success in this role. We are seeking a driven individual with at least two years of practical experience in delivering and providing consulting services and business analysis within the Identity & Access Management domain. The Role This role will entail being involved in the analysis, design and delivery of identity and access management solutions, strategy & process improvement … with a focus on areas such as : Identity Governance and Administration (IGA) IdentityManagement (IDM) Ideally with good conceptual/practical knowledge of: Access Management (inc. Single Sign-On (SSO)/Multi-Factor Authentication (MFA)/Password-less Authentication) The key technologies we are looking for experience in are: Any of the major IAM players, e.g. … major IAM technologies, as described above Comfortable working both as part of a team or individually, and familiar with the relevant non-technical project activities (i.e. project planning, stakeholder management, change management, schedule management, quality assurance, etc.) Strong written and verbal communication skills Basic understanding of risk and control principles and how processes are implemented and improved More ❯
requirements. This role reports to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through Identity and Access Management and Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … the technical capability to support the creation of a strategic direction for PAM and Authentication along with their tool set, together with supporting and maintaining overall service health, vendor management and ensuring the direction taken aligns with the overall strategic objectives of the organisation. The team handles day to day management of all CyberArk (PAM) and Authentication needs … of the business achieved by the following tools: Active Directory on premise, Entra ID for Cloud & CyberArk. There will need to be close co-ordination with the Access Management Team, so experience in this area would be required. The tool for Access Management is RSA IG&L. All technical documentation and platform standards must be kept up to More ❯
Identity & Access Management (IDAM) Analyst – Contract Contract Details 6 months initially, with potential extension. £500 to £550 P/d Inside IR35 Full-time, Monday to Friday. Hybrid role (3 Days a week in London Office) We are seeking an experienced Identity & Access Management (IDAM) Analyst to join a growing technology function on a initial … role will suit a hands-on analyst with strong technical knowledge of IDAM and PAM platforms with a focus on Entra ID, as well as excellent communication and stakeholder management skills. Key Responsibilities Manage user account lifecycle (creation, modification, deletion). Ensure consistency of IDAM processes in line with policies and standards. Administer and support enterprise PAM solutions (e.g. … process changes. Requirements Significant hands-on experience in an IDAM or Security Analyst role. Solid knowledge of Microsoft Active Directory and Azure AD/Entra ID. Strong background in identitymanagement/provisioning tools (e.g., CyberArk, SailPoint, Saviynt, Microsoft Identity Manager). Experience supporting and troubleshooting enterprise PAM solutions. Strong analytical and problem-solving skills. Excellent communication More ❯
involve engaging internally in GDS and across government on critical areas of work. The Head of Security Architecture will be an experienced Security professional with extensive technical, strategic and management experience. The individual should have the appropriate level of experience and gravitas to brief the CISO and interact at C-level. AsHead of Security Architecturein the GDS Information Security … steps toward zero trust, etc.and others security concepts implementing the GDS Secure by Design principles in operational services leading the security component of cross-business initiatives on Privileged Access Management, including effective Identity solutions and use of Privileged Access Workstations developing common, workable patterns for enterprise-level guardrails and application patterns enabling secure delivery of digital services at … and regulation as a minimum leading a Community of Practice for Security Architects, ensuring a quality and consistent approach across teams that may include service security architects in different management chains influencing senior managers to adopt secure architectural principles to reduce information risk and to migrate legacy and existing systems into a secure architectural framework Person specification We're More ❯
involve engaging internally in GDS and across government on critical areas of work. The Head of Security Architecture will be an experienced Security professional with extensive technical, strategic and management experience. The individual should have the appropriate level of experience and gravitas to brief the CISO and interact at C-level. As Head of Security Architecture in the GDS … toward zero trust, etc. and other security concepts implementing the GDS Secure by Design principles in operational services leading the security component of cross-business initiatives on Privileged Access Management, including effective Identity solutions and use of Privileged Access Workstations developing common, workable patterns for enterprise-level guardrails and application patterns enabling secure delivery of digital services at … and regulation as a minimum leading a Community of Practice for Security Architects, ensuring a quality and consistent approach across teams that may include service security architects in different management chains influencing senior managers to adopt secure architectural principles to reduce information risk and to migrate legacy and existing systems into a secure architectural framework Person specification We're More ❯
