to the CISO and is part of the Risk, Security and Control (RSC) team. RSC are collectively responsible for ensuring IT Security is managed through IdentityandAccessManagementand Cyber Security. Additionally, RSC ensures all risks are recorded and where possible mitigated and IT controls, procedures and policies are implemented successfully. NUMBER OF … similar roles including in-depth troubleshooting, mentoring and managerial skills. KEY RESPONSIBILITIES 1. Provide strong and experienced leadership. 2. Govern and advise on technical direction for Authentication, CyberArk andAccessManagement, especially through technical workshops and 1:1 coaching sessions, to ensure alignment to business strategy. 3. Creation and maintenance of technical guides to convey facts … simply and effectively to both peers and those less experienced. 4. Daily managementand maintenance of the Authentication, CyberArk andAccessManagement platform, ensuring service availability; health and performance monitoring & alerting and the maintenance of operational & technical documentation. 5. Balance technical fact/opinion against business risk/delivered service to provide well thought More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Experis
consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security … Management: Enabling identity sharing and single sign-on across different organisations or domains. Privileged AccessManagement (PAM): Securing, controlling, and monitoring access to critical systems by privileged users. Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. Privileged AccessManagement (PAM): Securing, controlling, and … governance processes Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
supporting systems it will need to integrate with as part of the end-to-end journey. Project Overview: Our client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand … API Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end … governance processes. ? Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation. ? Present publications at technical design authorities for input, feedback, and approval. Risk and Dependency Management: ? Effectively manages and escalates both technical and project risks or issues. ? Articulates solutions and remediation steps to technical risks & issues. ? Ability to map design decisions to resultant technical More ❯
days in the office is mandatory End Date: 30th November (renewal end of Nov) £567 Project Overview: The client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API … Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). The client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead … to-end journey. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud. Broad background across information technology with the ability to communicate clearly with non-security More ❯
Identity & AccessManagement (IDAM) Analyst – Contract Contract Details 6 months initially, with potential extension. £500 to £550 P/d Inside IR35 Full-time, Monday to Friday. Hybrid role (3 Days a week in London Office) We are seeking an experienced Identity & AccessManagement (IDAM) Analyst to join … role will suit a hands-on analyst with strong technical knowledge of IDAMand PAM platforms with a focus on Entra ID, as well as excellent communication and stakeholder management skills. Key Responsibilities Manage user account lifecycle (creation, modification, deletion). Ensure consistency of IDAM processes in line with policies and standards. Administer and support enterprise PAM solutions … Movers-Leavers (JML) processes. Conduct periodic audits of user identities and access. Provide adoption training and liaise with stakeholders regarding process changes. Requirements Significant hands-on experience in an IDAM or Security Analyst role. Solid knowledge of Microsoft Active Directory and Azure AD/Entra ID. Strong background in identitymanagement/provisioning tools (e.g., CyberArk More ❯
belfast, antrim, united kingdom Hybrid / WFH Options
Allstate
our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device andidentity protection. Your role in the team As the Digital Product Manager for the Web AccessManagement (WAM) team within the Identityand … intuitive platforms that reduce friction and improve operational efficiency. The WAM team plays a pivotal role in advancing IAM initiatives across the organization, including customer identityandaccess management. In partnership with engineering and product leadership, you will define strategic direction, manage roadmaps and performance outcomes, and drive adoption of integrated access solutions that … channels. Previous experience with Agile methodologies and product management tooling. Technical knowledge of development processes, human centered design, UX/UI design, andIdentityandAccessManagement concepts and technologies. Desirable Skills Previously held a leadership/coaching position within a global cross functional team Supervisory Responsibilities This job has supervisory responsibilities More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
