measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity … implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively … resolved within assigned SLA's. Evaluate and implement CIS critical security controls where necessary. Will provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training in Cybersecurity, Information Systems, Computer More ❯
Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating … environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security … PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning and budgeting. Follow change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge More ❯
IdentityandAccessManagement Senior Manager page is loaded IdentityandAccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End Date: January 10, 2025 (15 days left to apply) Job … requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: IdentityandAccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally specific benefits ranging from above the norm paid vacation, contributions to retirement investment plans … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Allica Bank
Description Allica's security team plays a crucial role in maintaining the integrity and security of the company's information systems. They ensure that the ISMS (Information Security Management System) controls are not only up to date but also effectively embedded across all departments. This requires a proactive approach and close collaboration with various teams, such as Engineering … mitigation of potential intrusions in real-time, collaborating with cross-functional teams to respond to incidents effectively. Oversee the design and implementation of a robust identityandaccessmanagement framework. Lead the development and enforcement of strategies to detect and prevent user impersonation, account takeovers and other malicious activities aimed at gaining unauthorized access … security, intrusion detection and management. Proven track record in managing continuous threat exposure management programs and responding to security incidents. Strong understanding of identityandaccessmanagement (IAM) systems, tools, and practices, including MFA, SSO, and RBAC. Experience in leading security teams, mentoring engineers, and working cross-functionally with other technical teams. More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. NOTE: Applicants must … per annum (dependent on experience) Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
UNAVAILABLE
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
ensuring compliance across systems. You'll work with various cyber security solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, andaccessmanagement-and want to use your skills to support a mission that changes lives-this is your chance to make a real difference. Location: Office Based … an essential condition of employment. Responsibilities As a MAF Security Operations Specialist you will play a critical role in protecting our digital infrastructure. You'll lead the implementation andmanagement of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identityandaccessmanagement (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your expertise in network security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're More ❯
and Landing zone In addition, any experience of these would be useful: FinOps mentality and "right-sizing" cloud solutions Security and governance conscious engineering (e.g. IdentityandaccessManagement implementation principles) Experience in cloud native governance and policy tooling (e.g. Azure Policy, Google Customer Org Policy). Experience in platform automation to support asset … management tracking and FinOps scenarios. Implementation of governance frameworks to enforce cloud usage policies, tagging standards, and security baselines across multi-project/multi-subscription environments. Collaborate with compliance, risk and audit teams to team to translate regulatory requirements (e.g. SOC2, ISO 27001, HIPPA, GDPR, PCI DSS) into technical controls in the cloud. Adherence and experience of compliance More ❯
Job grade B Closing date 25/06/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security andidentitymanagement solutions, focusing primarily on IdentityandAccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This … in ensuring that our systems remain secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security andidentitymanagement while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead … the delivery of value. Collaborate with internal teams (IT, security, and compliance) to gather requirements and deliver tailored solutions. Evaluate and onboard new suppliers to meet evolving security andidentitymanagement needs. Change Implementation and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and Privileged AccessMore ❯
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer - Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … PTA) vs Federated Hybrid Identity Solutions Windows Active Directory Services (ADDS, FSMO, GPOs, Replication) Windows Networking (TCP/IP, DNS, DHCP) Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: AAD Connect, DirSync, MIM/FIM Active Directory Federation Services (ADFS) or third More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
We are seeking a highly motivated IAM SailPoint Analyst to join our Information Security team. This role is crucial for administering, maintaining, and supporting our IdentityandAccessManagement (IAM) systems and processes, ensuring users have the right access to the right resources at the right time, thereby enhancing our security and … IdentityIQ or IdentityNow is highly preferred, along with other enterprise IAM solutions (e.g., Okta, Microsoft Azure AD). Administer and manage IAM systems, including user provisioning, de-provisioning, access reviews, and RBAC. Perform daily operational tasks like processing access requests and troubleshooting issues. Conduct regular access certifications to ensure compliance with internal policies andMore ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
In Technology Group Limited
optimization. Ensure compliance with industry regulations (e.g., FCA, GDPR) and internal security policies. Implement backup, disaster recovery, and high availability strategies in the cloud. Manage identityandaccessmanagement (IAM), security groups, and networking configurations. Automate deployment pipelines and configuration management using DevOps practices and CI/CD tools (e.g., GitHub Actions … Scripting or automation experience (PowerShell, Bash, or Python). Familiarity with monitoring and logging tools such as Azure Monitor, CloudWatch, or Datadog. Understanding of IT governance, compliance, and risk management within financial services. Desirable Qualifications: Relevant cloud certifications (e.g., Microsoft Certified: Azure Solutions Architect , AWS Certified Solutions Architect , etc.). Experience with hybrid cloud and on-prem to More ❯
optimization. Ensure compliance with industry regulations (e.g., FCA, GDPR) and internal security policies. Implement backup, disaster recovery, and high availability strategies in the cloud. Manage identityandaccessmanagement (IAM), security groups, and networking configurations. Automate deployment pipelines and configuration management using DevOps practices and CI/CD tools (e.g., GitHub Actions … Scripting or automation experience (PowerShell, Bash, or Python). Familiarity with monitoring and logging tools such as Azure Monitor, CloudWatch, or Datadog. Understanding of IT governance, compliance, and risk management within financial services. Desirable Qualifications: Relevant cloud certifications (e.g., Microsoft Certified: Azure Solutions Architect , AWS Certified Solutions Architect , etc.). Experience with hybrid cloud and on-prem to More ❯
