in providing assurance for cybersecurity technologies, policies, standards and procedures Demonstrable proficiency in a wide range of information IT security domains such as Security Governance, IdentityandAccessManagement, Access Controls, Threat Intelligence, Asset Management, Risk Management, Security Assessment/Testing, Security Incident Managementand Vulnerability … and Patch Management Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Ability to coach team members through knowledge transfer and constructive feedback SKILLS AND EXPERIENCE Functional/Technical Competencies Essential: Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks … Ability to maintain a working knowledge of cybersecurity principles and elements Understand global IT risk management structure Demonstrable experience of senior stakeholder managementand relevant management reporting. Education/Qualifications: Essential Degree educated and/or equivalent experience.Preferred: Relevant certifications (e.g. CISA, CRISC, CISM, CISSP .) PERSONAL REQUIREMENTS Personal alignment to MUFG Values + More ❯
Warwickshire, England, United Kingdom Hybrid/Remote Options
Pontoon Solutions
and regulatory requirements. You will be delivering across BAU, Programmes and Vendors. Please only apply if you have delivered a PAM implementation. In full: Lead IdentityandAccessManagement (IAM/IdAM) Business Analyst (BA), a role focused on designing and implementing systems that control user accessandidentity within … Governance & Administration (IGA) and Privileged AccessManagement (PAM) solutions to ensure security and compliance. Key responsibilities for such a role often include: Defining and executing IDAM strategies to align with business goals. Designing, implementing, and managing IDAM solutions, including authentication, authorisation, and user lifecycle management. Collaborating with cross-functional teams to integrate IDAM solutions with … compliance with relevant regulations and cybersecurity frameworks. Providing leadership and guidance to business analysis teams. Managing relationships with third-party service providers. Someone who has been part of the IDAM implementation journey from defining customer journeys, rolling out, embedding and transform organisation Candidates will ideally show evidence of the above in their CV in order to be considered. Please be More ❯
an exciting opportunity for an experienced Lead Service Designer to join us on a 12 month fixed term/Secondment for Maternity Cover, within the IdentityandAccessManagement portfolio. Our work has a direct impact on millionsof patients' lives, helping them access essential services needed to support them to get appropriate … health professionals across the NHS providing them with essential tools and services to reduce the burden and enable them to spend more time treating people. IdentityandAccessManagement (IAM) provides secure, convenient and reliable access to patient data for over 1 million health and social care workers via the Care Identity Service. As well as critical national authentication platforms, IAM is responsible for a number of supporting products and services designed to streamline health and social care workers' access to these authentication platforms and provide a range of solutions in support of identity verification, identitymanagementand authentication. You will be a More ❯
Entra, the Microsoft Defender suite, and Microsoft Purview. Microsoft Security Engineer Key Responsibilities: Deploy and manage Microsoft security solutions, including Azure Firewall, NSGs, WAF, and Entra ID (Conditional Access, PIM, Private Access). Implement and optimize Microsoft Defender suite (Endpoint, Cloud, Office 365) and Microsoft Sentinel (SIEM, automation, custom rules). Configure Microsoft Purview for data … WAF), Microsoft Defender for Endpoint, Defender for Cloud, Defender for Office 365 Cloud Security & Compliance: Azure Security Center, Microsoft Sentinel (SIEM), security automation, incident response, and threat detection Identity & AccessManagement (IAM): Microsoft Entra ID (formerly Azure AD), Conditional Access, Privileged IdentityManagement (PIM), Identity Governance … Zero Trust implementation Endpoint Management: Microsoft Intune, device compliance policies, mobile device management (MDM), and endpoint protection Data Protection & Governance: Microsoft Purview, Data Loss Prevention (DLP), sensitivity labels, encryption, eDiscovery, records management, and GDPR/ISO 27001 compliance Automation & Monitoring: Sentinel playbooks, custom rule creation, security alerts, and continuous monitoring Preferred Qualifications: Microsoft certifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
Aberdeen
