IAM Security Engineer Job Description Who we are looking for State Street cyber IdentityandAccessManagement is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. A robust strategy, architecting zero trust building blocks, deployment, and a passion for effecting change across the … the organization Collaborative leadership and work style with the ability to effectively interact with and earn the trust of peers, CTO, development teams across the organization Project and process management skills, including proven ability to manage multiple projects simultaneously. Self-starter with a keen sense of ownership and commitment to work, and passion for delivering results. Education & Preferred … around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs andaccess to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. State Street's Speak Up More ❯
Senior Software Engineer - IdentityandAccessManagement (f/m/d) Join Contentful as a Senior Software Engineer and take a central role in enhancing our IdentityandAccessManagement ( IAM ) capabilities. Our platform serves billions of requests daily, with customers trusting us with their content-making … with a track record of developing practical solutions that drive product growth. Team Player : Excellent English communication skills with proven ability to work effectively in collaborative environments. Time Management : Strong organizational skills with ability to prioritize tasks in fast-paced settings. Development Practices : Experience with continuous development methods ( XP experience is beneficial). Initiative : Self-motivated with a … are proud to be an equal opportunity employer. All qualified applications will receive consideration for employment without regard to race, color, national origin, religion, sexual orientation, gender, gender identity, age, physical dis ability, or length of time spent unemployed. We invite you to apply and join us! If you need reasonable accommodations at any point during the application More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity Verification Product Owner needs a … and make informed decisions. Here's a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including … Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk management principles and the More ❯
any adjustments to assist you in applying, please contact We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identityandaccessmanagement efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. The … Governance Access Manager at Nottingham Building Society: - Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security … federation solutions (e.g., Okta, Azure AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work with stakeholders to define and enforce user access policies and workflows. About you: - Experience: Extensive background in accessmanagement, IGA implementation, and endpoint security. Knowledge: Familiarity with industry best practices andMore ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
Engineer to join our cyber security team! Working alongside the team you will help to design, develop, and mature the company's cybersecurity capability, including the selection, implementation, andmanagement of security tools/technologies, focused on detection, prevention, and analysis of security threats. This role offers a great opportunity to help define and shape the security function … needs. Support the definition, execution and continuous improvement of key cybersecurity processes including vulnerability & patch management, security incident response, security monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist with developing and maintaining security policies, processes and incident response management plans and playbooks. Prepare and document standard … technology development & acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at increasing enterprise security capabilities e.g., identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 2 years' experience in a Security Engineer/Analyst role focusing on designing and implementing security solutions andMore ❯
pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & AccessManagement (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially available IAM tools such … is proficient in directory services like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. The consultant is also proficient in developing scripts to automate the provisioning and migration of identities across … Cloud, OT, IOT and enterprise IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in IdentityandAccessManagement (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high-level and low-level design More ❯
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
EC2M, Coleman Street, Greater London, Broad Street, United Kingdom
Qualserv Consulting Limited
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯
ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
ideally have experience in implementing an IAM tool. They will also cover IdentityAccessmanagement process including Joiner, Mover, Leaver of identities andaccess reviews, and folder access management. They will also be participate in design meetings and help lead that design. Any gaps in internal audits, they will help More ❯
know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of … single box - we're looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We're building a world where Identity belongs to you. JOB PURPOSE: The Technical Support Engineer is an articulate and seasoned technical guru who understands and can appreciate the challenges organizations face in implementing and integrating … customers) Real passion for solving customer issues and advocating for their success, in a fast paced, highly technical environment. Ability to learn new technologies quickly. Excellent relationship management, customer service and communication skills in variety of forms (written, live chat, conference calls, in-person.) Ability to work independently with little direct supervision and as a part of a More ❯
