Oxford, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Bolton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Swindon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Hounslow, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerability scanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration More ❯
Hull, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
load testing and infrastructure issue resolution. Security Management: Manage server security aspects, including patching, upgrades, penetration testing, vulnerability scanning, security protocols, and authentication methods (SSO - SAML and OAuth). User Support: Provide technical support, guidance, and training to end-users, resolving connectivity issues and managing user access. Collaboration & Integration: Work More ❯
in a timely manner. Manage multi-factor authentication (MFA) systems to ensure they are functioning correctly and securely. Manage singlesign-on (SSO) solutions to improve users experience and security. Monitor, maintain, and improve SSO systems to ensure they are functioning correctly and securely. More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including … IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle … Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management-SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows-to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including … IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management: Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle … Cluster Role Bindings) and how those ties into cloud IAM (EKS, AKS, GKE). Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning). Strong gap-analysis skills, able to pinpoint missing or weak access controls. Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) Privileged Access Management (PAM) SingleSign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate More ❯
London, England, United Kingdom Hybrid / WFH Options
AVEVA
Microsoft security policies and configurations spanning Microsoft cloud services (SaaS/PaaS), IAM, and Privilege Access Management domains. A strong understanding of industry standard SSO technologies and authentication methods (OpenID Connect, SAML, OAuth, Kerberos, LDAP, etc.). Production-level experience implementing and supporting Microsoft security infrastructure. An eagerness to produce More ❯
London, England, United Kingdom Hybrid / WFH Options
Harvey Nash Group
This is a contract role supporting current infrastructure projects, focusing on access management, system integrations, and compliance. Key Responsibilities Support and lead SSO integrations using SAML, OIDC, and OAuth Lead the migration of authentication methods across systems Manage and expand Privileged Identity Management (PIM) roles in Entra ID More ❯
.Net Networking IIS Public cloud SSL Scripting experience with one or more scripting languages including SQL or Powershell. Active Directory Administration and Integration Experience (SSO) OpenIDConnect (OIDC) SAML Web Services Administration and Experience. Experience with upgrading, installing, and configuring applications as well as Windows and Cloud environments. Knowledge of Azure More ❯
.Net Networking IIS Public cloud SSL Scripting experience with one or more scripting languages including SQL or Powershell. Active Directory Administration and Integration Experience (SSO) OpenIDConnect (OIDC) SAML Web Services Administration and Experience. Experience with upgrading, installing, and configuring applications as well as Windows and Cloud environments. Knowledge of Azure More ❯
-off by aligning with business units and technical teams. Skills Required: * Understanding of the key technologies relevant to the ServiceNow integration solutions including: SSO, SAML, SSL, Web Services, LDAP, JDBC, ODBC, REST, SOAP, SCP, FTPS, JSON * ServiceNow Developer certification is a plus * Experience with other ITSM software (BMC Remedy More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
and to be eligible for NPPV3 Clearance* *Inside IR35* Skills Required: . Understanding of the key technologies relevant to the ServiceNow integration solutions including: SSO, SAML, SSL, Web Services, LDAP, JDBC, ODBC, REST, SOAP, SCP, FTPS, JSON . ServiceNow Developer certification is a plus . Experience with other ITSM software More ❯
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
and NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation More ❯
IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with SingleSign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows … RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE) Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning) Strong gap-analysis skills, able to pinpoint missing or weak access controls Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and More ❯
principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯
principles to enhance protection across cloud platforms. • Manage identity and access management (IAM) in a cloud-first environment, including Azure AD, MFA, Conditional Access, SSO, and Privileged Access Management (PAM). • Lead threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. … requirements (GDPR, SOC2), and risk management best practices. • Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, SingleSign-On (SSO), and Privileged Access Management (PAM). • Threat Management & Incident Response: Ability to detect, respond to, and mitigate cyber threats using SIEM More ❯