optimization of cloud-based identity solutions, including Azure Active Directory, AWS IAM, and other cloud IAM services. Identity Federation & Single Sign-On: Configure and manage identity federation (SAML, OAuth, OpenID) and Single Sign-On (SSO) integrations across multiple cloud applications and third-party systems. Administer Privileged IdentityManagement (PIM) in … enforce security policies for user access, roles, and permissions, including multi-factor authentication (MFA) and conditional access rules. Identity Governance: Implement and maintain identity governance and lifecycle management practices, ensuring compliance with industry standards and regulatory requirements. Collaboration & Cross-Functional Support: Collaborate with internal teams (security, DevOps, application owners) to ensure proper identityandaccessmanagement practices across cloud-based environments, ensuring compliance and reducing security risks. Monitoring & Troubleshooting: Proactively monitor, troubleshoot, and resolve identity-related incidents and service More ❯
IAM (IdentityAccessManagement) Analyst We are urgently require a detail-oriented and security-focused IAM (IdentityandAccessManagement) Analyst to work for our prestigious client. The IAM Analyst will be part of the team that is responsible for access governance of their IT estate … provisioning and de-provisioning of system accessand also performing User Access & Privileged Access Reviews. Key Responsibilities: Administer user provisioning, de-provisioning, andaccess changes across various systems and applications. Provision IT systems access to users in accordance with the joiner process and within agreed Service Level Agreements (SLAs) De … provision users IT systems access in accordance with the leaver process and within agreed policy requirements. Troubleshoot access issues and work with internal teams to resolve user access problems. Collaborate with IT Security, HR, and business units to support onboarding, offboarding, and changes to user access. This is an umbrella only contract and requires More ❯
/day (Outside IR35) (Hybrid - 3/4 days per week onsite in Farnborough) Our client, a leading Managed Services provider, is seeking an experienced IdentityandAccessManagement (IAM) Engineer to support a large transformation programme, delivering a multi-tenant private cloud platform to replace complex legacy infrastructure. Key Responsibilities: Design and implement … IdentityManagement solutions (AD, ADFS, SAML, MFA) Automate provisioning, de-provisioning, and synchronization processes Integrate ADFS with third-party identity providers (SAML, LDAP, OAuth) Implement Tiered Access, Zero Trust, Least Privilege, SSO, and MFA Produce technical documentation and collaborate with infrastructure teams Requirements: Strong experience with Microsoft AD and ADFS Hands-on … with SAML, LDAP, OAuth integrations Desirable: PAM, IGA, Ansible, Terraform, VMware experience Active SC clearance. If you're a skilled IAM Engineer with a background in secure and automated identity solutions, we'd love to hear from you. More ❯
ID/Active Directory. Skilled in Office 365 deployment and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusion detection/… prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identityandaccessmanagement tools like Azure AD, MFA, and SSO. Experience designing and implementing security protocols. Comfortable managing cybersecurity incidents and maintaining compliance with standards such as GDPR More ❯
exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cyber security tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cyber security architecture design authority and a mechanism to govern the use of security architectures. Work closely with Security Solution Architects, business … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
teams in implementing secure solutions. Develop and maintain a cyber security tooling strategy and technical sub strategies to the overall cyber security Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. Establish a cyber security architecture design authority and a mechanism to govern the use of security architectures. Work … with hands-on cyber security experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, IdentityandAccessManagement, detection and response and operations. Deep enterprise architecture experience including exposure to multiple, diverse technologies and processing environments including an ability to quickly comprehend the More ❯
We are seeking a number of experienced Senior Engineers with specialised expertise in VMware Horizon, Dynamic Environment Manager (DEM), App Volumes, Windows 11, Unified Access Gateway (UAG), Active Directory Federation Services (ADFS), and NetIQ. The ideal candidate will possess strong technical skills in VDI management within a scalable environment and demonstrate the ability to design, implement … VMware Dynamic Environment Manager (DEM). App Volumes. Windows 11 (including CIS L2 policies, base/gold image deployments). It would be great if you had: NetIQ IdentityAccess Management. PowerShell, scripting, and automation. Security Best Practices/Secure by Design. VMware related qualifications. If you are interested in this role but not sure if More ❯