M365 IAMSpecialist 6-month Contract Outside IR35 Remote Active SC clearance is required We're working with a client that is looking for an M365 IAMSpecialist who will play a key role in securing and optimising our identity infrastructure of the organisation. The ideal candidate will possess extensive expertise in Microsoft … Management (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on Microsoft 365 and Azure AD. Proven experience managing complex M365 tenants (e.g. More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
M365 IAMSpecialist 6-month Contract Outside IR35 Remote Active SC clearance is required We're working with a client that is looking for an M365 IAMSpecialist who will play a key role in securing and optimising our identity infrastructure of the organisation. The ideal candidate will possess extensive expertise in Microsoft … Management (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on Microsoft 365 and Azure AD. Proven experience managing complex M365 tenants (e.g. More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
AHDB
We are currently recruiting for a Federated IAMSpecialist to work on a hybrid basis, two days per week from our HQ in Coventry and the remainder working remotely from home. Occasional travel to meetings in other UK locations are also a possibility. This externally funded role is key to defining & delivering solutions to a number of … our technical delivery team, and with external technical stakeholders, to deliver robust cross-industry digital & data solutions. Youll work with our teams to develop and execute a comprehensive federated IAM design, as well as engineering elements of a core IAM solution. At the Agriculture and Horticulture Development Board (AHDB), we inspire our farmers, growers and industry to succeed … legacy for the next generation. Responsibilities Be a key part of the technical delivery team, delivering a high profile AHDB & Industry data project Develop and execute a comprehensive federated IAM design, initially targeted around the one or two key cross-industry AHDB digital projects, that aligns with AHDB's overall goals and objectives Work with the teams to develop More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
AHDB
We are currently recruiting for a *Federated IAMSpecialist* to work on a hybrid basis, two days per week from our HQ in Coventry and the remainder working remotely from home. Occasional travel to meetings in other UK locations are also a possibility. While professional experience and qualifications are key for this role, make sure to check … our technical delivery team, and with external technical stakeholders, to deliver robust cross-industry digital & data solutions. Youll work with our teams to develop and execute a comprehensive federated IAM design, as well as engineering elements of a core IAM solution. At the Agriculture and Horticulture Development Board (AHDB), we inspire our farmers, growers and industry to succeed … legacy for the next generation. *Responsibilities * * Be a key part of the technical delivery team, delivering a high profile AHDB & Industry data project * Develop and execute a comprehensive federated IAM design, initially targeted around the one or two key cross-industry AHDB digital projects, that aligns with AHDB's overall goals and objectives * Work with the teams to develop More ❯
East Kilbride, Scotland, United Kingdom Hybrid / WFH Options
Xcede
M365 IAMSpecialist All candidates should make sure to read the following job description and information carefully before applying. 6-month Contract Outside IR35 Remote Active SC clearance is required We're working with a client that is looking for an M365 IAMSpecialist who will play a key role in securing and optimising More ❯
an IAMSpecialist to join their team. In this role, you will be responsible for the development, implementation, and ongoing maintenance of IdentityandAccessManagement (IAM) policies and procedures. You will play a key role in identifying, assessing, and mitigating IAM-related risks to ensure the security and compliance of organizational access systems. As … an IAMSpecialist, you will collaborate with cross-functional teams to deliver global IAM services, streamlining identityandaccessmanagement across the business. Your proactive approach will help maintain a secure environment, ensuring access is granted based on the principles of least privilege while meeting business needs. This is an excellent opportunity to contribute to a … secure and efficient IAM framework while supporting a leading organization in the systems integration space. If you have experience in IAM solutions, risk management, and security best practices, apply now! Responsibilities: Provide consultancy on IAM Best Practices (technical, governance & process) to different stakeholders/teams. Overall responsibility for the development and maintenance of IAM policies andMore ❯
