Oracle toolset. Role Overview: We are looking for an Oracle Environment Manager to be a pivotal figure of the Finance Modernisation Programme, responsible for the strategic planning, proactive management, and operational oversight of all programme environments and working alongside a fantastic programme team and reporting into the Technology ERP Platform Lead. The Finance Modernisation Programme is a major … successful candidate will ensure environment readiness for various programme phases (development, testing, training, cutover to live, go-live and Hypercare support) and play a key role in release management activities across these diverse technology stacks. Job Description: · Environment Strategy & Planning: Develop and maintain a comprehensive environment strategy and roadmap for the Oracle Fusion Transformation Programme, encompassing SaaS (Fusion … and EPM environments. · Environment Provisioning & Configuration: Lead the provisioning, setup, and configuration of all programme environments, ensuring they align with project timelines, technical specifications, and security policies. · Release Management: Own the release management process for all programme environments, including planning, scheduling, communication, and execution of environment refreshes, patching, and upgrades for SaaS, PaaS, and EPM. · Environment More ❯
resolving customer and production issues. Requirements Bachelor's degree in Computer Science, Engineering, or a related field with over 3 years of industry experience. Experience or knowledge in Identity & Access Governance (IAG)/Identity & AccessManagement (IAM) is a plus. Proficiency in working with databases (SQL, Oracle, PostgreSQL). Hands … infrastructure and strong troubleshooting skills. Excellent analytical, problem-solving, and communication skills. Self-driven, adaptable, and innovative with a growth mindset. Basic understanding of Incident, Problem, Change, and Release Management processes. Apply for this Position Full Name Email Address Phone Number CV/Resume I agree to allow Welford Systems to store and process my personal data. Its … time to discover how Identity Security can help make your organization more secure and cyber resilient. Contact us today to request a demo or a meeting with one of our experts. #J-18808-Ljbffr More ❯
resolving customer and production issues. Requirements Bachelor's degree in Computer Science, Engineering, or a related field with over 3 years of industry experience. Experience or knowledge in Identity & Access Governance (IAG)/Identity & AccessManagement (IAM) is a plus. Proficiency in working with databases (SQL, Oracle, PostgreSQL). Hands … infrastructure and strong troubleshooting skills. Excellent analytical, problem-solving, and communication skills. Self-driven, adaptable, and innovative with a growth mindset. Basic understanding of Incident, Problem, Change, and Release Management processes. Apply for this Position Full Name Email Address Phone Number CV/Resume I agree to allow Welford Systems to store and process my personal data. Its … time to discover how Identity Security can help make your organization more secure and cyber resilient. Contact us today to request a demo or a meeting with one of our experts. #J-18808-Ljbffr More ❯
Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt's Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while … empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work. The Technical Account Manager will provide account managementand high-level technical support to project teams and customers. They will define and oversee the inception and implementation of solutions as well as support post go … Forecasting at a Regional level Manage and approve Time sheets and support invoicing activities Coordinates with CSM Qualifications: A minimum of 5+ years of of relevant experience in Identity Governance and Administration and/or IdentityAccessManagement domain A minimum of 5+ in experience leading scoping, planning and delivery of projects More ❯
of SAP, Oracle, or Workday and their role in best-in-class operating models across industries. Complementary Technologies: Experience with associated technologies, including: Major cloud platforms (IaaS & PaaS) Identity & AccessManagement Data platforms Service management & automation IoT & Operational Technology API management (For Workday specialists) Strong understanding of HR and Finance … Enterprise solutions. Stakeholder Engagement: Build strong relationships with internal teams, senior leadership, and strategic alliance partners. Mentorship & Development: Support and mentor junior digital architects, fostering growth through formal managementand informal coaching. As part of your role you will also have the opportunity to contribute to the business and your own personal growth, through activities that form part … you should have expertise in architecting solutions for key operating model domains. Experience in at least two of the following areas, including their integration, is essential: Supply Chain Management Resource & Material Planning Product Lifecycle Management Inventory & Warehouse Management Manufacturing Execution Service Operations Customer Engagement, Experience & Relationship Management Field Service Finance Human Capital More ❯