Senior Identity & AccessManagement Engineer London – Hybrid | £110,000 We are working with one of our best financial services clients to hire a Senior Engineer – IT Security (Identity & AccessManagement/Directory Services). This is a senior technical role focused on shaping and managing the firm’s hybrid identity environment, ensuring secure, efficient, and scalable access to critical enterprise systems. If you’re a specialist in Active Directory, Entra ID, DNS/DHCP/IPAM, and IAM strategy, this … is an opportunity to lead impactful initiatives within a highly regulated, enterprise-scale financial services environment. The Role As Senior IAM Engineer, you will: Lead the design, implementation, andmanagement of hybrid identity infrastructure (Active Directory, Entra ID, Infoblox) Drive improvements in authentication, access governance, automation, and compliance across a global organisation Act as More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
IdentityAccess Architect Specialist with expertise in SailPoint and SAP IDM. This role is crucial for designing, implementing, and maintaining robust identityandaccessmanagement (IAM) solutions across a large-scale enterprise environment, as part of our clients strategic migration project. Day-to-day of the role: Lead the architecture … integration of IAM solutions with enterprise systems and applications. Participate in incident response and troubleshooting related to IAM systems. Required Skills & Qualifications: Proven experience in SailPoint IdentityIQ and SAP IdentityManagement (IDM) . Strong understanding of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in … e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable: Experience with cloud IAM solutions (e.g., Azure AD, AWS IAM ), familiarity with DevSecOps practices and tools, and relevant certifications such as CISSP or CISM. Benefits: Opportunity More ❯
Technologies: SAP Netweaver Data ManagementIdentityAccessManagement Worlflow Content Management Service Orientated Enterprise Integration Liferay JavaScipt Oracle Weblogic Jenkins Sparx Excellent contract opportunity for a Technical Architect to join an International client in the Pharmaceutical sector on an initial 3-month contract with long-term extension. The chosen candidate … and implementation of portal and workflow solutions, enterprise integration, SDLC technical standards & SDLC tools - configuration and management. Relevant professional expertise: (eg SAP (ERP, Basis, Netweaver, Portal) Master Data Management, IdentityAccessManagement, Workflow/Case management, Portal/Content Managementand Unified Communications) are desirable. Role-specific experience More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
VANLOQ LIMITED
to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large … scale IT transformation programmes. Skilled in Identity & AccessManagement (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged accessmanagement, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication More ❯
occasional onsite) Salary: Competitive + Benefits Permanent: 2-Year Apprenticeship, Full-time Key Essential Skills: Strong motivation and enthusiasm for a long-term career in IT. Interest in Identity & AccessManagementand information security principles (training will be provided). Basic understanding of Microsoft Office tools and general IT familiarity. Excellent communication skills, with … learn technical concepts quickly. Training & Career Development Comprehensive 2-year apprenticeship programme with structured milestones. Full technical training in IAM, including Microsoft Entra/Active Directory, role-based access control (RBAC), and audit processes Mentorship from experienced IAM professionals. Opportunities to gain industry-recognised certifications (eg, ITIL, IAM-specific qualifications). A clear Pathway to becoming an Identity … Administrator. This role is designed for individuals who may not yet have the technical skills but are eager to build a long-term career in IdentityandAccessManagement (IAM). Full training, mentoring, and hands-on experience will be provided to help you develop into a skilled Identity & AccessMore ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
of capabilities in consulting, design, engineering, and operations Location: Sheffield, UK | Hybrid/Remote We are seeking an experienced Design Engineer with strong expertise in cybersecurity architecture andidentity & accessmanagement to join our client’s team in Sheffield. This role offers the opportunity to manage end-to-end solution design and deliver impactful … practices, operations risk management, laws, regulations, and ethics within the financial industry. Hands-on experience in Identity & AccessManagementand Secrets Management (HashiCorp Vault preferred). Knowledge of Privileged AccessManagement (PAM) (CyberArk mandatory). Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identitymanagement . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out for a confidential discussion. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
