london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
months Rate: Flexible Inside of IR35 We're looking for an experienced CyberArk Engineer to join Euroclear's Chief Information Security Office (CISO) within the IdentityandAccessManagement (IDAM) team. This is a fantastic opportunity to play a key role in strengthening Euroclear's Privileged AccessManagement (PAM) posture … Manager (AAM) capabilities - including Credential Provider (CP) , Central Credential Provider (CCP) , and Application Service Credential Provider (ASCP) . Your focus will be on enabling secure, automated, and compliant management of service and functional accounts across Windows and Linux systems. Key Responsibilities: Deploy, configure, and integrate CyberArk Secret Manager/AAM components (CP, CCP, ASCP).?? Design credential … management solutions for service accounts, ensuring high availability and compliance.?? Integrate CyberArk with applications, middleware, and databases for secure credential retrieval and rotation.?? Automate deployments and configuration using Ansible , PowerShell , Bash , and REST APIs .?? Manage Safes, platforms, permissions, and onboarding in CyberArk PAM.?? Produce design documentation, runbooks, and integration guides.?? Collaborate with application and infrastructure teams to More ❯
Partner who are seeking a highly skilled External Identity Architect to join their team.This is an exciting opportunity to work on cutting-edge identityandaccessmanagement projects, helping enterprise clients design and implement scalable solutions for external users using Microsoft Entra External ID (Azure AD B2C).Key ResponsibilitiesDesign, build, and maintain … AD B2C) solutions for customer- and partner-facing applications.Collaborate with full-stack development teams to integrate authentication and authorization flows across multiple platforms.Develop custom policies, user journeys, and secure identity workflows tailored to business needs.Provide guidance on identitymanagement best practices, authentication, and security.Lead architecture reviews, ensuring scalability, compliance, and performance.Mentor and support teams … identity solutions for enterprise environments.Deep understanding of OAuth2, OpenID Connect, and SAML protocols.Knowledge of API security, custom policies, and user journey configuration.Excellent communication, problem-solving, and stakeholder management skills.Desirable:Experience with large-scale consumer or partner identity deployments.Familiarity with CI/CD pipelines, DevOps practices, and cloud-native architectures.Relevant Microsoft identity or More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
who are seeking a highly skilled External Identity Architect to join their team. This is an exciting opportunity to work on cutting-edge identityandaccessmanagement projects, helping enterprise clients design and implement scalable solutions for external users using Microsoft Entra External ID (Azure AD B2C). Key Responsibilities Design, build … solutions for customer- and partner-facing applications. Collaborate with full-stack development teams to integrate authentication and authorization flows across multiple platforms. Develop custom policies, user journeys, and secure identity workflows tailored to business needs. Provide guidance on identitymanagement best practices, authentication, and security. Lead architecture reviews, ensuring scalability, compliance, and performance. Mentor … solutions for enterprise environments. Deep understanding of OAuth2, OpenID Connect, and SAML protocols. Knowledge of API security, custom policies, and user journey configuration. Excellent communication, problem-solving, and stakeholder management skills. Desirable: Experience with large-scale consumer or partner identity deployments. Familiarity with CI/CD pipelines, DevOps practices, and cloud-native architectures. Relevant Microsoft identityMore ❯
Seeking an experienced Identity Specialist to manage and support enterprise identityandaccessmanagement (IAM) solutions. The ideal candidate will have hands-on expertise in Active Directory (AD), Entra ID (Azure AD), Okta, SailPoint, and CyberArk , ensuring secure access controls and seamless user identity lifecycle management. Key Skills … Strong knowledge of AD/Entra ID administration Experience with Okta for SSO and federation Proficiency in SailPoint for identity governance Expertise in CyberArk for privileged accessmanagement Troubleshooting, automation, and compliance mindset Experience: 5+ years in IAM operations and implementation. More ❯
Seeking an experienced Identity Specialist to manage and support enterprise identityandaccessmanagement (IAM) solutions. The ideal candidate will have hands-on expertise in Active Directory (AD), Entra ID (Azure AD), Okta, SailPoint, and CyberArk , ensuring secure access controls and seamless user identity lifecycle management. Key Skills … Strong knowledge of AD/Entra ID administration Experience with Okta for SSO and federation Proficiency in SailPoint for identity governance Expertise in CyberArk for privileged accessmanagement Troubleshooting, automation, and compliance mindset Experience: 5+ years in IAM operations and implementation. More ❯
Seeking an experienced Identity Specialist to manage and support enterprise identityandaccessmanagement (IAM) solutions. The ideal candidate will have hands-on expertise in Active Directory (AD), Entra ID (Azure AD), Okta, SailPoint, and CyberArk , ensuring secure access controls and seamless user identity lifecycle management. Key Skills … Strong knowledge of AD/Entra ID administration Experience with Okta for SSO and federation Proficiency in SailPoint for identity governance Expertise in CyberArk for privileged accessmanagement Troubleshooting, automation, and compliance mindset Experience: 5+ years in IAM operations and implementation. More ❯
london (city of london), south east england, united kingdom
PRACYVA
Seeking an experienced Identity Specialist to manage and support enterprise identityandaccessmanagement (IAM) solutions. The ideal candidate will have hands-on expertise in Active Directory (AD), Entra ID (Azure AD), Okta, SailPoint, and CyberArk , ensuring secure access controls and seamless user identity lifecycle management. Key Skills … Strong knowledge of AD/Entra ID administration Experience with Okta for SSO and federation Proficiency in SailPoint for identity governance Expertise in CyberArk for privileged accessmanagement Troubleshooting, automation, and compliance mindset Experience: 5+ years in IAM operations and implementation. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