of SAP, Oracle, or Workday and their role in best-in-class operating models across industries. Complementary Technologies: Experience with associated technologies, including: Major cloud platforms (IaaS & PaaS) Identity & AccessManagement Data platforms Service management & automation IoT & Operational Technology API management (For Workday specialists) Strong understanding of HR and Finance … Enterprise solutions. Stakeholder Engagement: Build strong relationships with internal teams, senior leadership, and strategic alliance partners. Mentorship & Development: Support and mentor junior digital architects, fostering growth through formal managementand informal coaching. As part of your role you will also have the opportunity to contribute to the business and your own personal growth, through activities that form part … you should have expertise in architecting solutions for key operating model domains. Experience in at least two of the following areas, including their integration, is essential: Supply Chain Management Resource & Material Planning Product Lifecycle Management Inventory & Warehouse Management Manufacturing Execution Service Operations Customer Engagement, Experience & Relationship Management Field Service Finance Human Capital More ❯
Lead Sailpoint ISC Engineer Location: England Role Overview We are seeking a Lead SailPoint ISC Engineer to spearhead the design, implementation, and optimization of SailPoint Identity Security Cloud (ISC) solutions. This role demands … strong technical expertise, leadership skills, and a strategic mindset in handling identity governance across diverse systems. You will be a key contributor in building scalable and secure identity infrastructures, helping Simeio's clients manage risk and achieve compliance while supporting smooth business operations. Responsibilities Lead and mentor team members in deploying and maintaining SailPoint ISC-based … control Strong scripting skills (Beanshell, Java, etc.) and knowledge of APIs Exceptional analytical and problem-solving capabilities About Simeio Simeio delivers cutting-edge IdentityandAccessManagement (IAM) solutions. We empower organizations to safeguard data, ensure compliance, and embrace digital transformation with security at the core. We're growing fast and looking More ❯
Proficiency in implementing CI/CD pipelines and managing complex integration challenges. Identity & AccessManagement: Deep understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Must be capable of effectively implementing and troubleshooting SSO and SCIM integrations. High-Quality Code … our people feel they truly belong. We value and respect individual differences, so all applications will receive fair and equal consideration without regard to ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability or age. More ❯
systems. Proficient in implementing CI/CD pipelines and managing complex integration scenarios. Identity & AccessManagement: Understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Ability to effectively implement and troubleshoot SSO and SCIM integrations. High-Quality Code: A proven … feel truly valued. We appreciate and respect individual differences and are committed to ensuring that all applications are treated fairly and equally, regardless of ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability, or age. More ❯
A growing financial institution in London is hiring an IAM Engineer to help shape and mature their Identity & AccessManagement capability. This is a newly created role offering a mix of strategy, technical delivery, and process ownership. You'll play a key part in improving governance, automation, and integration across both on-prem and … processes, and controls Act as the SME on accessmanagement across key business and tech projects Design and implement lifecycle, authentication (MFA/SSO), andaccess solutions Work across Azure AD and other core platforms to ensure secure integration Support audits, compliance, and ongoing risk alignment What You'll Bring: Hands-on IAM experience … in a regulated environment Strong understanding of lifecycle management, Zero Trust, RBAC/ABAC Experience with Azure AD or similar platforms (CyberArk, etc.) Familiar with frameworks such as ISO, NIST or CIS IAM-related certifications are a bonus (CISSP, CISM, CIAM, etc. More ❯
Senior Software Engineer - Client Identity Join to apply for the Senior Software Engineer - Client Identity role at John Goddard Associates Senior Software Engineer - Client Identity 5 days ago Be among the first 25 applicants Join to apply for the Senior Software Engineer - Client Identity role at John Goddard Associates Job Title: Senior … and consuming web services with Node.js. Familiarity with NestJS and microservices architectures is a plus. Solid understanding of REST APIs and cloud security principles, including IdentityandAccessManagement (IAM), networking, and encryption. Excellent communication skills, with the ability to effectively communicate complex technical concepts to both technical and non-technical stakeholders. Knowledge of … You'll also work in a collaborative, innovative environment where you can continuously grow both your technical and professional skills. If you're passionate about cybersecurity, cloud services, andidentitymanagement, and want to make a direct impact in defending users against cyber threats, this role could be a great fit for you. McGregor Boyall is More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