ideal candidate will have deep expertise in Oracle ERP and EPM products, strong proficiency in cloud technologies and hands-on experience with GitHub, API integrations, IdentityandAccessManagement (IAM) including Single Sign-On (SSO). This role will be instrumental in designing, implementing and optimising enterprise solutions that support our business operations and … and maintain RESTful and SOAP APIs to integrate Oracle systems with internal and third-party applications, ensuring seamless data flow and interoperability. Manage and implement IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions using tools like Azure AD, Okta and Oracle Identity Cloud Service. Establish and maintain CI/… eg, Planning, Financial Consolidation). Proficiency in developing and maintaining RESTful and SOAP APIs, with strong knowledge of JSON and XML. Hands-on experience with IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions, including Azure Active Directory, Okta, and Oracle Identity Cloud Service. Proven experience in designing and managing More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. This position requires strong leadership in both solution design and technical execution, working closely with engineering teams to ensure successful delivery and ongoing … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments. Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure.' Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
a greenfield on-premise identity solution. The role will focus on defining, architecting, and guiding the implementation of a secure, scalable, and resilient identityandaccessmanagement (IAM) platform. This position requires strong leadership in both solution design and technical execution, working closely with engineering teams to ensure successful delivery and ongoing … Extensive experience as a Solution Architect or Technical Architect specialising in Microsoft-based identity solutions. Proven ability to design and deliver new, greenfield identityandaccessmanagement environments. Deep expertise in: Windows Server 2022 and Active Directory architecture and management. ADFS configuration, federation trusts, and claims-based authentication. Federation with on-premise … identity providers using industry standards such as SAML, OAuth 2.0, and OpenID Connect. Strong background in SSO design, RBAC implementation, andidentity governance. Solid understanding of networking fundamentals, including DNS, routing, firewalls, and load balancing as they relate to identity infrastructure.' Experience providing technical leadership to engineering teams, including mentoring and code or configuration More ❯
to join their team. Please see below for key details. Role Overview: Manage and support Azure cloud platform operations with a focus on Infrastructure as Code, network operations, andidentitymanagement whilst ensuring platform reliability, security, and performance across Azure environments. Key Characteristics: Azure Platform Operations - Extensive hands-on experience managing and supporting Azure environments including … Machines, Azure Storage (Blob, Files, Disks), Azure SQL Database, App Services, Azure Functions, and container services (ACI, AKS). Proficient in Azure Monitor, Log Analytics, Application Insights, cost managementand optimisation, resource tagging strategies, and maintaining platform availability through proactive monitoring and incident response. Infrastructure as Code (Terraform) - Strong working knowledge of Terraform for provisioning and managing Azure … modules for Azure resources and implementing infrastructure changes through workflows. Experience with version control (GitHub/ADO), code reviews, and understanding of infrastructure drift detection and remediation. Configuration Management (Ansible) - Proficient in using Ansible for configuration management, application deployment, and orchestration tasks across Azure VMs. Experience writing playbooks for Azure resources, using Azure dynamic inventory, managing More ❯
Platform Support Operations Engineer | London | Hybrid 3 days | Permanent Role Overview: Manage and support Azure cloud platform operations with a focus on Infrastructure as Code, network operations, andidentitymanagement whilst ensuring platform reliability, security, and performance across Azure environments. Key Characteristics: Azure Platform Operations - Extensive hands-on experience managing and supporting Azure environments including Virtual … Machines, Azure Storage (Blob, Files, Disks), Azure SQL Database, App Services, Azure Functions, and container services (ACI, AKS). Proficient in Azure Monitor, Log Analytics, Application Insights, cost managementand optimisation, resource tagging strategies, and maintaining platform availability through proactive monitoring and incident response. Infrastructure as Code (Terraform) - Strong working knowledge of Terraform for provisioning and managing Azure … modules for Azure resources and implementing infrastructure changes through workflows. Experience with version control (GitHub/ADO), code reviews, and understanding of infrastructure drift detection and remediation. Configuration Management (Ansible) - Proficient in using Ansible for configuration management, application deployment, and orchestration tasks across Azure VMs. Experience writing playbooks for Azure resources, using Azure dynamic inventory, managing More ❯
Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