re seeking an experienced IAM Technical Analyst to join a major public sector technology programme. The role will support the ongoing delivery and enhancement of IdentityandAccessManagement (IAM) services, working across both Identity Governance Administration (IGA) and Privileged AccessManagement (PAM) platforms. Key Responsibilities: Support the More ❯
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
london, south east england, united kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
london (city of london), south east england, united kingdom
Persistent Systems
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Devonshire Hayes
and translating them into technical designs, through to deployment, documentation, and optimisation. The ideal candidate will have a strong grounding in network and security technologies, cloud infrastructure, and project management, with the ability to communicate effectively across technical and non-technical teams. Key Responsibilities Network & Infrastructure Design Design, deploy, and maintain network infrastructure including LAN/WAN, wireless … security align with organisational policies and standards (ISO27001, GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identityandaccessmanagement, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead … Attributes Technically curious, proactive, and solutions oriented. Confident engaging with technical and business stakeholders alike. Comfortable balancing hands-on technical work with structured project delivery. Strong organisational and time-management skills with a focus on quality and outcomes. Why Join Us Be part of a forward-thinking technology function driving innovation and digital transformation. Work on diverse infrastructure More ❯
and translating them into technical designs, through to deployment, documentation, and optimisation. The ideal candidate will have a strong grounding in network and security technologies, cloud infrastructure, and project management, with the ability to communicate effectively across technical and non-technical teams. Key Responsibilities Network & Infrastructure Design Design, deploy, and maintain network infrastructure including LAN/WAN, wireless … security align with organisational policies and standards (ISO27001, GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identityandaccessmanagement, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead … Attributes Technically curious, proactive, and solutions oriented. Confident engaging with technical and business stakeholders alike. Comfortable balancing hands-on technical work with structured project delivery. Strong organisational and time-management skills with a focus on quality and outcomes. Why Join Us Be part of a forward-thinking technology function driving innovation and digital transformation. Work on diverse infrastructure More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
and translating them into technical designs, through to deployment, documentation, and optimisation. The ideal candidate will have a strong grounding in network and security technologies, cloud infrastructure, and project management, with the ability to communicate effectively across technical and non-technical teams. Key Responsibilities Network & Infrastructure Design Design, deploy, and maintain network infrastructure including LAN/WAN, wireless … security align with organisational policies and standards (ISO27001, GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identityandaccessmanagement, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead … Attributes Technically curious, proactive, and solutions oriented. Confident engaging with technical and business stakeholders alike. Comfortable balancing hands-on technical work with structured project delivery. Strong organisational and time-management skills with a focus on quality and outcomes. Why Join Us Be part of a forward-thinking technology function driving innovation and digital transformation. Work on diverse infrastructure More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
and translating them into technical designs, through to deployment, documentation, and optimisation. The ideal candidate will have a strong grounding in network and security technologies, cloud infrastructure, and project management, with the ability to communicate effectively across technical and non-technical teams. Key Responsibilities Network & Infrastructure Design Design, deploy, and maintain network infrastructure including LAN/WAN, wireless … security align with organisational policies and standards (ISO27001, GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identityandaccessmanagement, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead … Develop and maintain project documentation including architecture diagrams, risk registers, and deployment guides. Manage vendors, suppliers, and third-party contractors to ensure aligned delivery outcomes. Apply structured project management methodologies (Agile, Prince2, or hybrid). Stakeholder Engagement & Collaboration Act as a trusted advisor to internal teams and business units, gathering and translating technical requirements into actionable solutions. Collaborate More ❯
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure, and troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and … and Incident Response Monitor AWS security alerts and incidents using AWS tools. Respond to and mitigate threats in real-time, conducting post-incident analysis and documentation. Risk and Compliance Management Conduct regular security assessments and audits to ensure compliance with industry standards (ISO 27001, SOC 2, etc.). Develop strategies to address vulnerabilities and mitigate risks. Collaboration and … Expertise in Checkpoint Firewall managementand troubleshooting Proficiency in Infrastructure as Code (IaC) tools like AWS CloudFormation and Terraform In-depth knowledge of IdentityandAccessManagement (IAM), VPC security, and encryption techniques Experience with network defense, vulnerability management, and incident response Familiarity with DevSecOps and integrating security within CI More ❯