East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
Job description We have an exciting new opportunity for anIdentity & Access Management Senior Architectto join the A&O Shearman London office. About the team The firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Information security is not an … intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do The Identity and Access Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining … the identity and access management (IAM) security of the firms assets. This role is critical in translating the organisations IAM vision into a workable, mature and optimized function and service. This role requires extensive experience across all IAM core disciples including identitymanagement, identity governance and administration, privileged access, and conditional access. This role will More ❯
Select how often (in days) to receive an alert: Position Summary: We are seeking a skilled Senior Cloud Identity Administrator to join our Digital Identity team. The ideal candidate will be responsible for ongoing activities related to identity and authorization of our various cloud services and applications. This role requires familiarity with concepts related to identity, such as multifactor authentication and single sign-on. Key Responsibilities: Cloud Identity & Access Management: Lead and manage the design, implementation, andongoing optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign … On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in Entra. Access Control & Security: Establish and enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with More ❯
Job Description Identity and Access Management Consultant - London Location: England or Scotland Please Note: Any offer of employment is subject to satisfactory BPSS and SC security clearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or more spent outside of the UK) at the point of application. Accenture is a … which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: Architecture Design & Strategy: Design and implement comprehensive identity and access governance (IAG) strategies. Develop and maintain the architecture for identitymanagement, access control, authentication, and authorization solutions. Ensure the alignment of IAG solutions with business … Design workflows for user provisioning, de-provisioning, access requests, approvals, and certifications. Collaborate with software development teams to integrate IAG solutions with existing IT infrastructure and applications. Compliance & Risk Management: Ensure that IAG solutions comply with relevant regulations, such as GDPR, HIPAA, and SOX. Conduct risk assessments related to identity and access management and recommend mitigation strategies. More ❯
IT Operation s Platforms and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance More ❯
IT Infrastructure Operation s and Security Lead This role requires excellent management of a small team in IT along with managing stakeholders and vendors. You must be hands-on technically in IT Infrastructure. The IT Operational Platform and Security Lead is responsible for overseeing the organisation's IT operations, ensuring the stability, continuity, security, and efficiency of its technology … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. Security, Compliance & Risk Management Define and enforce cloud security policies, identitymanagement, and access controls to protect systems, networks, and data. Oversee the adoption of zero-trust security principles to enhance protection across cloud platforms. Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). Lead threat monitoring, detection, and response using cloud-native More ❯
environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. The role requires the ability to "lead by example" and perform line management for direct reports and manage service partners reporting into the function. Additional responsibilities are to respond to support requests by Key Responsibilities: IT Operations & Cloud Platform Management Lead … business continuity (BC) and disaster recovery (DR) plans, ensuring cloud- based solutions support resilience and rapid recovery. Manage Global Infrastructure (Cloud, On-prem and Virtual product) Solution Life Cycle Management and removal (via decommissioning and succession planning) of technical debt. Drive a document first culture to new and legacy platforms/solutions. Oversee management of the End User More ❯
Security Lead In summary the Client is looking to recruit an all-round individual with expert knowledge and hands-on experience of IT Infrastructure coupled with Security, Compliance & Risk Management You must have upwards of 10 years hands-on expertise in IT Infrastructure combined with Security and Risk - ideally from within the banking or insurance sector. The IT Operational … environment. While Microsoft technologies (Microsoft 365, Azure, Exchange Online) form a core part of the infrastructure, the role also encompasses broader enterprise IT systems, multi layered networking, security, data management, and third-party platforms that support global business operations and the associated applications estate. The role requires a proactive leader who can drive IT operational excellence, manage security risks … technically augment the team capabilities (when required) and have a detailed knowledge of technical IT support roles/services as a requirement, across multiple technical areas. Security, Compliance & Risk Management • Define and enforce cloud security policies, identitymanagement, and access controls to protect systems, networks, and data. • Oversee the adoption of zero-trust security principles to enhance More ❯