term 12-month contract role ending October 2026. We are looking for a knowledgeable M365 specialist to help support the Bank's new approach to the document and records management system. The Bank is migrating our document management solution from a legacy toolset to M365, primarily using SharePoint for document management. The Bank will also be using Microsoft … Purview extended with a custom Azure Cloud solution to meet the Bank's records management requirements. We are currently in a pilot phase, and the successful candidates will support the organisation during and after the remainder of the deployment of the solution. This role will include working as part of an on-call support rotation covering evenings and weekends. … candidates with demonstrable experience of the following: The M365 suite of applications including configuring, managing, and troubleshooting SharePoint Online, OneDrive for Business, and Teams (architecture, governance, security models, content management, channels, and search). PowerShell scripting for automation and administration tasks. Deep understanding of user identitymanagement in a hybrid AD environment. Experience in a third-line More ❯
trading, infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to learn … Linux servers and associated storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identity and access management tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … corrective actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Techfellow Limited
trading, infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to learn … Linux servers and associated storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identity and access management tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … corrective actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
london, south east england, united kingdom Hybrid / WFH Options
Techfellow Limited
trading, infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to learn … Linux servers and associated storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identity and access management tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … corrective actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Techfellow Limited
trading, infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to learn … Linux servers and associated storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identity and access management tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … corrective actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
Power BI for reporting and data visualization. Broader understanding of cybersecurity best practices and compliance frameworks. Advanced automation experience using PowerShell, Graph API, or Azure Automation for large-scale management and orchestration. Experience with Microsoft Purview (Information Protection, Data Loss Prevention, Insider Risk, Compliance Manager). Hands-on experience with Endpoint Privilege Management (EPM) or Privileged IdentityManagement (PIM) in EntraID. Experience with third-party identity providers (Okta, Ping, Duo) and hybrid identity scenarios. Familiarity with cross-platform device management (Android Enterprise, macOS with Intune, Linux in Azure). Exposure to hybrid networking and security, e.g. Azure Firewall, VPN Gateways, ExpressRoute, or conditional access with Zero Trust principles. Knowledge of backup and … Backup, Site Recovery, or third-party DR tools). Practical experience with governance frameworks (CIS, NIST, ISO 27001) and aligning Microsoft cloud solutions to compliance requirements. Contribution to change management and user adoption programs, including training, guides, and workshops for end-users. Familiarity with licensing models and cost optimization in Microsoft 365 and Azure. Networking People (UK) is acting More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
london (city of london), south east england, united kingdom
Tata Consultancy Services
and Architecture knowledge for Azure Landing zone. Closely working on IAAS and Platform projects aligned with different support teams, Technical Architect, Security Team, Service Manager through a DevOps board. Management of Azure Landing Zone subscription hosting Infrastructure components. Migration of Application Workload from Legacy Management group and Subscriptions to Azure Landing Zone management group and subscriptions. Deliver … etc. Tenant security – DDOS, Azure Firewall policy creation and maintain of Application, Network rule along with IDPS to ensure all the inbound/outbound traffic managed via AZFW. Password management, disk encryption management through Azure Key Vault limiting access. Working with Vodafone network team and Site IT to ensure smooth go-live of new Sizewell C sites and … ensure internet and print functionality. Closely working with Lead Architect, Technical Architect to review the design and implement resources based on the approved design. Third party vendor Management mostly Microsoft Azure Support. Working with TAM and dedicated Solution Architect to ensure new features and updates are discussed and implemented based on requirement. Working with many different support organizations carrying More ❯
would love to hear from you! Your opportunity The Head of Corporate Technology leads the strategy and execution of technology initiatives supporting all internal corporate functions of an asset management firm. This role ensures that enterprise applications and systems for departments like Finance, HR, Compliance, and Legal are robust, integrated, and aligned with business goals. By providing modern, efficient … to identify technology needs and prioritize projects. Facilitate solutions that improve process efficiency (such as automation of reporting and approvals) and enhance data integrity across corporate functions. Integration & Data Management: Ensure seamless data flow and integration between corporate systems (for example, linking finance and procurement systems or HR and payroll systems) to create a single source of truth. Implement … data governance practices so that management reports and analytics are accurate and timely. Governance, Risk & Compliance: Implement strong IT governance and security practices for all corporate tech systems. Proactively use technology to strengthen compliance and risk management for instance, deploying tools for monitoring regulatory compliance and internal controls, as asset managers are leveraging tech to transform compliance functions. More ❯
background in IDM business and systems analysis, implementation, and L3 support within banking environments. You will be responsible for providing lead analysis, development and support primarily around the One Identity Manager platform, with potential to work on other systems. What you'll need to succeed In depth knowledge of One IdentityManagement including normal functions and exception … processing. Experience with designing and developing workflows, provisioning processes, and connectors in One Identity Manager. Have integrated One Identity Manager with various systems (Active Directory, Azure AD, SAP, etc). Performed upgrades, patches, and performance tuning of the One Identity Manager platform. Troubleshoot and resolve issues related to identity provisioning and de-provisioning. Collaborate with stakeholders More ❯