of IT, but also an immensely deep understanding of many of those areas too. You'll likely be an acknowledged expert among your peers in IdentityandAccessManagement, and have a passion for hacking and building. You will have interest and/or experience in related areas like software engineering, security, platform architecture … a new device trust and posture compliance solution The replacement of insecure factors like SMS with phishing-resistant factors Office fit-outs, including tech like network infrastructure, AV andaccess controlSaaS migrations for acquisitions, including Microsoft 365 to Google Workspace What you'll need Experience leading on a range of technical projects across various technologies and platforms. Experience … & AccessManagement systems, including Okta, Microsoft Entra, JumpCloud, PingIdentity. Experience administering and troubleshooting Single Sign-On (SSO) technologies such as OAuth, OIDC and SAML andIdentity provisioning technologies such as SCIM. Understanding at a protocol level of Single Sign-On (SSO) andidentity provisioning technologies such as OAuth, OIDC, SAML andMore ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
You Are: The Lead Cloud Infrastructure Architect is responsible for designing and implementing cloud-based infrastructure solutions with a focus on cloud services. The role involves the creation andmanagement of scalable, secure, and efficient cloud architectures that align with business goals, driving the organization's digital transformation. This individual will be responsible for overseeing the overall cloud … infrastructure design, management, and administration, ensuring best practices in deployment, security, and cost optimization. The Opportunity : Cloud Infrastructure Design & Architecture : Design and implement scalable, secure, and cost-efficient cloud infrastructure solutions on cloud that meet business requirements. Create and document detailed architecture diagrams, cloud infrastructure designs, and technical specifications for new projects or migrations to cloud. Lead the … and maintenance of cloud environments, including performance optimization, backup and disaster recovery, and compliance with internal policies. Security & Compliance : Implement security best practices, such as identityandaccessmanagement (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. More ❯
security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., IdentityandaccessManagement, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH … the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? Vulnerability Management (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat actors, TTPs More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
13+ billion. Candidate should have 15+ years of experience with IT and have 10-12 years of experience in-depth domain and technical knowledge of IdentityandAccessManagement with strong proficiency in ForgeRock CIAM, IDM, AM, DS with good knowledge of designing, analysis, and architecture planning. Implementation and support experience from medium to … skills. Customer Facing Exposure is must. CISSP certification is a bonus. Open to travel requirements. Required Skills: Experience in Implementation and Support of ForgeRock Customer IAM (CIAM) ForgeRock Identity manager (IDM) ForgeRock Access manager (AM) ForgeRock Directory Services (DS) ForgeRock Amster Excellent knowledge and understanding of LDAP concepts and working experience with at least few of … Extensive Experience in connector development and resource configuration using ForgeRock CIAM SDK. Experience in creating and managing Business Logic using identity policy, policy Xpress, user journey andidentity policy. Experience in performing enhancement and development for ForgeRock CIAM, IDM, AM, DS tools. Experience in integrating ForgeRock CIAM with reporting platform and enabling reporting and auditing. Experience More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NOTHREAT
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
infrastructure, and operations. Lead security architecture reviews, threat modeling, and secure development practices across engineering teams. Oversee the implementation and operation of security controls, incident response plans, and risk management frameworks. Work closely with the AI engineering team to address security implications of machine learning models and data pipelines. Evaluate and adopt new security technologies and frameworks aligned … AI/ML systems, securing data pipelines, models, and associated infrastructure. Strong technical background in areas such as application security, cloud security (AWS/Azure), identityandaccessmanagement, and threat detection. Proficiency with SIEM, SOAR, EDR, vulnerability management, and DevSecOps practices. Deep understanding of modern attack vectors, threat intelligence, and incident … SOC 2, GDPR). Proven ability to align security priorities with business and product strategy. Demonstrated experience delivering large-scale, cross-functional security projects. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications Experience in cybersecurity for SaaS or AI-native platforms. Familiarity with adversarial machine learning, model governance, or AI-specific threat models. Prior experience scaling security More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
internal security policies and ensure that compliance requirements are met. Serve as the primary point of contact for all information security-related matters, collaborating with internal teams, senior management, and external stakeholders to ensure effective communication and risk management. Provide regular reports to senior leadership on security posture, incidents, and security performance metrics. Continuously monitor and improve security … security roles within the energy, mining, chemicals, or process manufacturing sectors, with a strong understanding of industry-specific risks and challenges. In-depth knowledge of cybersecurity frameworks, risk management practices, and regulatory requirements (e.g., NIST, ISO … GDPR). Experience with industrial control systems (ICS) and operational technology (OT) security in manufacturing or production environments. Strong expertise in network security, encryption, identityandaccessmanagement, and endpoint protection. Experience managing Microsoft Office 365 security & compliance administration panels. Experience managing security software solutions (EDR, email security, etc.). Proven experience in developing More ❯
premises infrastructures, cloud platforms (AWS, Azure, GCP), and intricate hybrid environments. You'll simulate real-world attacks to uncover critical weaknesses. Exploiting vulnerabilities in key identityandaccessmanagement systems , including Active Directory and Entra ID (Azure AD), along with various cloud-native services. Collaborating closely with remediation teams to provide expert guidance andMore ❯