Identity Management Jobs in England

51 to 75 of 170 Identity Management Jobs in England

Power Platform Engineer

London, Canary Wharf, United Kingdom
Ada Meher
Developer - London Hybrid - £60,000 I am looking for a Senior Power Platform Developer to join my client, an independent global insurance and investment management company, based in London. This company provide a wide range of managed services to mutuals across different verticals. Services include claims, underwriting and risk … management and compliance, and more. This role offers the opportunity to work with cutting-edge technologies, designing and delivering innovative solutions that drive business efficiency and digital transformation in a dynamic and fast-paced industry. The ideal candidate will bring expertise in the Microsoft Power Platform suite and a … Power BI, and Dynamics 365, to deliver robust and innovative business applications. Strong knowledge of Microsoft Dataverse, with a particular focus on efficient data management practices, scalable solutions, and ensuring data security across various applications. Extensive experience in setting up and managing CI/CD pipelines for Power Platform More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Software Engineer-Forgerock

Knutsford, Cheshire, North West, United Kingdom
Hybrid / WFH Options
LA International Computer Consultants Ltd
a plus. Primary Skills- PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. Identity and Access Management domain, tools, products, protocols, taxonomy, identity management, authentication, authorization, identity federation, single sign on, OAuth2, OIDC, PKI … custom managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.' This is a great opportunity on a long running programme of work. Apply now for your CV to reach More ❯
Employment Type: Contract, Work From Home
Rate: £450 - £500 per day
Posted:

Senior Architect - Information Security

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
Action For Humanity
hands-on experience in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer … firewalls, VPNs, SD-WAN, and Virtual Desktop Infrastructure (VDI) is a plus. Your key responsibilities will include: 1. Microsoft Security & Identity Management Design and implement Zero Trust Security Architecture within Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and Privileged … Access Management (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

R&D OT Network Security Engineer

Stevenage, Hertfordshire, United Kingdom
Hybrid / WFH Options
GlaxoSmithKline
specify network changes, assuring continued network availability. The OT Network Security Engineer will support Site Focal Point with technical insight necessary for secure file management according to policies and have a role in new system implementation and incident response. It is key for the OT Network Security Engineer to … controls such as segmentation to isolate different parts of the OT environment, zoning to secure conduits for communication between zones and firewall management. Change Management: Implement change control processes to ensure that network changes are appropriate tested and approved without disruption to critical OT operations. Incident Management: Support … the technical response to operational technology-related incidents, ensuring rapid resolution to minimize downtime and operational disruption. Device Management: Harden devices such as switches, routers, firewalls by partnering and coordinating with the R&D OT Security Team and other key stakeholders aligned to GSK standards and proportionate to risk. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Director, Technical Account Management

London, United Kingdom
Okta, Inc
Get to know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world … putting Identity at the heart of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we're looking for lifelong learners and people who can make us better with their unique experiences. Join … our team! We're building a world where Identity belongs to you. Love our Customers is our Value at Okta. The Okta Customer First Team lives and breathes this every day. A critical element of Okta's strategy is helping our customers accelerate their time to value and expand More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

Luton, England, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

Luton, south west england, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

Luton, south east england, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Cyber Security Analyst

luton, bedfordshire, east anglia, United Kingdom
Hybrid / WFH Options
Crimson
multitask, prioritize workload, and manage competing demands. • Experience in analyzing IT logs and event sources is preferred. • Monitor and administer Security Information and Event Management (SIEM). • Malware analysis and forensics research. • Understanding/differentiation of intrusion attempts and false positives. • Investigation tracking and threat resolution. • Familiarity with data … UTMs. • Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing techniques. • Strong knowledge of cloud computing, network defence, identity management, incident management, and network security. • Extensive experience in a Security Operations Centre (SOC) environment with a proven background in incident response. More ❯
Posted:

Senior Software Engineer - Client Identity

City of London, London, United Kingdom
Hybrid / WFH Options
McGregor Boyall Associates Limited
Job Title: Senior Software Engineer - Client Identity Location: Hybrid (Manchester/London) About the Role Join our newly formed cybersecurity team and take on a crucial role in protecting clients across the UK and Europe. As a Senior Software Engineer in the Client Identity team, you'll work … all layers, from databases to Content Delivery Networks (CDNs). Implement secure authentication solutions, including Multi-Factor Authentication (MFA) and Passkeys. Integrate with leading identity providers such as Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and prevent account takeover attempts by malicious actors. Improve … consuming web services with Node.js. Familiarity with NestJS and microservices architectures is a plus. Solid understanding of REST APIs and cloud security principles, including Identity and Access Management (IAM), networking, and encryption. Excellent communication skills, with the ability to effectively communicate complex technical concepts to both technical and More ❯
Employment Type: Permanent
Posted:

