Identity Access Management Jobs in the Thames Valley

15 of 15 Identity Access Management Jobs in the Thames Valley

Security & Identity Product Manager

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Pertemps
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and Access Management (IDAM), Active Directory (AD) management, and supplier relationships. This … remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active … internal teams (IT,. security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security and identity management needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Identity & Access Management (IAM) Architect

Reading, Oxfordshire, United Kingdom
Prodapt Solutions Private Limited
IAM-related processes and controls through scripting and Infrastructure-as-Code (IaC) practices. Maintain documentation, architectural diagrams, and technical artifacts related to IAM and access control solutions. Support audit, compliance, and governance initiatives, ensuring adherence to standards such as ISO 27001, NIST, CIS, and SOC 2. Requirements Requirements … IAM tools such as Entra ID (Azure AD), Okta, AWS IAM, GCP IAM, CyberArk, and SailPoint. In-depth understanding of identity and access management concepts, including authentication, authorization, provisioning, de-provisioning, and lifecycle management. Strong expertise with authentication protocols and frameworks: OAuth 2.0, OIDC … and token-based access strategies. Familiarity with modern identity frameworks including Zero Trust, Identity as the Perimeter, and Identity Federation. Experience implementing IAM controls for hybrid and multi-cloud environments, containerized workloads, and serverless applications. Knowledge of mTLS, certificate pinning, and mutual More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of IT Security

Oxford, Oxfordshire, United Kingdom
Ellison Institute, LLC
Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and … Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerability management, and penetration testing to identify and mitigate security risks. Oversee security awareness training programs, ensuring a strong security culture is implemented and embedded … Control (RBAC) are enforced. Manage and improve Privileged Access Management (PAM) solutions to safeguard critical systems. Ensure seamless and secure access control for employees, partners, and researchers while maintaining compliance. Essential Skills, Qualifications & Experience: Demonstrable experience in cybersecurity leadership roles within enterprise-sized organisations. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IDAM Solutions Architect

wokingham, south east england, United Kingdom
Hybrid / WFH Options
Tata Consultancy Services
Wokingham, UK (Hybrid) Number of hours: Standard Ready to utilize your skills & experience in Joiner-Mover-Leaver (JML) process and Identity and Access Management (IDAM)? Join us as a IDAM Solutions Architect. Careers at TCS: It means more TCS is a purpose-led transformation … be responsible for analyzing and enhancing existing JML processes to improve overall efficiency and effectiveness. Key responsibilities: Provide subject matter expertise in JML processes and IDAM, promoting and maintaining industry best practices. Analyze and evaluate current JML processes, identifying areas for optimization. Lead business requirements sessions with key stakeholders across … address process gaps. Excellent written and verbal communication skills, with the ability to convey complex information clearly and concisely. Proven leadership, communication, and project management skills. Bachelor’s or Master’s degree in computer science, Information Technology, Business Administration, or related field. Relevant certifications such as Certified Business More ❯
Posted:

Senior Cyber Security Engineer

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations … both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end … of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs and access to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. We're the UK's largest water and wastewater More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Lead Security Engineer

Milton Keynes, Buckinghamshire, United Kingdom
Hybrid / WFH Options
Allica Bank
plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with … real-time, collaborating with cross-functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identity and access management framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities … Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identity and access management (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Identity and Access Management (IAM) & Security Expert

Slough, Berkshire, United Kingdom
Sprytech Ltd
Identity and Access Management (IAM) & Security Expert We are looking for a hard-working candidate who can design and deliver excellent IAM solutions to a range of major private & public sector clients. You should be able to follow set procedures and be able to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior AWS Platform Engineer

Oxford, Oxfordshire, United Kingdom
Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity and access management, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, and management using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access management, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Employment Type: Permanent
Salary: £60000 - £100000/annum Benefits + Bonus
Posted:

Senior AWS Platform Engineer

Oxfordshire, United Kingdom
Hybrid / WFH Options
Computer Futures
Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identity and access management, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure … provisioning, deployment, and management using Infrastructure as Code (IaC) tools. Perform regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and development. Requirements: Proven experience as an AWS Platform Engineer, with a … and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identity and access management, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in More ❯
Employment Type: Permanent
Salary: £75000 - £100000/annum Benefits + Bonus
Posted:

Cyber Security Consultant IT & Digital

Newbury, Berkshire, United Kingdom
Hybrid / WFH Options
Vodafone
with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & Access Management, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of … IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Tech BA

reading, south east england, United Kingdom
Mastek
in Agile teams, public sector (GDS), dealing with stakeholders across technical teams, business change teams and end users. Experience in Identity and Access management is desirable. Roles and Responsibilities Elicit and define business requirements with stakeholders, Working with the developers, produce well-crafted user … ensure alignment with stakeholder expectations, Research, gather requirements, analysis, process design, user story creation for topics such as: Customer experience/user journey Identity lifecycle (joiner, mover, leaver) Lifecycle automation – HR driven data integration Contractor registration Access management processes (request, approve, review, revoke) Service More ❯
Posted:

Security Architects (DV Security Clearance)

Reading, South East
CGI
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic … techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging infrastructure • Containerisation and virtual machine security • Delivering secure solutions against project expectations • Strong awareness of and commitment to industry best practice • Driving change in a complex environment This More ❯
Employment Type: Permanent
Posted:

Azure Integration Developer

reading, south east england, United Kingdom
Burman Recruitment
to modern cloud-based integration solutions. Collaborate with stakeholders to gather requirements and deliver high-quality, scalable solutions. Promote best practices in data management, integration testing, and change management. Support Identity & Access Management systems and provide MDM (Master Data Management … technical users. Ability to prioritise tasks, meet deadlines, and work independently or in a team environment. Desirable: Knowledge of BizTalk , Azure DevOps , API Management , JavaScript , HTML , or ASP.NET . Familiarity with systems such as SITS, Unit4, Dynamics CRM, Blackboard/Canvas, CMIS, or Sitecore. Experience working in large More ❯
Posted:

Cloud Engineer

Maidenhead, Berkshire, United Kingdom
RWS
for containerized workloads Oversee Azure VMware Solution (AVS) environments, ensuring seamless integration with existing infrastructure Implement security best practices, including identity and access management (IAM), encryption, and network security groups Monitor compliance with industry standards (e.g., ISO, SOC, NIST) and regulatory requirements Continuously evaluate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Architect

Slough, Berkshire, United Kingdom
Hays
Databricks and Data Warehouse solutions (must have). Expertise in integration architecture and design patterns. Protocols and formats SOA, Rest, JSON, XML, etc. Identity and Access management. Cloud to Cloud integration & Cloud to On Premise integration. Front End and Back End integrations, network and infrastructure management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Identity Access Management
the Thames Valley
10th Percentile
£61,250
25th Percentile
£64,063
Median
£75,000
75th Percentile
£77,500
90th Percentile
£96,125