and orchestration technologies (e.g., Docker, Kubernetes). Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform) to streamline provisioning andmanagement of cloud resources. Monitor, optimise, and troubleshoot cloud infrastructure performance, security, and costs, utilising monitoring tools and logging frameworks Implement and enforce cloud security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC, SOC2). What we look for Bachelor's degree or equivalent experience in Computer Science or related field Proven experience (3 years) as a cloud engineer, solutions architect, or similar role, with hands-on experience designing, deploying, andMore ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
incident response. Youll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
incident response. Youll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
Chatham, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
response. You’ll bring: Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines, and tools like … programme at a critical juncture Join a newly formed Cloud Centre of Excellence and shape its future Enjoy a collaborative, agile work environment with true cross-team impact Access cutting-edge tools and technologies in a cloud-first organisation Benefit from a flexible working model, comprehensive training, and career growth This is a rare opportunity to step into More ❯
service. You will need to have experience in: Delivering and maintaining of enterprise security solutions/architecture for (but not limited to) the following areas: IdentityandAccessManagement, Cloud Security - Azure, AWS or GCP, Network Security, DevSecOps, Security Monitoring & Remediation, Defense in Depth Security Architecture, particularly Zero Trust Security Architecture Knowledge of Secure … Software Development Life Cycle best practices and architecture frameworks such as TOGAF or SABSA Strong understanding and knowledge of Information Security risk management tools and techniques Demonstrable knowledge of cyber security frameworks, including but not limited to: ISO27001, PCI-DSS, CIS Benchmarks, Cloud Platform Well Architected Frameworks. Demonstrable experience of designing and implementing enterprise security technology controls andMore ❯
Employment Type: Full-Time Experience Level: Senior/SME (5+ Years) 18 Months contract Up to £70k + benefits 100% remote Are you a Microsoft IdentityandAccessManagement expert passionate about solving complex technical challenges for global enterprises? We are looking for a Support Engineer – Entra ID SME to join our high-performing … trusted advisor , owning and resolving complex Entra ID-related technical issues. Collaborate with engineering and escalation teams to deliver top-tier support. Troubleshoot and resolve identityandaccess issues across hybrid and cloud environments. Drive knowledge-sharing, process improvement, and technical mentorship within the team. Work with tools like Fiddler, Wireshark, PowerShell, Graph API, and more. … PTA) vs Federated • Hybrid Identity Solutions • Windows Active Directory Services (ADDS, FSMO, GPOs, Replication) • Windows Networking (TCP/IP, DNS, DHCP) • Microsoft 365 IdentityandAccessManagement Preferred Technical Experience: Competencies and experience with some of the below technologies: • AAD Connect, DirSync, MIM/FIM • Active Directory Federation Services (ADFS) or third More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Searchability®
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
South East London, England, United Kingdom Hybrid / WFH Options
Searchability®
Cloud Solutions Architect – Security & Secrets Management Focus • This is a strategic and hands-on cloud security architecture role with a focus on secrets managementand non-human identity protection across multi-cloud and SaaS environments. • This is a 3–6 month contract paying up to £600/650 p/d, based remotely with … systems across industries. What will you be doing? As a Cloud Solutions Architect, you will lead the design and delivery of cloud security enhancements, with emphasis on secrets managementandidentityaccessmanagement in cloud environments. You’ll be the SME for related security capabilities and will engage with internal engineering teams … design patterns. You’ll also drive standards, mentor teams, and help operationalise best practices within the cloud security domain. What will you need? • 3+ years experience implementing secrets management solutions at scale (e.g. HashiCorp Vault, Azure Key Vault, AWS Secrets Manager) • Experience with cloud security posture management (CSPM) across AWS, Azure, GCP • Proficiency in Terraform andMore ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
lifestyle and helps you reach your ambitions. We are looking for someone enthusiastic and ambitious to join our Pre-Sales team to work with our IdentityandAccessmanagement portfolio. In this position, you will be working closely with the Workforce IAM sales team to respond to partner and customer needs for our solutions. … and half about the technical skills; so, you will need to have experience on both sides. Also, you will be working with other IAM Pre-Sales consultants and product management on driving the Thales Workforce IAM portfolio. Identity, AccessManagementand Cryptography underpin everything that we do and so the more you … learn and interested in technology; the ability and desire to 'learn something new' will really help. The position is based in the United Kingdom near to London and easy access to the Thales Head Office in Reading. You will need to be mobile as we have customers across the French speaking territories. We expect you would be travelling More ❯
confidentiality, integrity, and availability of our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts to promptly detect, analyze, and … and alerts, investigate suspicious activities, and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. IdentityandAccessManagement: Manage user access controls, authentication mechanisms, andidentitymanagement systems to ensure appropriate levels of accessand … qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, age, sex, marital status, ancestry, neurotype, physical or mental disability, veteran status, gender identity, sexual orientation or any other category protected by law. Requisition ID: 5752 Reporting into: Damon Hefner, Manager Information Security Role Type: Individual Contributor More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
conducting regular purple team exercises and scenario-based tabletop tests. Cloud Security Engineering Work hands-on with GCP security controls, including: Security Command Center VPC Service Controls IAM (Identity & AccessManagement) Cloud Logging and Monitoring Workload Identity Federation Automate security response using Python, Terraform, or XSOAR. Collaborate with infrastructure and DevOps teams … projects/accounts. Strong expertise in: SIEM management (Chronicle, Splunk, Elastic) Incident response and recovery Security orchestration (SOAR), preferably Chronicle + XSOAR IAM, policy enforcement, logging, andaccess reviews in GCP Proven experience working in FinTech or financial services, ideally under PCI-DSS, ISO 27001, or SOC 2. Strong Scripting or automation experience (Python, Terraform, Bash …/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, Data Loss Prevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. Influence architecture More ❯