success in this role. We are seeking a driven individual with at least two years of practical experience in delivering and providing consulting services and business analysis within the Identity & Access Management domain. The Role This role will entail being involved in the analysis, design and delivery of identity and access management solutions, strategy & process improvement … with a focus on areas such as : Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. … major IAM technologies, as described above Comfortable working both as part of a team or individually, and familiar with the relevant non-technical project activities (i.e. project planning, stakeholder management, change management, schedule management, quality assurance, etc.) Strong written and verbal communication skills Basic understanding of risk and control principles and how processes are implemented and improved More ❯
requirements. This role reports to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through Identity and Access Management and Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … the technical capability to support the creation of a strategic direction for PAM and Authentication along with their tool set, together with supporting and maintaining overall service health, vendor management and ensuring the direction taken aligns with the overall strategic objectives of the organisation. The team handles day to day management of all CyberArk (PAM) and Authentication needs … of the business achieved by the following tools: Active Directory on premise, Entra ID for Cloud & CyberArk. There will need to be close co-ordination with the Access Management Team, so experience in this area would be required. The tool for Access Management is RSA IG&L. All technical documentation and platform standards must be kept up to More ❯
success in this role. We are seeking a driven individual with at least three years of practical experience in delivering and providing consulting services and business analysis within the Identity & Access Management domain. The ideal candidate willbe a Subject Matter Expert (SME) in analysing and helping deliveridentity and access management solutions,acrosssome ofthe following areas: Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally withgood conceptual/practical knowledge of: Access Management (inc.Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. SailPoint … SAP technologieswould be beneficial but not compulsory. Comfortable w orking both as part of a team, orindividually, and familiar with the relevant non-technicalproject activities(i.e.,project planning,stakeholder management,changemanagement, schedule management, qualityassurance, etc) Detailed understanding of business processes and how they contribute to enterpriserisks Strong written and verbal communication skills Ability to act as an SME More ❯
Role : One Identity Manager Location : London Contract Role Work Mode : Hybrid Job Description: 5 years + of recent major/customisation development work in One Identity Manager - focus on development and NOT support experience 5 years + SQL & relational databases 5 years + VB.NET & PowerShell scripting Well versed with IAM concepts (JML, PAM, RBAC, Recertification etc). As … a One Identity Manager Specialist, you will be responsible for designing, implementing, and maintaining One Identity Manager systems for our clients. This will include analyzing and understanding our clients' business requirements, creating custom solutions, and providing ongoing support. Key Responsibilities: - Collaborate with clients to gather and analyze requirements for One Identity Manager system - Design and implement One … Identity Manager systems according to clients' specific needs - Develop custom solutions using One Identity Manager tools and APIs - Provide ongoing support and troubleshooting for One Identity Manager systems - Stay updated on the latest One Identity Manager updates and technologies - Train clients' IT and security teams on how to use One Identity Manager effectively Qualifications - Minimum More ❯
A leading systems integrator is hiring an IAM Specialist to join their team. In this role, you will be responsible for the development, implementation, and ongoing maintenance of Identity and Access Management (IAM) policies and procedures. You will play a key role in identifying, assessing, and mitigating IAM-related risks to ensure the security and compliance of organizational … access systems. As an IAM Specialist, you will collaborate with cross-functional teams to deliver global IAM services, streamlining identity and access management across the business. Your proactive approach will help maintain a secure environment, ensuring access is granted based on the principles of least privilege while meeting business needs. This is an excellent opportunity to contribute to … a secure and efficient IAM framework while supporting a leading organization in the systems integration space. If you have experience in IAM solutions, risk management, and security best practices, apply now! Responsibilities: Provide consultancy on IAM Best Practices (technical, governance & process) to different stakeholders/teams. Overall responsibility for the development and maintenance of IAM policies and procedures, encompassing More ❯
