chosen tech stack (e.g., Node.js and Express, Java and Spring Boot), along with a deep understanding of APIs, system architecture, and industry protocols like OAuth 2.0. Your expertise lies in the Back-End applications, where you'll skillfully guide the user journey throughout the entire stack. Ideally, you'll also More ❯
message brokers such as RabbitMQ Expertise in relational databases, ORM and PL/SQL Experience with microservice architectures Public cloud platforms (e.g. Azure) IAM, OAuth 2.0, etc. Research has shown that women are less likely than men to apply for this role if they do not have solid experience in More ❯
London, England, United Kingdom Hybrid / WFH Options
Bentley Systems
problem-solving capabilities using various technologies. Capability to research a new topic and to learn quickly. What Would Make You Stand Out Knowledge of OAuth 2.0/OpenID Connect. Knowledge/Experience of containerization solutions, such as Kubernetes, Docker, and Istio. Knowledge/Experience of web technologies (JavaScript, HTML5, HTTP More ❯
services (SaaS/PaaS), IAM, and Privilege Access Management domains. A strong understanding of industry-standard SSO technologies and authentication methods (OpenID Connect, SAML, OAuth, Kerberos, LDAP, etc.). Production-level experience designing, implementing, and supporting Microsoft security infrastructure. An eagerness to produce scalable and repeatable security practices through automation. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Hewlett Packard Enterprise Development LP
common distribution nuances. • Technical experience with cloud security and permissions systems – IAM highly desirable. • Understanding of identity and access technologies – SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication. • Experience with networking and network security – Firewalls, IPSEC, SSL-VPN, Routing, NAT and client VPN. • Operational knowledge of networking protocols and services More ❯
Burnley, England, United Kingdom Hybrid / WFH Options
HPE Aruba Networking
common distribution nuances. Technical experience with cloud security and permissions systems – IAM highly desirable. Understanding of identity and access technologies – SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication. Experience with networking and network security – Firewalls, IPSEC, SSL-VPN, Routing, NAT and client VPN. Operational knowledge of networking protocols and services More ❯
London, England, United Kingdom Hybrid / WFH Options
Degreed Inc
global talent, skills, or learning‐platform transformations 5+ years of hands-on technical expertise with REST APIs, event buses (Kafka/SNS/SQS), OAuth 2.0/OIDC/SAML, webhooks, and bulk or streaming ETL tools (MuleSoft, Boomi, SnapLogic, Azure Data Factory) and integrations with data warehouses or BI More ❯
London, England, United Kingdom Hybrid / WFH Options
HPE Aruba Networking
common distribution nuances. Technical experience with cloud security and permissions systems – IAM highly desirable. Understanding of identity and access technologies – SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication. Experience with networking and network security – Firewalls, IPSEC, SSL-VPN, Routing, NAT and client VPN. Operational knowledge of networking protocols and services More ❯
and COE initiatives. Leading AM operations and engineering teams through various project phases and release cycles. Strong understanding of modern authentication protocols such as OAuth 2.0, OpenID, SAML, and Kerberos. Knowledge of software engineering methodologies, Agile practices, Scrum, DevOps, CI/CD, and configuration management. Web development skills with JavaScript More ❯
RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vanloq
RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vanloq
RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM More ❯
based systems (Azure) and security principles. Knowledge of CI/CD pipelines, DevOps methodologies, and system deployment strategies. Familiarity with authentication/authorization frameworks (OAuth, Keycloak, OpenID Connect, SAML, etc.). Ability to document API specifications, system interactions, and data mappings. Education and Experience Requirements Significant experience in both Functional More ❯
authentication, data modeling, and design artifacts. Proficiency in Java 8+, Spring Boot, RDBMS (Oracle, Postgres), microservices, Kubernetes, and cloud functions. Understanding of authentication protocols, OAuth, MTLS, and certificates. Qualifications: 10-12 years of IAM implementation experience. Strong communication skills and customer-facing experience. CISSP certification is a bonus. Willingness to More ❯
Warrington, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
testing and infrastructure issue resolution. Security Management: Manage server security, including patching, upgrades, penetration testing, vulnerability scanning, security protocols, and authentication (SSO - SAML and OAuth). User Support: Provide technical support, guidance, and training to end-users; resolve connectivity issues and manage user access. Collaboration & Integration: Work with BI development More ❯
Boot (preferred), RDBMS (Oracle, Postgres), microservices, Kubernetes. Knowledge of cloud services (GCP, GKE, Cloud Functions, GCS, Pub/Sub, Dataflow, Terraform). Experience with OAuth, MTLS, certificates. Qualifications: 10-12 years of strong IAM implementation experience. Strong communication skills. Customer-facing experience required. CISSP certification is a plus. Willingness to More ❯
Shrewsbury, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
ensuring uptime and performance. Security Management: Oversee server security, including patching, upgrades, penetration testing, vulnerability management, and authentication protocols like SSO (SAML and OAuth). User Support: Provide technical support and training to end-users, resolving connectivity and access issues. Collaboration & Integration: Work with BI teams on content promotion, system More ❯
and Linux. Experience with application servers (WebLogic, WebSphere) and J2EE products. Good understanding of Java/J2EE, XML, performance testing, and authentication protocols including OAuth, MTLS, and certificates. Knowledge of GCP, Kubernetes, cloud functions, GCS, Pub/Sub, Dataflow, and related tools. Proficiency in data modeling, design artifacts, and interpreting More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vanloq
RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯
Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration : Collaborate with BI More ❯