South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
Identity & AccessManagement Engineer London, UK £800/day Hybrid (1 Day Office, 4 WFH) Contract (612 Months) Were hiring an Identity & AccessManagement Engineer to support a public sector cyber security uplift programme. The successful contractor will … lead on the separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal … Active Directory: Tier-0 structure, Group Policy, OU segmentation. AADC: Hybrid sync troubleshooting, filtering, and role scoping. Zero Trust & PAW: Secure workstation policies andaccess controls. Contract Details: Start Date: 2nd June Contract Length: 612 Months Clearance Required: Active SC If this Identity & AccessMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Description The Identity & AccessManagement (IAM) team, sitting within the Cyber Security function, ensures that access for all Motability Operations (MO) employees and customers is correct, appropriate, and secure. Within the IAM function: The IDaaS team is responsible for customer identities, SSO … compliance with IAM policies. Qualifications You are an experienced leader in Identity Governance & Administration (IGA), with a passion for developing and improving identity processes. You have strong expertise in access control, compliance, and security frameworks, and understand how to balance risk management … governance with business objectives. You have a proactive approach, always looking for ways to enhance automation, role-based access control (RBAC), andidentity lifecycle management. Your experience in working with IGA tools such as Saviynt, SailPoint, EntraID or similar gives you the ability to drive improvements More ❯
Employment Type: Permanent, Part Time, Work From Home
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
RWE AG
Management (IDAM/PAM) Specialist to join our team. This position is pivotal in ensuring robust identityandaccess control measures, aligning with organizational security policies and regulatory requirements, and driving strategic initiatives. You will lead efforts to mitigate cyber risks, manage … PAM processes, and support the organization's growth through resilient and efficient accessmanagement systems. Your future plans Lead and manage IdAM/PAM initiatives, including Joiner-Mover-Leaver (JML) processes. Oversee access reviews and upscale certification campaigns within RWE using Sailpoint. Manage the … anomalies and implement protection measures around them. Reduce Cybersecurity exposure by supporting internal & external compliance processes related to accesses. Manage identityandaccess security requests through JIRA while collaborating with an agile team and a managed service provider. Oversee Local Admin Right reductions. Ensure operational efficiency More ❯
have: Experience with system management stacks used in the management of reasonably large HPC systems, including identityandaccessmanagement, system configuration, software deployment, high performance networks, and software container technology and monitoring. Development experience classic compiled languages such as … bigger-picture thinking. You might also have: M.Sc./Ph.D. in a Science, Technology, Engineering or Mathematical discipline. Experience with the Cray System Management software or OpenCHAMI Experience in one or more domain specific software ecosystems (e.g. weather and climate, computational fluid dynamics, AI, data science). Experience … Planning, Active Learning (Inactive), Active Listening, Agile Methodology, Agile Scrum Development, Analytical Thinking, Bias, Coaching, Creativity, Critical Thinking, Cross-Functional Teamwork, Data Analysis Management, Data Collection Management (Inactive), Data Controls, Design, Design Thinking, Empathy, Follow-Through, Group Problem Solving, Growth Mindset, Intellectual Curiosity (Inactive), Long Term More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
will provide architectural leadership across IT infrastructure, applications, and cybersecurity domains, with a strong emphasis on secure-by-design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (eg networks, servers, storage, virtualisation), application architecture (eg integration, APIs, data), and cyber security architecture (eg identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure … ability to engage and influence C-level and senior stakeholders through clear communication and strategic thinking. Desirable Skills and Qualifications Background in risk management, security assurance, or information governance is advantageous. Key Attributes Strategic thinker with strong analytical and problem-solving skills. Excellent verbal and written communication skills. More ❯
an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting … regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports … the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction More ❯
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. · Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). · Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles and NIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based … regulated environments. Expertise in IT infrastructure architecture (e.g. networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & accessmanagement, threat modelling, security controls). Strong working knowledge and application of NIST Risk Management Framework, Secure More ❯