Senior Software Engineer - Client Identity

london (city of london), south east england, United Kingdom
Hybrid / WFH Options
McGregor Boyall
Job Title: Senior Software Engineer - Client Identity Location: Hybrid (Manchester/London) About the Role Join our newly formed cybersecurity team and take on a crucial role in protecting clients across the UK and Europe. As a Senior Software Engineer in the Client Identity team, you'll work … all layers, from databases to Content Delivery Networks (CDNs). Implement secure authentication solutions, including Multi-Factor Authentication (MFA) and Passkeys. Integrate with leading identity providers such as Auth0, Transmit Security, and Ping Identity. Build and maintain solutions to detect and prevent account takeover attempts by malicious actors. Improve … consuming web services with Node.js. Familiarity with NestJS and microservices architectures is a plus. Solid understanding of REST APIs and cloud security principles, including Identity and Access Management (IAM), networking, and encryption. Excellent communication skills, with the ability to effectively communicate complex technical concepts to both technical and More ❯
Posted:

Azure AD Consultant (Security Cleared)

London, United Kingdom
Stott & May Professional Search Limited
inside IR35 Location: ad hoc travel (minimal, must be commutable to central London) We're looking for a specialist engineer to lead a key identity and access management project for a client. You'll be responsible for designing and deploying a secure, best-practice solution to separate high … Strong expertise in Active Directory (OU design, GPOs, Tier-0 models). - Advanced knowledge of Azure AD/Microsoft Entra ID, including role and identity management. - Hands-on experience with Azure AD Connect, including filtering, sync issues, and admin disentanglement. - Familiarity with Privileged Identity Management (PIM), JIT … access, and PAW deployment. - Solid understanding of zero-trust security, least privilege, and change management principles. - Experience writing technical documentation, test plans, and client-facing reports. - Excellent communication and interpersonal skills, with the ability to manage multiple priorities and stakeholders. More ❯
Employment Type: Contract
Posted:

Information Security Engineer

London, United Kingdom
Hybrid / WFH Options
NICE
of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts … alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege. … consideration for employment without regard to race, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law. Requisition ID: 5752 Reporting into: Damon Hefner, Manager Information Security Role Type: Individual Contributor More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Identity Management Consultant

bristol, south west england, United Kingdom
Spencer Rose
IAM Team Lead - Customer Identity Bristol Up to £85,000 + great benefits This business is undergoing a huge technology transformation and are looking for an IAM Team Lead to manage a team of experienced analysts in the business’ Customer Identity team.. This business is going through a … and have great technical exposure and the ability to rapidly progress. The team already have an impressive array of tooling to manage their Customer Identity Access so this role will be to act as the Identity SME and provide leadership and guidance to talented and motivated team. IAM … Team Lead Duties and Responsibilities The successful IAM Team Lead will: Be an engaging leader who ensures the Customer Identity team develops as individuals and as a function Manage the identity federation and authentication protocols (SAML, OAuth, OIDC) Ensure that both regulatory policies and security policies are adhered More ❯
Posted:

Cyber Security Architect

Crawley, Sussex, United Kingdom
Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people … and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You … have the ability to work with customers and technical teams NICE TO HAVE: Domain knowledge - Defence, Nuclear, Government, Aerospace, CNI, Transport Risk Management and Accreditation YOUR CAREER AT THALES Future opportunities will allow you to discover other domains or sites. You will be able to evolve and grow your More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Cyber Security Advisory Consultant

London, United Kingdom
Hybrid / WFH Options
Atos SE
technology trends into actionable strategies. Guide clients through compliance with DORA, NIS2, and UK regulatory frameworks. Design comprehensive cyber security architectures that integrate cloud, identity, data, and threat protection. Build actionable implementation roadmaps considering business objectives and constraints. Evaluate and integrate partner technologies (e.g., Microsoft, AWS, GCP) for optimal … client outcomes. Deliver reusable frameworks and methodologies across common cyber challenges. Lead C-level workshops on cyber strategy, risk management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO 27001, and industry-specific standards. Facilitate threat … publications. Build internal capabilities through methodologies, training, and delivery standards. Technical Focus Areas Secure architecture across Azure, AWS, and GCP Zero Trust frameworks and identity management Cloud posture management and threat protection Security automation and DevSecOps integration Security Operations SOC transformation and cloud-native security ops Threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

ForgeRock and Ping AIC Engineer

England, United Kingdom
Hybrid / WFH Options
Whitehall Resources Ltd
some time onsite in Warwickshire occasionally required, for an initially 6 month contract. *Inside IR35* Job Description: This role involves the design, implementation, and management of Identity and Access Management (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security, scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: . Design, Implementation and Deployment: o Install … and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. . Management and Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to More ❯
Employment Type: Contract
Rate: GBP Annual
Posted:

