Analyst will sit in the PAM Governance sub-function in Cyber A&E. This role is responsible for designing and maintaining automated and manual privileged access controls for all aspects of privileged access including non-human accounts and privileged human accounts. Our work requires us to … guidance for onboarding their privileged access to CyberArk and/or Hashicorp. Respond to lines of defense queries about controls and privileged accessmanagement policies and procedures. Maintain documentation for privileged access policies and procedures. Attend vendor training and customer support events … Windows and Linux and accounts management on these systems are preferred. Cybersecurity Training: Experience with or knowledge of IdentityandAccessManagement/Privileged AccessManagement concepts and best practices. Required Qualifications: Candidates should have a BS/ More ❯
you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Position Summary: The IdentityandAccessManagement (IAM) operations team is accountable for the successful delivery of all operational services globally for the IAM applications and infrastructure … experience on Ping Access, Ping Federate, Ping Directory, MFA technologies, Hyper, PKI, Splunk & Linux Excellent knowledge of Identity, Authentication andAccessManagement (IAM) domain Must have senior level production support experience and troubleshooting skills in IAM technologies Must have expert level of … easily CISSP OR equivalent Information Security domain certificate will be value add Skills: Result Orientation Solution Design Technical Strategy Development AccessandIdentityManagement Cyber Security Information Systems Management Risk Management Solution Delivery Process Collaboration Critical Thinking Test Engineering Shift More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, Privileged AccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations … IT and OT systems and infrastructure. Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identityandaccessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end … of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health MOTs andaccess to physiotherapy and counselling, to Cycle to Work schemes, shopping vouchers and life assurance. Find out more about our benefits and perks Who More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … third-party risk requirements. Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Strong knowledge of NIST More ❯
global standards (PCI DSS, SWIFT CSP). This role requires technical knowledge, strategic thinking, and expertise in managing third-party risk , outsourcing compliance , andidentity governance to safeguard operational resilience. What you will be doing: Regulatory & Technical Compliance: Support compliance with GDPR and complementary regulations like DORA (Digital … Security: Advise on vulnerability management , endpoint security (EDR/XDR) , and cloud compliance . Good understanding on IAM (IdentityandAccessManagement) strategies, including role-based access control (RBAC) and privileged accessmanagement (PAM). Conduct … risk requirements. Technical Skills: Hands-on experience with ISO 27001 implementation and third-party risk tools . Proficiency in IAM (IdentityandAccessManagement) solutions and conducting user access reviews . Familiarity with cloud Technology and IT infrastructure. Framework Expertise: Strong knowledge More ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. * Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. * Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) * Problem-Solving and Analytical Abilities: Strong problem-solving … ensuring the configuration of tools is secure and compliant with Security standards. * Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. * Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
Basingstoke, Hampshire, South East, United Kingdom
Middle Recruitment Limited
IdentityandAccessManagement (IAM) Architect Up to £82k + £10k car + 15% Annual Bonus Basingstoke, Hampshire Hybrid (2 days in p/w) middle has partnered exclusively with a key client to hire a strong IdentityandAccess … identify and implement new technologies, process improvements or automation across the domain. Youll have the opportunity to build the most intelligent, robust and modern Identity (IAM) platform that can automate, protect and deliver. This role offers clear progression into an Architectural role or continue with the hands-on … history. IAM Engineer, Senior IAM Engineer, Senior IAM Architect, IAM Architect, Principal Identity Engineer, Identity Security, IdentityandAccess Management. More ❯
IdentityandAccessManagement (IAM) Architect Up to £82k + £10k car + 15% Annual Bonus Basingstoke, Hampshire Hybrid (2 days in p/w) middle has partnered exclusively with a key client to hire a strong IdentityandAccess … identify and implement new technologies, process improvements or automation across the domain. Youll have the opportunity to build the most intelligent, robust and modern Identity (IAM) platform that can automate, protect and deliver. This role offers clear progression into an Architectural role or continue with the hands-on … history. IAM Engineer, Senior IAM Engineer, Senior IAM Architect, IAM Architect, Principal Identity Engineer, Identity Security, IdentityandAccess Management. JBRP1_UKTJ More ❯
StrongDM is driven by a clear mission: Secure Access, Zero Trust. We design products and solutions that reflect this commitment, transforming the way organizations manage privileged access across their critical infrastructure. By leading with Zero Trust Privileged AccessManagement (PAM), we help … to fully address a prospect's technical issues. Be the technical voice of the field for all things related to security, compliance, and privileged access management. Requirements: Technical - Infectious enthusiasm for technology and cybersecurity. A demonstrated willingness to master things you may know nothing about. Don't know … Experience with AWS and/or Microsoft Azure or Google Cloud, configuration and administration of security features and services including identityandaccessmanagement, service-related security features, networking, firewalls, encryption, and related standard methodologies. Familiarity with cloud and on-prem networking models andMore ❯
clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data andidentity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our security specialists and innovators enable our clients to evaluate cyber risks … redesign Cybersecurity operating models, modernise digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. … engaging our clients, helping to influence the board and CxO with top-down buy-in and understanding. Providing insight for threat modelling, risk managementand security overlay approaches by conducting security maturity assessments. Providing a business understanding of technical domains and tailoring these to help clients maximise value More ❯
sophisticated IAM solutions and Active Directory and Azure Active Directory (ENTRA ID) systems. Develop and implement policies and procedures for identityandaccess management. Conduct assessments and provide solutions to improve information security gaps. Collaborate closely with IT and cybersecurity teams to ensure compliance. Provide technical … training and support to internal teams. Leading identity lifecycle andaccessmanagement (IDM) andIdentity Governance and Administration (IGA) policies working with IT teams. Maintain existing systems and ensure their accurate functioning. Review the configuration of different systems to evaluate security controls. … this role we are looking for someone with: Familiarity with SCIM, CASB, and additional Azure services with demonstrated ability in identityandaccessmanagement within IT or a similar role in cybersecurity. Practical experience with Active Directory and Azure Active Directory (ENTRA ID). More ❯