Westminster, Greater London, England Hybrid / WFH Options
Parliamentary Digital Service
to the security of our nation's democracy. It enables the UK Parliament to run smoothly, function efficiently and operate transparently, and when you join us as Lead Digital Identity Engineer, you'll focus on the design, implementation and maintenance of our core infrastructure platforms. We are seeking a highly skilled and experienced Lead Digital Identity Engineer to … join our team within the Platforms Directorate. As the Lead Digital Identity Engineer, you will play a critical role in the design, implementation, and maintenance of core infrastructure platforms. You will provide expert technical guidance and leadership to ensure secure, highly available, reliable, and performant digital identity platforms, enabling both Houses of Parliament to meet their strategic and … business objectives. Supports the design, implementation, and maintenance of digital identity platforms, aligned with the department's strategic objectives and focused on providing an excellent customer service. Provide expert technical guidance on digital identity technologies, methodologies, and best practices. Collaborate with stakeholders to understand business requirements and design scalable and resilient digital identity solutions. Evaluate emerging technologies More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Parliamentary Digital Service
to the security of our nation's democracy. It enables the UK Parliament to run smoothly, function efficiently and operate transparently, and when you join us as Lead Digital Identity Engineer, you'll focus on the design, implementation and maintenance of our core infrastructure platforms. We are seeking a highly skilled and experienced Lead Digital Identity Engineer to … join our team within the Platforms Directorate. As the Lead Digital Identity Engineer, you will play a critical role in the design, implementation, and maintenance of core infrastructure platforms. You will provide expert technical guidance and leadership to ensure secure, highly available, reliable, and performant digital identity platforms, enabling both Houses of Parliament to meet their strategic and … business objectives. Supports the design, implementation, and maintenance of digital identity platforms, aligned with the department's strategic objectives and focused on providing an excellent customer service. Provide expert technical guidance on digital identity technologies, methodologies, and best practices. Collaborate with stakeholders to understand business requirements and design scalable and resilient digital identity solutions. Evaluate emerging technologies More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Run-Time Group Ltd
/Landing Zones Core responsibilities of an Azure Infrastructure or Cloud Engineer especially in designing, deploying, and managing cloud infrastructure. Intune/AVD (Azure Virtual Desktop) experience in endpoint management and virtual desktop infrastructure , common in cloud ops or endpoint management roles. Azure ENTRA/PIM (Privileged IdentityManagement) identity and access management knowledge More ❯
Role : Oracle Identity Manager Location : London Job Description : Job Summary: We are seeking a skilled and experienced Oracle Identity Manager (OIM) professional to join our Identity and Access Management (IAM) team. The ideal candidate will play a critical role in the design, development, implementation, and support of enterprise-level identitymanagement solutions using Oracle … Identity Manager. Key Responsibilities: Design, deploy, and maintain Oracle Identity Manager solutions to manage user lifecycle (provisioning, deprovisioning, role management). Integrate OIM with enterprise systems, directories (LDAP, AD), and third-party applications. Customize workflows, adapters, connectors, and approval processes within OIM. Develop and maintain SOA composites for OIM. Troubleshoot and resolve technical issues related to user … maintenance, upgrades, and patches for OIM and related components. Ensure compliance with security policies and audit requirements. Work closely with security, application, and infrastructure teams to define and enforce identity governance. Document system configurations, processes, and support procedures. Provide technical leadership and mentoring to junior team members. Required Qualifications: Bachelor's degree in Computer Science, Information Technology, or a More ❯