Principle Cloud Infrastructure Architect

London, United Kingdom
Hybrid / WFH Options
Salt Digital Recruitment
specialists to ensure robust, scalable, and automated infrastructure is delivered to support national-level systems. Key Responsibilities: Design and oversee multi-cloud infrastructure (networking, identity, DNS, landing zones, etc.) with focus on reliability, performance, and security Lead infrastructure workstreams across internal teams and technical suppliers Promote automation, self-service … as-Code (IaC) and automation Understanding of DevSecOps , CI/CD , and cloud-native design patterns Broad knowledge of cloud security, compliance, governance, and identity management Experience building scalable infrastructure solutions using services such as: Terraform/Deployment Manager/CloudFormation/Bicep Cloud networking, DNS, identity and access management (IAM) GCP Landing Zones, cost optimisation strategies Background in developing and maintaining architectural standards and roadmaps Desirable: TOGAF certification and other relevant cloud certifications (Google Cloud Architect preferred, Azure, AWS) Public sector, healthcare or NHS-related project experience Familiarity with clinical safety and risk management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

AWS Sr Application Security Engineer, AppSec -EC2

London, United Kingdom
ENGINEERINGUK
is on the cutting edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … security with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management … a diverse and inclusive workplace. Amazon is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status. Our inclusive culture empowers Amazonians to deliver the best results for our More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Systems Architect

West Midlands, United Kingdom
La Fosse Associates
activity, the role will involve supporting IT operations to maintain business continuity and efficiency. The ideal candidate will possess advanced technical expertise, strong project management abilities, and a dedication to guiding integrations from inception to completion. Core responsibilities: Assess and analyse IT environments of acquired companies, identifying risks and … finance, and other business-critical systems . Solid understanding of cloud infrastructure (AWS, Azure, Google Cloud) and networking principles . Expertise in Active Directory, identity management, and user access control . Experience with data migration strategies and tools (e.g., ShareGate, BitTitan, Power Automate). Strong project management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Systems Architect

South West London, London, United Kingdom
La Fosse
activity, the role will involve supporting IT operations to maintain business continuity and efficiency. The ideal candidate will possess advanced technical expertise, strong project management abilities, and a dedication to guiding integrations from inception to completion. Core responsibilities: Assess and analyse IT environments of acquired companies, identifying risks and … finance, and other business-critical systems . Solid understanding of cloud infrastructure (AWS, Azure, Google Cloud) and networking principles . Expertise in Active Directory, identity management, and user access control . Experience with data migration strategies and tools (e.g., ShareGate, BitTitan, Power Automate). Strong project management More ❯
Employment Type: Permanent
Salary: £90,000
Posted:

Security Engineer II, Industry Products - Fixed

London, United Kingdom
Amazon
AWS Security is on the cutting edge of security for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization, and custom hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each … Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Delivery Consultant - Security, Risk & Compliance, AWS Generative AI Innovation Center

London, United Kingdom
Amazon
in the workplace and at home, there's nothing we can't achieve in the cloud. BASIC QUALIFICATIONS Experience in Cyber Security, IT Security Management, Security Risk Management or Compliance, i.e. as a Security Architect, with understanding of fundamental cybersecurity principles and implementing security in the cloud. Experience … NIST 600-1 or PCI-DSS. Experience and/or certification in AWS products and services. Experience in threat modeling, secure coding, identity management and authentication, cryptography, Responsible AI and hands-on technical expertise in building security capabilities in code and deploying infrastructure as code. Understanding of automation … and DevOps concepts and how they impact risk management and compliance and implementation experience with enterprise security solutions (e.g., WAF, IPS, Anti-DDOS, SIEM). Experience building enterprise security strategy for cloud adoption or leading implementation of security strategy. Amazon is an equal opportunities employer. We believe passionately that More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Solution Architect

London, United Kingdom
Tottenham Hotspur Football Club
patterns, and development frameworks for internal and external teams. Design and document robust integration patterns between core systems such as ERP, OMS, CRM (Salesforce), Identity (Okta), PIM, CMS, and DAM, ensuring seamless and optimal utilisation of the solutions. Working in tandem with integration team, design API-led integrations and … frameworks, in addition to monolithic architecture. Experience with microservices architecture, service mesh, and API gateways. Understanding of Salesforce ecosystem (Commerce, Marketing, core) and enterprise identity management (Okta/Auth0). Solid grasp of modern web and mobile app delivery frameworks. Knowledge of content delivery (e.g., video streaming, CDNs … and supporting DevOps workflows. Familiarity with observability tools and practices (e.g., logging, tracing, metrics) to support performance, reliability, and incident response. Understanding of content management systems (CMS), digital asset management (DAM), and video streaming platforms or protocols (e.g., HLS, DASH, DRM) The Tottenham Hotspur Way Is to push More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

DevSecOps Engineer

London, United Kingdom
Hybrid / WFH Options
Instanda, Inc
are secured by configuring appropriate policies, scanning for vulnerabilities, and managing runtime security. Cloud Security: Design, implement, and manage security across Azure, focusing on identity management, data protection, and network security. Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate … Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusion detection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to improve code security Desirable: Proficiency in More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Identity Management
England
10th Percentile
£45,975
25th Percentile
£52,500
Median
£75,000
75th Percentile
£83,750
90th Percentile
£92,500