Remote Identity Access Management Jobs in the North of England

8 of 8 Remote Identity Access Management Jobs in the North of England

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged Access Management (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
Employment Type: Contract
Posted:

Design Engineer

handsworth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged Access Management (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
Posted:

Cyber Identity Access Architect Specialist

Sheffield, South Yorkshire, England, United Kingdom
Hybrid / WFH Options
Reed
Identity Access Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identity and access management (IAM) solutions across a large-scale enterprise environment, as part of our clients strategic migration project. Day-to-day of the role: Lead the architecture … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP Identity Management (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity More ❯
Employment Type: Contractor
Rate: £650 - £725 per day, Inc benefits
Posted:

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
Employment Type: Contract, Work From Home
Posted:

Security Architect

Sheffield, South Yorkshire, England, United Kingdom
Hybrid / WFH Options
KBC Technologies UK LTD
of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture and identity & access management to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful … practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & Access Management and Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged Access Management (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identity management . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out for a confidential discussion. More ❯
Employment Type: Contractor
Rate: £480 - £510 per day
Posted:

IAM Technnical Analyst

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
rolling 6 months We are seeking an experienced IAM Technical Analyst to join a leading financial services organisation. This role will be part of a large-scale Cybersecurity and Identity & Access Management (IAM) programme, delivering business-critical solutions across a complex and highly regulated environment. Key Responsibilities Gather requirements across the IAM stack, working … ensuring on-time, high-quality outcomes. Operate as a self-sufficient, proactive team player within a large programme environment. Key Skills & Competencies Deep understanding of Identity and Access Management (IAM), including: Authentication Governance Access Management Privileged Access Management Strong analysis and requirements-gathering skills in a … technical environment. Process mapping expertise, with proficiency in MS Excel, Visio, and Confluence. Experience delivering within large-scale Cybersecurity and IAM programmes. Excellent stakeholder management and communication skills, with the ability to engage effectively across global, cross-functional teams. Strong presentation skills, able to clearly communicate progress and delivery roadmaps. Knowledge of financial services and the regulatory environment More ❯
Employment Type: Contract
Posted:

Head of IT Security and Platform Engineering (Hybrid) Newcastle - To £115k+ Bens

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & access management, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Project Manager

Sheffield, South Yorkshire, England, United Kingdom
Hybrid / WFH Options
Reed
Security Project Manager to lead governance and orchestration across our client's strategic Active Directory (AD) Resiliency Programme. This programme includes nine critical workstreams aimed at strengthening infrastructure, access controls, and overall cyber posture. Day-to-day of the role: Lead end-to-end project management across multiple AD resiliency workstreams, including Conditional Access … security standards and regulatory obligations. Required Skills & Qualifications: Proven experience delivering complex cyber security or infrastructure programmes in large enterprise environments. Understanding of Active Directory, identity and access management, and enterprise IT architecture. Exceptional governance , planning , and stakeholder management skills . Ability to manage multiple concurrent workstreams with competing priorities . Experience More ❯
Employment Type: Temporary
Salary: £450 - £525 per day, Inc benefits
Posted:
Identity Access Management
the North of England
10th Percentile
£32,500
25th Percentile
£46,875
Median
£57,500
75th Percentile
£67,500
90th Percentile
£85,000