the business - someone who can lead with clarity, build with empathy, and bring a mix of technical depth and sound judgment. There's loads to get stuck into, from identitymanagement and scripting to device management and scalable tooling, areas where most of our work sits and where we need thoughtful, sustainable solutions. You'll play an … experience across all areas of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in Identity and Access Management, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture … SaaS and hardware. Lead and manage complex technical projects with multiple stakeholders from around the business. Examples of some TechOps projects include Rollout of, and migration to, a new identity provider mac OS and Windows MDM migration Rollout of a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office More ❯
small group of our most strategic, large international customers Leading, driving and owning client-specific technical investigations Managing and driving to conclusion connection requests for new banks Oversight and management of new TPP (Third Party Provider) on-boarding requests Close interaction with the existing Level 1 customer support team (whose focus is on the remaining customer base) Drive to … pragmatic solutions Confident in making decisions during investigation and delivery activities What you will need to be successful 2+ years of experience in technical support, implementation or technical account management roles working within Fintech, software, banking businesses or payments industry. Technical Familiarity with REST API is a must Knowledge of banking security, authentication technologies and identitymanagement … or extensive knowledge of the payments marketplace is a must. Prior knowledge or exposure to Open Banking ecosystem would be a plus Knowledge of banking security, authentication technologies and identitymanagement solutions Service Delivery and Support Truly passionate about customer delivery and support - with high levels of resilience Previous project management/account management experience with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
IT Systems Engineer for an initial 3-6 month contract to drive solutions, optimise systems, and strengthen enterprise security. Responsibilities: The IT Systems Engineer will focus on enterprise endpoint management, identity and access solutions, and process automation. This position is initially contract-only, with the potential for full-time conversion based on performance and business needs. Provide support … and engineering expertise for enterprise IT systems. Manage and optimise endpoint environments using VMware Workspace ONE . Administer identity and access management using Okta and Active Directory . Develop and maintain PowerShell automation scripts to streamline IT processes. Support privileged access security initiatives leveraging CyberArk . Troubleshoot escalated issues, coordinate with internal teams, and ensure timely resolution. Document … environment. Familiarity with enterprise IT security and compliance best practices. Excellent communication skills and a service-oriented mindset. Knowledge of ITIL processes or other structured support frameworks. Experience integrating identitymanagement and endpoint security solutions. Organisation: Initial 3-6 month contract with the potential to transition to a full-time role. London-based position with a hybrid working More ❯
its actual implementation. Responsibilities: Cloud Security Design and Implementation: Help lead the design and deployment of security solutions for cloud platforms (AWS, Azure, GCP), including network and compute security, identitymanagement, and cloud security posture management (CSPM). Automation and Monitoring: Build automated solutions for real-time security monitoring, logging, and alerting in cloud environments. Leverage native … cloud services and third-party tools for runtime security monitoring and anomaly detection. Security Tooling: Evaluate, implement, and manage cloud-native security tools and platforms for endpoint security, identitymanagement (IAM), and CSPM. Qualifications: Experience: 7+ years in SRE, infrastructure engineering or similar, with a strong focus on security, including 2+ years in a senior or staff engineering More ❯
delivery and support of TMG's business facing applications in the Productivity and Corporate stack, with specific focus on, but not limited to; Google Workspace (G Suite) Okta Workforce IdentityManagement Working in a build and run structure the team promotes the ongoing improvement of these services by providing engineering resources for project work, as well as BAU … ways of solving business challenges and/or improving working practices in the cloud should be something that excites and drives you. Similarly, you will have extensive experience of IdentityManagement, ideally having previously administered an Okta tenant of similar size or larger. A firm understanding of OIDC and SAML integrations, as well as profile sourcing for HR … Driven Identity, is essential. A working knowledge of Okta Workflows will be beneficial as these form the backbone of our implementation. A working knowledge of the fundamentals of GCP is also essential, support of Windows server based systems is an advantage. Good, effective communication and change management underpins everything we do. Mentoring and guiding more inexperienced members will More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Xcede Recruitment Solutions