rolling 6 months We are seeking an experienced IAM Technical Analyst to join a leading financial services organisation. This role will be part of a large-scale Cybersecurity andIdentity & AccessManagement (IAM) programme, delivering business-critical solutions across a complex and highly regulated environment. Key Responsibilities Gather requirements across the IAM stack, working … ensuring on-time, high-quality outcomes. Operate as a self-sufficient, proactive team player within a large programme environment. Key Skills & Competencies Deep understanding of IdentityandAccessManagement (IAM), including: Authentication Governance AccessManagement Privileged AccessManagement Strong analysis and requirements-gathering skills in a … technical environment. Process mapping expertise, with proficiency in MS Excel, Visio, and Confluence. Experience delivering within large-scale Cybersecurity and IAM programmes. Excellent stakeholder managementand communication skills, with the ability to engage effectively across global, cross-functional teams. Strong presentation skills, able to clearly communicate progress and delivery roadmaps. Knowledge of financial services and the regulatory environment More ❯
Job Title: Product Owner - IdentityandAccessManagement (IDAM) Location - London plus travel About the Role: We're seeking a flexible and driven Product Owner to lead the development and transformation of our IdentityandAccessManagement (IDAM) products. This is a pivotal role where you'll collaborate … across departments and levels to shape the future of our enterprise-wide IDAM strategy. You'll be responsible for managing the full product lifecycle-from ideation and development to sustainment and decommissioning-ensuring alignment with strategic goals and user needs. This role requires a confident individual with excellent organisational, communication, and stakeholder engagement skills. Key Responsibilities: Stakeholder Collaboration: Build strong … relationships across the organisation to understand business needs and translate them into product requirements. Product Strategy & Lifecycle Management: Lead the transformation of IDAM products into scalable, sustainable solutions aligned with enterprise strategy. Demand Management: Balance delivery of new capabilities with the maintenance of mission-critical products. Governance & Integration: Submit and advocate for new requirements through the More ❯
the epics and ensure the required processes are applied to deliver epics on time, within budget and with the desired outcomes aligned to objectives. In the context of our IDAM Programme, we are looking an Infrastructure Project Leader/EDO with knowledge of the IDAM (IDentity & AccessManagement) domain to lead technical projects. The … is respected Report these elements to the appropriate stakeholders/committees in order to ensure full awareness and appropriate decisions are taken Your responsibilities: In relation to the management aspects: Running the epic on a day-to-day basis on behalf of the Sponsorship Committee: Monitor the epic, from definition phase to closure phase, including managing all internal … these ones (Planning, Budgets, Risks & Issues, Resources management ). Previous experience of outsourced projects management is a plus. You naturally have strong negotiation and conflict management skills and you are able to influence different levels of management towards your projects targets. You are fluent in English and have excellent communication skills (listening More ❯
strong background in Identity Security Cloud solutions and technical identity recruitment processes. You will play a key role in streamlining our IdentityandAccessManagement (IAM) by leveraging SailPoint's capabilities to ensure least-privilege access , enforce zero trust policies , and support full lifecycle identity governance … and on-prem environments. Implement and optimize least-privilege access policies, automated role management , and real-time access monitoring . Manage and govern access for non-employees , privileged users , and machine identities . Automate onboarding/offboarding processes through identity recruitment workflows . Integrate SailPoint with HR systems, Active Directory … Azure AD, Okta, ServiceNow, and other key platforms. Build and customize access certifications , policy enforcement , and risk-based access controls . Develop and maintain audit-ready compliance reports (GDPR, HIPAA, PCI, CCPA, FISMA, etc.). Work with DevSecOps and Security Engineering to detect and respond to access-related threats. ?? What You Bring: Proven experience More ❯
/10/2025 Job Type: Contract until end of the year with potential extension Role Description: Our client is working on a strategic IdentityandAccessManagement programme and is re-shaping the way Authentication, Federation, Privileged AccessManagement, Access Governance, Secrets Managementand API … Security is done across the bank. One of the pillars of that programme is Privileged AccessManagement (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. Security Solution Architects manage end-to … sharing solutions at design authorities and senior leadership & stakeholders as well as working with global teams to both explain the design and agree designs related to the Password Management of new Technologies. More ❯