reduce collective risk, and help businesses grow. Law is an incredibly demanding profession that involves complicated, precise work with heightened client care. Midsize law firms often lack the management experience, technology and administrative processes to help them do this work efficiently, instead relying on long hours and manual processes. As a result, the legal sector has traditionally been … slow to change. Until now. Through our powerful, innovative law firm management technology, Actionstep enables law firms to work efficiently, delight clients, evolve with the market and thrive as efficient, profitable businesses. With Actionstep, law firms are equipped to confidently embrace the future. Actionstep is a pioneer in the development and sale of software-as-a-service (SaaS … skills. Excellent communication, stakeholder management, and presentation skills. Bonus Points Experience in legal tech or building tools for highly regulated environments. Familiarity with identityandaccessmanagement (IAM), enterprise IT systems, or data governance tooling. Technical fluency in SaaS architecture, especially as it relates to multi-tenancy, secure integrations, or search infrastructure. More ❯
s driving real change for major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, you'll play a key role in shaping secure, scalable solutions. You'll also enjoy the benefits of working for Europe's leading … independent IT provider-with a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting at customer meetings, and shaping technical solutions that meet client needs Own … the ability to manage virtual teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Current information for our applicants Business as usual? Not quite. Of course, the Corona crisis also presents us with major challenges. However, we are broadly More ❯
thats driving real change for major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, youll play a key role in shaping secure, scalable solutions. Youll also enjoy the benefits of working for Europes leading independent IT providerwith … a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting at customer meetings, and shaping technical solutions that meet client needs Own and lead technical implementations … the ability to manage virtual teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Join Us. Drive Innovation. Deliver Impact. More ❯
making a meaningful impact is rewarded. IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk managementand reporting. This includes promoting the global Information Security Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus … Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as IdentityandAccessManagement, Threat Intelligence, Risk Evaluation, Security Assessment/Testing, Incidence Managementand Vendor/Cloud products assessment Possessing high level of analytical ability where … working knowledge of cybersecurity principles and elements Understand global program structure, launch plan and timing, and global program ownership Demonstrable experience of senior stakeholder managementand relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback Education/Qualifications: Degree educated and/or equivalent experience. SKILLS AND EXPERIENCE Functional/Technical More ❯
possess expertise in IAM solutions and do not require sponsorship, holding or being eligible for SC Clearance.As a SailPoint IAM Consultant, your role involves providing IdentityandAccessManagement services to diverse B2B clients.You will engage in projects to deliver IAM solutions, conduct diagnostics, contribute to strategy formulation, and mitigate IAM risks for clients.Having … the depth and content behind the accessmanagement tools and technology & leading the team technically on client engagements as an IAM Manager.Key Responsibilities:Consult with clients from various sectors on IAM solutionsSupport complex client projectsConduct IAM diagnostics and assist with application onboardingDevelop and deploy solutions for clientsProvide specialised input for IAM implementationsGather IAM requirements and offer … stakeholdersServe as a subject-matter expert on IAM controls Requirements:Proficiency in IAM technical controls and contemporary risksEligibility for SC clearanceConsulting experience in IAMStrong stakeholder engagement skillsEffective time management abilitiesResilience in fast-paced environments Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for More ❯
Goldman Sachs is a leading global investment banking, securities and investment management firm that provides a wide range of services worldwide to a substantial and diversified client base that includes corporations, financial institutions, governments and high … net-worth individuals. Founded in 1869, it is one of the oldest and largest investment banking firms. Secrets and Encryption Services is part of the IdentityandAccessManagement (IAM) business unit within Core Engineering Division of Goldman Sachs. Our mission is to protect the firm and our clients from cyberthreats such as credential … adoption of HashiCorp Vault across environments. The Role Role Overview: We are looking for a motivated and skilled Platform Engineer with a developing interest in cyber security and secrets management to join our team. The ideal candidate will contribute to ensuring the reliability, performance, and scalability of our platform and infrastructure while learning and implementing security best practices. More ❯
cycles for cybersecurity solutions including prospecting, solution positioning, negotiation, and closure. Develop and execute strategic account plans for key enterprise clients, aligning cybersecurity solutions to their business and risk management goals. Build relationships with C-level executives (CISOs, CIOs, CTOs) and key stakeholders to uncover pain points and promote solution value. Apply solution selling and consultative selling methodologies … software sales, with at least 5+ years focused specifically on cybersecurity. Proven success in consistently achieving or surpassing million-plus euro quotas. Deep knowledge of cybersecurity domains including: Identity & AccessManagement Attack Surface Management Threat Intelligence & Digital Risk Protection Vulnerability Management Pen Testing & Red Teaming Strong understanding of security buyer … hybrid working environment if desired We prioritize the well-being and development of our employees. That's why we offer a fitness allowance to support physical health and provide access to learning platforms such as LinkedIn Learning to encourage continuous self-improvement and personal growth. Employees also benefit from regular performance conversations with their managers, focused on development More ❯
