and maturity aligned to McDonald's Global Technology approaches Providing subject matter expertise and acting as incident lead in support of cyber security incidents Provide regular cadence of management reporting that identifies trends, priorities and opportunities for improvements which demonstrates a practice of continuous improvement and aligns to segment KPIs for the function What Team will I be … and working towards or obtained CISSP. Strong experience in technical cyber security role such as security analysis or engineering Excellent knowledge in key cyber security domains such as identityandaccessmanagement, risk management, network security and security operations Experience providing cyber subject-matter expertise for transformational security improvements in a complex … Technology organisation Proven experience at engaging and influencing stakeholders across departmental and organisational and global/segment stakeholders An excellent understanding of best practice within cyber security and risk management including standards such as ISO/IEC 27001, Cyber Essentials and NIST CSF Demonstrable creativity and a commitment to future-proofing processes and security controls in a fast More ❯
London, England, United Kingdom Hybrid / WFH Options
KPMG UK
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
Role: IdentityandAccessManagement (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
We are currently looking for an IdentityandAccessManagement SME to join one of our financial services clients, on a contract basis. The role requires someone who has extensive knowledge and experience in designing, implementing, and managing IdentityandAccessManagement systems. Acting as advisor and consultant … value of IAM to various stakeholders, including technical and non-technical audiences. Identify and design the most appropriate IAM solutions for specific organisational needs. Oversee the implementation and ongoing management of IAM systems, ensuring they are configured correctly and functioning effectively. Keep updated on the latest IAM trends and best practices, providing guidance on security, compliance, and performance. … controlling access to information and systems. Key Skills and Knowledge : Deep understanding of IAM principles: A strong grasp of authentication, authorization, access control, and user management processes. Familiarity with different IAM technologies: Knowledgeable about various IAM platforms, including IDM, PAM, and cloud-based solutions. Security expertise: Solid understanding of cybersecurity threats, vulnerabilities, and best More ❯
and maintenance of the technology alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our Corporate Intranet ensuring that delivery … across the Company where corporate applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit teams. Develop and adapt innovation … Experience Required Significant and relevant progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability mapping, data managementMore ❯
Your new company Join a global financial powerhouse at the forefront of innovation in IdentityandAccessManagement (IAM). This is a rare opportunity to be part of a greenfield build within the Corporate & Investment Bank (CIB) division, developing a next-generation IAM platform that underpins secure access to critical services More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement : Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business : Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement: Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business: Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Azure, Google Cloud) ️ Conducting risk assessments and vulnerability assessments on cloud infrastructure to identify and mitigate security threats ️ Managing and securing cloud-based services, including identityandaccessmanagement (IAM), encryption, and data protection ️ Collaborating with DevOps and development teams to integrate security controls into CI/CD pipelines ️ Monitoring cloud environments for suspicious … experience as a Cloud Security Engineer or in a similar cloud security role ️ Strong knowledge of cloud security best practices, including identitymanagement, encryption, andaccess control ️ Proficiency with cloud platforms (AWS, Azure, Google Cloud) and associated security tools (e.g., AWS GuardDuty, Azure Security Center) ️ Experience with security frameworks such as NIST, CIS, andMore ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing … to global resources and top-tier engineering talent, you'll be empowered to solve challenging problems and make a meaningful impact. Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing will contribute to delivering secure, resilient, and high-quality solutions that drive real business impact. In this role, you'll tackle complex, mission-critical problems while leveraging cutting-edge technologies and modern engineering practices. You'll More ❯
Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing … to global resources and top-tier engineering talent, you'll be empowered to solve challenging problems and make a meaningful impact. Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing will contribute to delivering secure, resilient, and high-quality solutions that drive real business impact. In this role, you'll tackle complex, mission-critical problems while leveraging cutting-edge technologies and modern engineering practices. You'll More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
in several of the following technologies: Infrastructure as Code (IaC) tools: ARM templates, Azure Bicep Azure DevOps (ADO) and YAML Pipeline Logic Apps, Function Apps, Service Bus API Management Services (APIM) and APIs App Services, User Managed Identity Certificate managementand renewal App Registration, Managed Identities, Key Vault, Storage Account Azure networking core components … subnets, NSG, Routing Azure Monitoring: Log Analytics Workspace (LAW), Application Insights (App Analytics) Scripting languages: PowerShell, Python, Bash Knowledge of Azure Security: Defender for Cloud, identityandaccessmanagement (IAM), network security groups (NSGs), and encryption best practices. Branching strategies Continuous integration, deployment, delivery, and testing Modern DevSecOps and GitOps practices Monitoring and alerting More ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
AWD Online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
with API Gateway technologies (e.g., Kong, Apigee, AWS API Gateway) to enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile … architecting and deploying microservices-based systems in complex enterprise environments. • Hands-on experience with API Gateways (Kong, Apigee, or AWS API Gateway) and secure API development. • Working knowledge of IDAM platforms like Ping Identity, Auth0, or Okta. • Work closely with mobile app teams to ensure backend services are optimized for mobile/web delivery. • Experience working in banking More ❯