applying, please contact careers@thenottingham.comWe are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identityandaccessmanagement efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding … Manager at Nottingham Building Society: - Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management: Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One … AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work with stakeholders to define and enforce user access policies and workflows.About you: - Experience: Extensive background in accessmanagement, IGA implementation, and endpoint security. Knowledge: Familiarity with More ❯
Newquay, Cornwall, United Kingdom Hybrid / WFH Options
King's Service Centre
Identity & AccessManagement Engineer Department: IT Services - Cloud Employment Type: Permanent - Full Time Location: Newquay, Cornwall, UK Reporting To: Titus James Description The Role As an IAM Engineer, you will play a crucial role in managing, maintaining, and securing the university's directory services … Microsoft Identity platforms Understanding of Modern Authentication standards Proficiency in deploying and maintaining automation and scripting Proven ability to implement and manage access control solutions Knowledge of Zero Trust and least privilege architecture Analytical and problem-solving skills in security monitoring Ability to communicate complex technical … onsite parking & Bike racks Annual leave purchase scheme - up to a maximum of 10 days (subject to national minimum wage requirements) Student Discount (access to Totum, Unidays & Student Beans) CycleScheme TechScheme Opportunities for formal training and professional certification Free access to Linkedin Learning Free accessMore ❯
Account Director - Enterprise Identity Solutions £Basic + Double OTE + Benefits Remote (UK only) **Package negotiable for this brand new strategic hire** The Customer... We are proud to partner with an enterprise security solutions provider to hire a new Enterprise Identity Account Director as part of … and Enterprise Commercial sectors, they have a Microsoft first vendor strategy. This brand new role is to manage the organisation's key enterprise identitymanagement customers traditionally done by their senior leaders. With a blend of enterprise services and products built around Microsoft Entra ID ecosystem … It offers an exciting and unique time to join as the investor backed organisation execute their growth strategy. Experience required... Experienced selling enterprise IdentityAccessManagement solutions/consultancy services Knowledge of the Microsoft Entra ID ecosystem (Entra ID/Entra ID Governance) Central More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Guidant Global
IDAM Engineer Contract onsite in Cheltenham Day rate: £450 - £550 per day inside IR35 This contract role will require you undergo security clearance prior to … commencement of the role. Our client is looking for an experienced IDAM Engineer to work as part of a dedicated IdentityandAccessManagement (IdAM) Live Services team in maintaining and monitoring key components of the Identity Infrastructure. Ensure all supported components … 3rd line support of the Active Directory Domain Services in all corporate environments and provide support for Privileged User Account Managementand corporate IdAM solutions. *Respond with 2nd and 3rd line support for incidents and IT service requests; take ownership of problems and resolve calls logged with the More ❯
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all … on IAM standards and procedures. What you will be doing: Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or … and procedures. Stay up to date on evolving threats, technologies, and solutions in the IAM space. Collaborate with other departments to ensure secure access to systems and data. Document IAM processes and procedures for reference and compliance purposes. Escalate and resolve IAM-related issues in a timely manner. More ❯
northampton, midlands, United Kingdom Hybrid / WFH Options
eTeam
onsite) Duration: End of December 2025 Pay Rate: £439 per day Inside IR35 Job description: We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In … this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity … protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or More ❯
design, develop, and maintain core authentication and authorisation services. Your work will enhance the security and usability of identity governance workflows andaccessmanagement for Palantirians and our customers globally. Your approach will emphasise secure-by-design principles, embedding security considerations into every phase … You will also play a key role in mentoring teammates and leading projects, driving both individual and team growth. Core Responsibilities Architect and design new identityand security services with a focus on scalability and resiliency Develop scalable services for workforce, customer and workload authentication and authorisation Build … Azure and Google Cloud Platform (GCP) Design and build REST APIs that enable zero-touch, end-to-end automation of IdentityandAccessManagement resources Research and drive the implementation of secure authentication protocols (like passwordless auth) by collaborating with Security Engineers What We More ❯
in designing, implementing and managing robust IAM strategies and solutions to safeguard our client's information assets. The role involves ensuring secure and efficient access to resources, mitigating insider threats and enhancing overall cyber resilience. Reporting to the Cyber Resilience Manager this role is instrumental in maintaining a … secure and efficient access control environment. You will be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the Cyber Security Strategy. Design IAM architectures that support secure … and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to ensure compliance with security policies and regulatory requirements. Design and implement processes for the entire identity lifecycle, including joiners, movers More ❯
Lead Architect - Identity & AccessManagement This is an individual contributor and thought leadership role. Deliver IAM domain thought leadership to the teams in UK and EU time zone. Create and sustain the Reference Architecture for … the IAM cloud governance platform, and drive the full implementation and adoption. Complete and sustain the definition of the infrastructure as code and interactive access model, finalize the definition of access cloud roles and policies in prod and non prod, and drive the enrollment of users. … is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines andMore ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
CPS Group (UK) Limited
Role: Identity & AccessManagement (IAM) Specialist Location: Hybrid (South Wales office) Salary: 50,000 p/annum (potentially more DOE) Must be SC Cleared or SC Clearable! CPS Group is delighted to be working with a client who is looking to appoint an Identity & AccessManagement (IAM) Specialist to join their Cyber Team on a permanent basis. This is a … fantastic opportunity to join a highly collaborative environment where you will play a key role in strengthening cyber security, resilience, safeguarding systems, and improving access control practices across the business. You'll be responsible for designing, implementing, and managing secure IAM solutions while working closely with IT, HR More ❯