g. Microsoft Certified, CompTIA Security+, ITIL, etc.) Experience working in regulated environments with a focus … on data protection and compliance. Exposure to cloud security, identitymanagement, and endpoint protection tools. Understanding of vulnerability management and patching practices. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
etc.). Strong experience in architecting and engineering cloud-based solutions that meet both functional and non-functional requirements. Solid understanding of cloud networking and security (e.g. firewalls, encryption, identitymanagement). Experience implementing foundational cloud platforms (landing zones, IAM, VPC, networking). Proficiency with Infrastructure as Code (Terraform) and automation through CI/CD pipelines . Scripting … experience (e.g. Python, Bash, PowerShell ) for automation and DevOps integration. Proven experience leading small technical teams , including mentoring and delivery oversight. Strong communication and stakeholder management skills across technical and non-technical audiences. Desirable Experience with multi-cloud environments (AWS, Azure, hybrid). Familiarity with site reliability engineering (SRE) principles and production systems support. Experience driving innovation, technical transformation More ❯
opportunity is ideal for individuals who are detail-oriented, technically minded, and passionate about cloud technologies. Key Responsibilities: Manage and monitor Azure resources, subscriptions, and services. Support user access, identitymanagement, and security controls in Azure Active Directory. Assist in configuring and maintaining virtual machines, storage, and networking. Help implement backup, recovery, and disaster recovery solutions. Monitor system More ❯