OWASP SAMM), and compliance frameworks (SOC 2, ISO 27001, GDPR). Secure SDLC & DevSecOps - Build and maintain guardrails for static/dynamic analysis, container and IaC scanning, SBOM management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, network … segmentation, KMS, secrets management, WAF, EDR, and zero-trust patterns. Identity & AccessManagement (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML), and privileged-access workflows. Monitoring, Detection & Response - Define audit logging, metrics, and telemetry requirements; integrate with SIEM/SOAR to deliver actionable … teams, especially for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred, but not essential Certifications such as CISSP, CSSLP, AWS Certified Security. More ❯
responsibilities of this role • Design, implementation and administration of hybrid cloud services, including but not limited to, IaaS resources, data connectivity, data backup and restore, print, telecoms, and building management services. • Monitor system performance and availability, proactively identifying and resolving issues to maintain high service levels. • Collaborate with security and compliance teams to implement and maintain governance policies … maintain documentation, user guides, and training materials. Security & Compliance o Implement and enforce security policies. o Ensure compliance with internal data governance standards. o Manage identityandaccess controls, MFA, and device compliance. o Collaborate with support partners on the remediation of security vulnerabilities, across datacentre, EUC, IaaS space and data network. o Design, implementation and … offered for out-of-hours work during Mon-Fri. Skills required Skills required Skills & Experience required: The successful candidate will demonstrate expert-level proficiency in the design, implementation, andmanagement of Microsoft Azure and Microsoft 365 environments. The role requires a deep understanding of cloud infrastructure, identityandaccessmanagement, automation, andMore ❯
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor's degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Computappoint
effective delivery. Experience/Skills Required: PMP or equivalent certification and a Bachelor’s degree in Engineering, IT, or related field. 10+ years in IT project/programme management, with 5+ years … in infrastructure or IT operations. Proven experience managing infrastructure portfolios (virtualisation, storage, identity & accessmanagement). Strong skills in portfolio, programme, and project management across strategic and BAU streams. Expertise in financial planning, resource management, and stakeholder engagement. Deep knowledge of IT service delivery and operational excellence frameworks. Familiarity with More ❯
Manage and optimize Virtual Desktop Infrastructure (VDI) environments to deliver reliable remote access solutions Configure and maintain Entra ID (Azure Active Directory) for identityandaccessmanagement across the organization Deploy and manage Microsoft Intune for device management, application deployment, and security policy enforcement Implement conditional access policies … group policies, and user profile management solutions Support Azure and Microsoft 365 services integration with on-premise systems Manage application packaging, virtualization, and deployment using SCCM and Citrix technologies Maintain enterprise mobility management platforms and ensure seamless user experiences Work with database, storage, network, and monitoring systems to ensure comprehensive service delivery Contribute to long-term … roles within ITIL-governed environments Strong hands-on experience with Windows 11, Entra ID, Active Directory, VDI, EUC, Microsoft 365 suites, and Intune Expertise in VDI technologies and virtual desktop management Knowledge of Microsoft 365, single sign-on (SSO), identity providers, and PKI systems PowerShell scripting skills and automation experience with Infrastructure as Code (IaC) Experience More ❯
is considered at every phase-from design to deployment. Threat Modeling & Security Design Reviews: Conduct structured threat modeling and security assessments for new features, architectures, and services. Vulnerability Management & Remediation: Work closely with engineering teams to identify and remediate vulnerabilities from SAST, DAST, SCA, container security, and cloud security scans. Code & Architecture Review: Conduct secure code reviews and … CI/CD security automation (GitHub Actions, Jenkins, GitLab CI, etc.). Familiarity with infrastructure-as-code security (Terraform, CloudFormation) and cloud security posture management. Strong understanding of identity & accessmanagement (OAuth, OIDC, SAML, JWT) and API security. Knowledge of industry frameworks like NIST, ISO 27001, and SOC 2. Experience driving developer enablement and … CSSLP. Experience working in SaaS, multi-tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best practices). Familiarity with attack surface managementand threat intelligence. What do we offer? We value our people and offer a competitive salary along with company bonus Strong maternity and paternity scheme A workplace pension scheme More ❯