CD pipelines and managing complex integration challenges. Identity & AccessManagement: Deep understanding of SCIM for user provisioning andidentitymanagement, as well as SAML 2.0 and Single Sign-On protocols. Must be capable of effectively implementing and troubleshooting SSO and … belong. We value and respect individual differences, so all applications will receive fair and equal consideration without regard to ethnicity, religion, gender, gender identity or expression, sexual orientation, nationality, disability or age. More ❯
security designs. Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identityandaccessmanagement (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices … including secure coding and vulnerability management, throughout the software development lifecycle for all the projects. Drive Security Tool Implementation: Lead the evaluation, selection, and implementation of enterprise security tools and technologies that align with organizational business and security requirements, while owning and operating these tools effectively. Maintain Cyber … development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer IdentityandAccessManagement (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement More ❯
security designs. Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identityandaccessmanagement (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices … including secure coding and vulnerability management, throughout the software development lifecycle for all projects. Drive Security Tool Implementation: Lead the evaluation, selection, and implementation of enterprise security tools and technologies that align with organizational business and security requirements, while owning and operating these tools effectively. Maintain Cyber Resiliency … development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer IdentityandAccessManagement (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
Location: Remote UK, United Kingdom Thales people architect identitymanagementand data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange … become smarter and much more. More than 30,000 organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed … Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & AccessManagement (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
with Baseline Security Requirements and security policy. Ensure that projects integrate with security baseline controls such as IPS/IDS, WAF, Firewall Change Management, Identity & AccessManagement, SIEM and Vulnerability Management. Ensure internal customers, external suppliers and delivery partners are aware of … IT and telecommunications solutions. Competent in applying security policies and principles defined in security architecture to real world scenarios. Understands and applies risk management principles. Effective communication skills to influence stakeholders and explain complex security requirements in simple terms. Stakeholder Management - established as the go-to More ❯
developing Security team, your role will be varied including implementation and maintenance of all security tooling across the bank, development of automation scripts, andmanagement of AWS security including platform identity. The successful candidate will be an experienced security engineer with strong AWS and Terraform and scripting skills … and knowledge of cryptography and/or identityaccess management. The role is offered as hybrid and the office is in central London. No visa sponsorship is available at this time. Minimum Requirements Experience with AWS and Terraform Strong scripting skills Knowledge of cryptography and/… or identityaccessmanagement We seek individuals from a diverse talent pool and encourage applicants from underrepresented groups to apply to our vacancies. Our commitment to fair recruitment processes means that we welcome applicants from all backgrounds, regardless of their lived experience or personal More ❯
Birkenshaw, Lanarkshire, United Kingdom Hybrid / WFH Options
Networking Women in the Fire Service
and Social Club with free use of gym, an Employee Assistance Program, car salary sacrifice scheme. Job Purpose:To ensure the effective delivery andmanagement of ICT services within the Authority, with a focus on Microsoft 365 applications, SharePoint, and PowerPlatform tools. The role involves upholding the ICT … training, and supporting decision-making processes. Additionally, the post holder will facilitate the Fire and Rescue Authority's objectives, administer identityandaccessmanagement solutions, and provide technical support to various departments. Key Responsibilities:As an M365 Administrator, you will configure and manage Microsoft … functionality. You'll enable teams to leverage M365 and PowerPlatform capabilities for enhanced productivity and collaboration. You'll manage complex identityandaccessmanagement solutions, apply PowerShell and scripting tools for M365 automation, and build basic PowerApps/PowerAutomates to streamline business processes. Collaboration More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.' This is a great opportunity on a long running programme of work. Apply now for your CV to reach More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle." Experience: "5+ years experience in Hands-on ForgeRock developer experience with PingGateway, PingAM, PingIDM and PingDS working with Agile More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.? PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training More ❯