on leadership role focused on operational excellence and coordination of a small but capable internal team, while supporting strategic initiatives led by the CIO. Key Responsibilties: Team Leadership: Line management of 3 internal IT staff (plus indirect oversight of the Service Desk via the Senior IT Service Delivery Manager). Service Operations: Oversee day-to-day IT service operations … including incident response, request fulfilment, device lifecycle management, and end-user support across 1,000 users in over 100 sites. Infrastructure Oversight: Coordinate management of cloud-based infrastructure (primarily Azure, with one key system on AWS) and device estate (Windows laptops, Samsung Android mobiles). Security Posture Maintenance: Support the Infrastructure & Security Manager in operationalising security controls, patch … management, identitymanagement (Entra ID), and compliance with organisational security frameworks. Collaboration: Act as liaison between IT and key departments across the business to ensure IT services align with operational needs. Escalation Point: Serve as the primary point of escalation for service delivery and support issues. Documentation & Knowledge Management: Ensure accurate and current documentation exists for More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Xcede
on leadership role focused on operational excellence and coordination of a small but capable internal team, while supporting strategic initiatives led by the CIO. Key Responsibilties: Team Leadership: Line management of 3 internal IT staff (plus indirect oversight of the Service Desk via the Senior IT Service Delivery Manager). Service Operations: Oversee day-to-day IT service operations … including incident response, request fulfilment, device lifecycle management, and end-user support across ~1,000 users in over 100 sites. Infrastructure Oversight: Coordinate management of cloud-based infrastructure (primarily Azure, with one key system on AWS) and device estate (Windows laptops, Samsung Android mobiles). Security Posture Maintenance: Support the Infrastructure & Security Manager in operationalising security controls, patch … management, identitymanagement (Entra ID), and compliance with organisational security frameworks. Collaboration: Act as liaison between IT and key departments across the business to ensure IT services align with operational needs. Escalation Point: Serve as the primary point of escalation for service delivery and support issues. Documentation & Knowledge Management: Ensure accurate and current documentation exists for More ❯
services that matter Preferred Tech Stack Expertise Cloud Infrastructure: AWS (EKS, RDS, Aurora, ElastiCache, Kafka, IAM) Secure Hosting: Experience working with air-gapped or government-secure environments Container & Cluster Management: Docker, Kubernetes, Rancher, Jenkins, Helm Monitoring & Observability: Prometheus, Grafana, ELK Stack, Dynatrace Secrets & IdentityManagement: HashiCorp Vault, Keycloak CI/CD & DevOps Tooling: Jenkins, Git, ServiceNow, Trivy … Ensure all services are compliant with security standards and support the change and release governance model. Build and maintain infrastructure components like event streaming (Kafka), databases (Aurora, RDS, Redis), identitymanagement (Keycloak), and caching layers. Enhance and maintain CI/CD tooling and self-service developer pipelines for tenant teams. Proactively manage and resolve tech debt by working … roadmap, collaborating with internal/external platform and infrastructure teams to support scalable and resilient services. Support critical national infrastructure tasks including platform deployments, incident/problem/change management, and continual service improvement (ITIL-aligned). Use and integrate ServiceNow (or its successor) to track and manage changes, incidents, requests, and problem records. Support replication services, match engines More ❯
services that matter Preferred Tech Stack Expertise Cloud Infrastructure: AWS (EKS, RDS, Aurora, ElastiCache, Kafka, IAM) Secure Hosting: Experience working with air-gapped or government-secure environments Container & Cluster Management: Docker, Kubernetes, Rancher, Jenkins, Helm Monitoring & Observability: Prometheus, Grafana, ELK Stack, Dynatrace Secrets & IdentityManagement: HashiCorp Vault, Keycloak CI/CD & DevOps Tooling: Jenkins, Git, ServiceNow, Trivy … Ensure all services are compliant with security standards and support the change and release governance model. Build and maintain infrastructure components like event streaming (Kafka), databases (Aurora, RDS, Redis), identitymanagement (Keycloak), and caching layers. Enhance and maintain CI/CD tooling and self-service developer pipelines for tenant teams. Proactively manage and resolve tech debt by working … roadmap, collaborating with internal/external platform and infrastructure teams to support scalable and resilient services. Support critical national infrastructure tasks including platform deployments, incident/problem/change management, and continual service improvement (ITIL-aligned). Use and integrate ServiceNow (or its successor) to track and manage changes, incidents, requests, and problem records. Support replication services, match engines More ❯