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised More ❯
the epics and ensure the required processes are applied to deliver epics on time, within budget and with the desired outcomes aligned to objectives. In the context of our IDAM Programme, we are looking an Infrastructure Project Leader/EDO with knowledge of the IDAM (IDentity & AccessManagement) domain to lead technical projects. The … is respected Report these elements to the appropriate stakeholders/committees in order to ensure full awareness and appropriate decisions are taken Your responsibilities: In relation to the management aspects: Running the epic on a day-to-day basis on behalf of the Sponsorship Committee: Monitor the epic, from definition phase to closure phase, including managing all internal … these ones (Planning, Budgets, Risks & Issues, Resources management ). Previous experience of outsourced projects management is a plus. You naturally have strong negotiation and conflict management skills and you are able to influence different levels of management towards your projects targets. You are fluent in English and have excellent communication skills (listening More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Manpower Group Internal Talent
IDAM Operations Manager Location: Uxbridge (Hybrid) - with up to 10% international travel About the Role: We are seeking an experienced and proactive IDAM Operations Manager to lead the operational delivery of IdentityandAccessManagement (IDAM) services across our global footprint. This is a strategic role within our enterprise infrastructure transformation programme, supporting over … countries and $20+ billion in revenue. You will be responsible for overseeing the daily operations, governance, and security of IDAM systems, ensuring compliance, efficiency, and alignment with global standards. This role offers the opportunity to shape future-state IDAM processes and technologies, while collaborating with cross-functional teams across IT, HR, and business units. Key Responsibilities: Leadership & Strategy Lead and … IDAM-related projects from planning to execution Coordinate cross-functional teams and ensure timely delivery Manage initiatives between Global Technology and People & Culture Process Redesign & Automation Redesign Active Directory andIDAM operations for efficiency and compliance Implement automation strategies to reduce manual intervention Establish governance standards for Global Identity Services About You: Bachelor's degree in IT, Engineering More ❯
Uxbridge, Middlesex, United Kingdom Hybrid / WFH Options
Manpower Group
IDAM Operations Manager Location: Uxbridge (Hybrid) - with up to 10% international travel About the Role: We are seeking an experienced and proactive IDAM Operations Manager to lead the operational delivery of IdentityandAccessManagement (IDAM) services across our global footprint. This is a strategic role within our enterprise infrastructure transformation programme, supporting over … countries and $20+ billion in revenue. You will be responsible for overseeing the daily operations, governance, and security of IDAM systems, ensuring compliance, efficiency, and alignment with global standards. This role offers the opportunity to shape future-state IDAM processes and technologies, while collaborating with cross-functional teams across IT, HR, and business units. Key Responsibilities: Leadership & Strategy Lead and … IDAM-related projects from planning to execution Coordinate cross-functional teams and ensure timely delivery Manage initiatives between Global Technology and People & Culture Process Redesign & Automation Redesign Active Directory andIDAM operations for efficiency and compliance Implement automation strategies to reduce manual intervention Establish governance standards for Global Identity Services About You: Bachelor's degree in IT, Engineering More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
PAM Business Systems AnalystUtilitiesPredominantly remote: Occasional travel to Warwick6 months+£550 per day In short: We're implementing new and heavily regulated controls across our Privileged AccessManagement solution and we need a strong PAM Systems BA who can document the processes around implementing controls and regulatory requirements. You will be delivering across BAU, Programmes and … Vendors. Please only apply if you have delivered a PAM implementation. In full: PAM (Privileged AccessManagement) System Analyst is an IT security professional who analyses, designs, and implements solutions to control, monitor, and secure privileged accounts, which are accounts with elevated access to an organisation's critical systems and data. This role involves … analyse business needs and translate them into technical requirements. Communication: Excellent verbal and written communication skills for interacting with diverse stakeholders. Technical Knowledge: Understanding of identityandaccessmanagement (IAM), security principles, and potentially specific PAM tools (Cyberark, TPAM, BeyondTrust) Project Management: Ability to work on project deliverables and manage requirements through More ❯