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerability management and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity principles including … network security, identitymanagement, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence-gathering More ❯
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerability management and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity principles including … network security, identitymanagement, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence-gathering More ❯
london (city of london), south east england, united kingdom
Selby Jennings
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerability management and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity principles including … network security, identitymanagement, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence-gathering More ❯
opportunity is ideal for individuals who are detail-oriented, technically minded, and passionate about cloud technologies. Key Responsibilities: Manage and monitor Azure resources, subscriptions, and services. Support user access, identitymanagement, and security controls in Azure Active Directory. Assist in configuring and maintaining virtual machines, storage, and networking. Help implement backup, recovery, and disaster recovery solutions. Monitor system More ❯
we do. To be successful in this role you should have: Strong hands-on IAM engineer background with broad expertise across the IAM domain, including tooling, products, protocols, taxonomy, identitymanagement, authentication, authorization and identity federation. Expertise with single sign on, OAuth2, OIDC, PKI, PSD2 SCA knowledge and possession based authentication. ForgeRock developer experience with PingGateway, PingAM … implementing PingGateway single-sign-on routes, dynamic proxies and filter chains, or implementing PingIDM based data links Experience in partnering with security, product, engineering and compliance teams, to embed identity-first principles into the DevSecOps lifecycle You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business … will train, guide and coach less experienced specialists and provide information affecting long term profits, organisational risks and strategic decisions Advise key stakeholders, including functional leadership teams and senior management on functional and cross functional areas of impact and alignment. Manage and mitigate risks through assessment, in support of the control and governance agenda. Demonstrate leadership and accountability for More ❯
Proven experience as an Integration Developer on enterprise-scale programmes, preferably in Higher Education. Excellent skills in designing and delivering integrations using Microsoft Azure PaaS (Functions, Logic Apps, API Management, Service Bus,) Expertise in integration strategy, API management, and canonical data models. Experience of integrating with Salesforce (REST/SOAP APIs, platform events) and Canvas LMS or similar … Cloud-Student Systems Implementation Desirable Experience Experience working in Higher Education with a good understanding of student lifecycle systems and data flows. Familiarity with data governance, security, GDPR, and identitymanagement standards (SSO, OAuth). Experience working within public procurement frameworks (e.g., G-Cloud, LUPC, SUPC). Knowledge of event-driven architectures and message-based integrations. Agile delivery More ❯
London, England, United Kingdom Hybrid / WFH Options
iProov
Head of Product (Workforce Identity) About iProov iProov provides science-based biometric solutions that enable the world’s most security-conscious organizations to streamline secure remote onboarding and authentication for digital and physical access. Our award-winning liveness technology and iSOC offer unmatched resilience against deepfakes and generative AI threats while ensuring effortless, scalable user experiences. Trusted by leading … governments and enterprises, including the U.S. Department of Homeland Security, U.K. Home Office, GovTech Singapore, ING, and UBS, iProov sets the standard in biometric identity assurance. This global trust is built not only on our technology but on the strength of the people behind it. For us, diversity at iProov is about reflecting the customers we serve, holding the … the Workforce. Cybercriminals are utilising AI attacks and impersonation to launch high profile attacks on the world’s enterprises and we believe that strong biometric assurance integrated with workforce identity platforms can protect them - and their customers. We need a new Head of Product to help lead this exciting new business line and adapt our existing solutions for this More ❯
london, south east england, united kingdom Hybrid / WFH Options
iProov
Head of Product (Workforce Identity) About iProov iProov provides science-based biometric solutions that enable the world’s most security-conscious organizations to streamline secure remote onboarding and authentication for digital and physical access. Our award-winning liveness technology and iSOC offer unmatched resilience against deepfakes and generative AI threats while ensuring effortless, scalable user experiences. Trusted by leading … governments and enterprises, including the U.S. Department of Homeland Security, U.K. Home Office, GovTech Singapore, ING, and UBS, iProov sets the standard in biometric identity assurance. This global trust is built not only on our technology but on the strength of the people behind it. For us, diversity at iProov is about reflecting the customers we serve, holding the … the Workforce. Cybercriminals are utilising AI attacks and impersonation to launch high profile attacks on the world’s enterprises and we believe that strong biometric assurance integrated with workforce identity platforms can protect them - and their customers. We need a new Head of Product to help lead this exciting new business line and adapt our existing solutions for this More ❯