About the Role: We are seeking an experienced Identity & AccessManagementSpecialist with a strong background in designing, implementing and managing robust IAM strategies and solutions to safeguard our client’s information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager … this role is instrumental in maintaining a secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure and efficient access controls … and implement processes for the entire identity lifecycle, including joiners, movers and leavers (JML). Implement and manage PAM solutions to control and monitor privileged access. Develop and enhance IAM-related incident response plans to address potential security incidents. Qualifications: Proven experience in IAM or related roles. In-depth knowledge of IAM principles, technologies, and best practices. More ❯
About the Role: We are seeking an experienced Identity & AccessManagementSpecialist with a strong background in designing, implementing and managing robust IAM strategies and solutions to safeguard our client's information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager … this role is instrumental in maintaining a secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure and efficient access controls … and implement processes for the entire identity lifecycle, including joiners, movers and leavers (JML). Implement and manage PAM solutions to control and monitor privileged access. Develop and enhance IAM-related incident response plans to address potential security incidents. Qualifications: Proven experience in IAM or related roles. In-depth knowledge of IAM principles, technologies, and best practices. More ❯
About the Role: We are seeking an experienced Identity & AccessManagementSpecialist with a strong background in designing, implementing and managing robust IAM strategies and solutions to safeguard our client's information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager … this role is instrumental in maintaining a secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure and efficient access controls … and implement processes for the entire identity lifecycle, including joiners, movers and leavers (JML). Implement and manage PAM solutions to control and monitor privileged access. Develop and enhance IAM-related incident response plans to address potential security incidents. Qualifications: Proven experience in IAM or related roles. In-depth knowledge of IAM principles, technologies, and best practices. More ❯
We're partnering with a leading organisation who are on the lookout for a skilled IdentityandAccessManagement (IAM) Specialist to take the lead in safeguarding access to critical systems and services. If you know your SSO from your MFA, and you're passionate about building secure, streamlined user experiences, this one’s for you. What … you’ll be doing: Owning and evolving IAM frameworks that support secure access across the organisation Driving the implementation of Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Managing Privileged AccessManagement (PAM) to ensure the right people have the right access at the right time Making sure authentication and authorisation processes are as strong as they are … seamless Collaborating with security and infrastructure teams to make compliance a no-brainer What we’re looking for: Solid experience delivering IAM solutions in complex environments Practical knowledge of SSO, MFA, PAM, andaccess governance Strong grasp of access control models and authentication protocols Experience in or with the public sector? Even better This is your chance to join More ❯
We're partnering with a leading organisation who are on the lookout for a skilled IdentityandAccessManagement (IAM) Specialist to take the lead in safeguarding access to critical systems and services. If you know your SSO from your MFA, and you're passionate about building secure, streamlined user experiences, this one’s for you. What … you’ll be doing: Owning and evolving IAM frameworks that support secure access across the organisation Driving the implementation of Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Managing Privileged AccessManagement (PAM) to ensure the right people have the right access at the right time Making sure authentication and authorisation processes are as strong as they are … seamless Collaborating with security and infrastructure teams to make compliance a no-brainer What we’re looking for: Solid experience delivering IAM solutions in complex environments Practical knowledge of SSO, MFA, PAM, andaccess governance Strong grasp of access control models and authentication protocols Experience in or with the public sector? Even better This is your chance to join More ❯
Cyber Security Specialist (PAM/IAM Solutions/Application Control - whitelisting/blacklisting) Location: Dartford Salary: Competitive base, car/travel allowance + benefits Job Type: Permanent Be part of transforming the construction industry, be part of our Cyber Security team. Are you able to support comprehensive Cyber Security programs whilst optimising the operational performance and reliability … and showcase your knowledge of regulation standards, compliance and governance. Essential experience includes: Experience in configuring and managing PAM solutions in enterprise environments. Familiarity with identityandaccessmanagement (IAM) principles , including role-based access control (RBAC) and least privilege. Strong understanding of Application Control concepts, tools, and technologies (e.g., whitelisting, blacklisting, application allowlisting ). Experience in configuring andMore ❯