leadership. Gain exposure to innovative technology. Work with customers and identify opportunities to support their strategy and improve their processes across functions. Gain access to endless learning opportunities. The Role As a Security Architect focusing on Mortgages systems, your primary responsibility will be to design, implement, and maintain … controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and standards, including GDPR, SOX, and PCI-DSS. Implement advanced encryption andaccess control mechanisms to safeguard data integrity and confidentiality. Implement Cloud Security controls through Firewalls and leverage Defender for Cloud capabilities in the Security … working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITRE ATTACK & STRIDE. Proficiency in assessing the Identity & AccessManagement functions & associated risks during Acquisition process. Be able to understand and assess the security elements of technical designs More ❯
swindon, wiltshire, south west england, United Kingdom
Tata Consultancy Services
leadership. Gain exposure to innovative technology. Work with customers and identify opportunities to support their strategy and improve their processes across functions. Gain access to endless learning opportunities. The Role As a Security Architect focusing on Mortgages systems, your primary responsibility will be to design, implement, and maintain … controls & mitigations to potential vulnerabilities Ensure the design comply with relevant regulations and standards, including GDPR, SOX, and PCI-DSS. Implement advanced encryption andaccess control mechanisms to safeguard data integrity and confidentiality. Implement Cloud Security controls through Firewalls and leverage Defender for Cloud capabilities in the Security … working previously for financial organizations. Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITRE ATTACK & STRIDE. Proficiency in assessing the Identity & AccessManagement functions & associated risks during Acquisition process. Be able to understand and assess the security elements of technical designs More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
facing applications, backend systems, and future initiatives. About you You should have significant experience or aptitude in areas such as: IdentityandAccessManagement (e.g., MFA, SAML, Kerberos) Networking protocols and security (e.g., IPv4/6, TLS, VPN, Wireless Security) Automation and scripting (e.g. More ❯
IG and DS Strong experience in PingOne Advanced Identity Cloud with experience in designing implementing and managing scalable identityandaccessmanagement IAM solutions Should have experience in integrating PingOne Advanced Identity cloud with existing Applications and infrastructure in place More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerability Management, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly and configure … in vulnerability managementand endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identityandaccessmanagement principles Responsibilities: Respond to incidents related to EUC reported through the Service Desk or monitoring systems. Provisioning/patching of … software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with organisational standards. Collaborate More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, andidentityandaccess management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and standards for … as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging security technologies. Collaboration • Partner with vendor management to … security assessments of vendors, including SaaS, IaaS, MSPs, and payroll providers, ensuring adequate protections in contracts and SOWs. • Coordinate with operational and facility management teams to assess the security of operational technology (OT) and IoT systems. • Liaise with architects and practitioners to share best practices and insights. • Work More ❯
At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a … culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is … and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, andidentityandaccess management. We're More ❯
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Logiq
projects that drive efficiency and innovation across diverse sectors. Join a practice of enthusiastic IT professionals, always willing to learn, share and collaborate Access professional development pathways tailored to your career ambitions. Enjoy flexible working arrangements and a competitive benefits package. What the team say “At Logiq, I … From the outset, the successful candidate will be joining a large scale and dynamic programme leading a technical architecture team which will deliver Identity solutions with strategic impact in our client and at multiple levels of classification. You will: Technically and procedurally oversee the production of Identity … or delivering complex IT requirements or technology programmes. Proven experience and knowledgeable on the technical aspects of solution andidentity architecture e.g. IDAM, MFA, SSO at various levels of classification to the level required to understand, debate and drive solution design choices Experience delivering into MOD, relevant governance More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
listen to what matters to you. Learn more about our flexible status at Flexa Careers Why Work for Us? Joining BMT means gaining access to a comprehensive set of employee benefits designed to empower your success. In addition to a competitive salary, our offerings encompass health, family, finance … in a diverse range of client projects within the defence, national security, environmental, and research sectors. This includes the provision of strategic risk management advice and/or technical consultancy within the context of cybersecurity. You will join a team of highly skilled professionals dedicated to safeguarding technologies … Architecture (ZTA) expertise for enterprise, cloud and air-gapped environments along with knowledge of operational use of Zero Trust within any of the following: , IdAM systems, application security, supply chain security, data protection, other. As a Principal Cyber Security Consultant, you will be responsible for leading technical delivery teams, shaping More ❯