A growing and forward-thinking security team is looking for a skilled IAM Engineer with expertise in Identity Governance and Administration (IGA) to support a threat-led security programme and drive maturity across identityandaccess controls. With over 50 professionals already in the … team, this role plays a key part in evolving identity governance capabilities, enhancing access security, and ensuring robust management of digital identities. What you’ll be doing Design, implement, and support enterprise-grade IGA solutions – with a focus on SailPoint IdentityNow . Lead on … access certifications, application onboarding, and lifecycle management (Joiner, Mover, Leaver). Work closely with cross-functional teams to align IAM strategy with business needs. Develop and enforce IAM governance standards, controls, and best practices across cloud and on-prem environments. Monitor access logs, resolve More ❯
priorities, and overseeing daily operations. Invest in the professional growth of team members by identifying training opportunities and skill-building activities. Budgeting and Resource Management: Manage the IT budget and allocate resources for various projects and operational needs. Evaluate costs and seek opportunities to optimise spending, including renegotiating … Service Level Agreements (SLAs) for IT support to maintain high service availability. Manage Okta IAM to ensure secure and efficient identityandaccess management. Security and Risk Management: Implement and manage security measures to protect IT systems and data, including establishing security policies and … monitoring for potential threats. Perform regular risk assessments and implement disaster recovery plans. Vendor and Stakeholder Management: Maintain relationships with technology vendors and service providers, negotiating contracts and reviewing performance. Collaborate with department heads and senior management, gathering feedback to align IT strategies with business needs. More ❯
align with each client's regulatory framework, risk assessment methodologies, and compliance objectives. Security Operations (SecOps) solutions within ServiceNow including incident response, vulnerability management, and security automation. Your skills and experience We're seeking a ServiceNow Developer with hands-on experience of GRC and/or SecOps who … wants to grow their career and delight customers. You will have: Experience in developing solutions with ServiceNow GRC: Integrated Risk Management (IRM) Implementation Experience in developing Security Operations using ServiceNow SecOps and associated products Experience in security domains such as Identity & AccessManagement, Vulnerability Management, Security Monitoring, Incident Management, Platform, Network, and Application Security Broad experience across the Now Platform Good communication skills (written and speaking skills) Good attention to detail Eligibility checks If you are successfully offered a role at Capgemini, you will go through a More ❯
solutions such as: GRC solutions aligned with clients' regulatory frameworks, risk assessments, and compliance goals. Security Operations (SecOps) solutions including incident response, vulnerability management, and security automation. Your skills and experience We seek a ServiceNow Developer with experience in GRC and/or SecOps who wants to grow … and delight customers. You will have: Experience with ServiceNow GRC: IRM Implementation Experience with ServiceNow SecOps and related products Knowledge in Identity & AccessManagement, Vulnerability Management, Security Monitoring, Incident Management, Platform, Network, and Application Security Broad experience across the Now … communication skills (written and spoken) Attention to detail Eligibility checks If offered a role at Capgemini, you will undergo pre-employment checks including identity, nationality or immigration status, employment history for the past 3 years, and criminal record checks. Some roles may require Security Check (SC) clearance, andMore ❯
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability More ❯
Responsibilities: MFA Implementation using Microsoft Common (MS Entra ID) Microsoft Entra ID (formerly known as Azure AD) is a comprehensive identityandaccessmanagement solution. Implementing Multi-Factor Authentication (MFA) using Microsoft Entra ID involves several steps and considerations: Deployment Planning: Before starting the … deployment, it's essential to plan and ensure all prerequisites are met. This includes having a cloud-only identity environment or a hybrid identity scenario where user identities are synchronized between on-premises Active Directory and Microsoft Entra ID. Choosing Authentication Methods: Various methods can be … and voice call verification Configuration: Setting up MFA involves configuring policies and settings in the Microsoft Entra admin center. This includes creating Conditional Access policies to require MFA for specific users or groups and managing the authentication methods available in the tenant. User Experience: Ensuring a smooth user More ❯
Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. · Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). · Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. · Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. · Familiarity with Android OS and Apple Mac OS, including iOS. · IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: · Proven experience in cloud-based IT support, systems administration More ❯
Qualifications: Strong experience in managing Microsoft 365 (in a cloud-based environment, Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. Familiarity with Android OS and Apple Mac OS, including iOS. IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: Proven experience in cloud-based IT support, systems administration More ❯
St Neots, Saint Neots, Cambridgeshire, United Kingdom
Interaction Recruitment
Qualifications: · Strong experience in managing Microsoft 365 (in a cloud-based environment, · Proficiency in Entra (formerly Azure Active Directory) for identityandaccessmanagement, including MFA, conditional access, and user lifecycle management. · Hands-on experience in managing mobile devices using Microsoft Intune … enforce security policies across various devices (Windows, Android, and iOS). · Experience with managing and troubleshooting Cambium wireless network equipment, including routers, switches, andaccess points. Ability to configure and maintain secure, high-performance networks. · Knowledge of cloud security tools, including Microsoft Defender, and best practices for securing …/11, and Active Directory. · Familiarity with Android OS and Apple Mac OS, including iOS. · IT-related certifications (e.g., Microsoft Certified: Security, Compliance, andIdentity Fundamentals, Microsoft Certified: Modern Desktop Administrator Associate) are desirable but not essential. Previous Experience: · Proven experience in cloud-based IT support, systems administration More ❯
challenging, vastly interesting, and technically diverse role. Key Responsibilities and Tasks Leading shifts throughout 24/7 SOC Service Delivery Providing oversight andmanagement to Junior Analysts Monitoring of Systems for Security Alerts, Intrusions or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a … understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. … following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing, Ransomware and other key threats IDAM (IdentityandAccess Mgmt) JML (Joiners, Movers and Leavers Processes) Security Awareness Information Classification Experience (Nice to have) Previous experience managing More ❯
including Log360 (SIEM), AD360 (IAM), and Endpoint Central. Monitor and analyze security logs to detect and respond to threats. Oversee identityandaccessmanagement (IAM), including Active Directory security and privileged accessmanagement (PAM). Conduct vulnerability assessments and manage More ❯
major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, you'll play a key role in shaping secure, scalable solutions. You'll also enjoy the benefits of … s leading independent IT provider-with a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting … teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Current information for our applicants Business as usual? Not quite. Of course, the Corona crisis also presents us with major More ❯
major customers across industries. With access to cutting-edge technologies and the opportunity to work on high-profile identityandaccessmanagement (IAM) projects, you'll play a key role in shaping secure, scalable solutions. You'll also enjoy the benefits of … s leading independent IT provider-with a strong culture of support, career development, and innovation. What you'll do Lead the design and delivery of Identity solutions, with a focus on SailPoint, Microsoft 365 Entra ID, and on-premises Active Directory Support presales activities by qualifying opportunities, presenting … teams A graduate degree or equivalent technical experience in a large organisation or IT environment Relevant accreditations or certifications in identityandaccess technologies are desirable Current information for our applicants Business as usual? Not quite. Of course, the Corona crisis also presents us with major More ❯
Role: IAM/0Auth Architect Rate: (Pricing in) Inside IR35 Location: Remote Duration: 6 months SC clearance required Job Spec: IdentityandAccessManagement Specialist/EngineerHigh Level & low level design and implementation of a complex consumer accessmanagement solution. … UK Public Sector.Required Skills: 5+ years of IAM Experience. SME in IBM Security Verify Access, API Design, Oauth/OIDC, XACML, MFA, MMFA. Proficiency in scripting and automation using languages and tools like python and ansible. Excellent problem-solving skills and attention to detail. Effective communication skills. Due More ❯
/Auth0 Architect Location: UK Remote Duration: 6 Months Day rate: £675 per day Active SC clearance required Role requirements: IdentityandAccessManagement Specialist/Engineer High Level & low-level design and implementation of a complex consumer accessmanagement solution. UK Public Sector experience. Required Skills: 5+ years of IAM Experience. SME in IBM Security Verify Access, API Design, auth0/OIDC, XACML, MFA, MMFA. Proficiency in scripting and automation using languages and tools like python and ansible. Excellent problem-solving skills and attention to More ❯