and technical standards. Integration Expertise : You're proficient in integrating Salesforce with other systems and technologies, designing and implementing secure, scalable, and high-performing enterprise integration solutions. Data Management … You implement data and process integrations, designing solutions that account for large data volumes and data privacy needs. Security & Compliance : You implement technical solutions for identityandaccessmanagement, ensuring compliance with data privacy regulations and organisational policies. Collaboration & Leadership : You work closely with business stakeholders and executives to design a vision and architecture … security measures and ensuring compliance with data privacy regulations. Identity & AccessManagement : Designing solutions for secure and efficient user accessandidentity management. Large Data Volume Management : Handling and optimising performance for large data volumes (LDV) through techniques like indexing and partitioning. Cloud Architecture : Understanding architectural principles of More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Salt Search
Business Analyst within the IDAM 2.0 Programme , you will play a key role in delivering new systems and enhancing existing ones across the organisation's identityandaccess ecosystem. Acting as the bridge between business and technology, you will analyse needs, define requirements, and guide delivery teams to ensure the successful implementation of IAM solutions. This … role blends traditional Business Analysis expertise with a strong understanding of IdentityandAccessManagement principles, tools, and processes. Key Objectives Support the Project Lead in defining the scope, objectives, and constraints within the IAM domain. Collect, analyse, and document business and technical requirements, transforming them into actionable deliverables. Develop and maintain the benefits … standards. Required Skills and Experience 3-5 years' experience as a Business Analyst, ideally within cybersecurity, IAM, or a regulated IT environment. Strong understanding of IdentityandAccessManagement concepts, including access provisioning/deprovisioning, RBAC, JML processes, ServiceNow integration, and security standards (e.g. SAML, OAuth). Hands-on experience onboarding applications More ❯
Job description We have an exciting new opportunity for an Identity & AccessManagement Senior Architect to join the A&O Shearman London office. About the team The firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large andMore ❯
managing CyberArk core components ( PVWA,CPM,PSM vault ),EPM and SCA solutions. Strong understanding of cybersecurity principles, privileged accessmanagement, andIdentityandAccessManagement (IAM) Proficient in configuring and managing CyberArk components. Experience with integrating CyberArk solution with other IAM tools and Infrastructure. Strong knowledge of cloud platforms such … any programming languages . Professional certifications in CyberArk and/or information security (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) Must have CyberArk Implementation hands on experience. Privileged AccessManagement tool technical certification More ❯
international repute and one of the largest employers in Liverpool. They are looking to an IT Applications Support Manager to join their established IT Services team.This is a management role that combines operational oversight, technical strategy, and hands-on delivery across a broad portfolio of business-critical applications. Reporting into senior IT leadership, you will guide the development … design authority, leading on product configuration, integrations, service upgrades and best-practice processes. You will bring deep knowledge of IT support functions, with experience across tools such as IdentityAccessManagement, ITSM, and Microsoft enterprise technologies . Whilst not essential, knowledge of SailPoint or ServiceNow would be highly advantageous. You will also ensure effective … design to implementation and support- Experience leading multi-disciplinary teams and developing technology strategies and roadmaps- Experience working with ServiceNow, SailPoint, Atlassian tools and Microsoft platforms- Knowledge of Identity & AccessManagement technologies (highly desirable)- Ability to produce high-quality documentation and manage complex data flows and API integrations This is an outstanding opportunity for More ❯
ASAP | IR35: Outside | Clearance: SC required The Role We're seeking an experienced IAM/PAM Specialist to lead the design and delivery of greenfield IdentityandAccessManagementand Privileged AccessManagement solutions. You'll provide hands-on technical leadership, ensure secure-by-design implementation, and contribute to the … Responsibilities Lead end-to-end IAM/PAM design and delivery. Integrate IAM/PAM telemetry into SIEM tooling. Provide technical oversight for MSPs and vendors. Develop and manage Conditional Access, MFA, and RBAC policies. Mentor junior team members and build internal capability. Maintain IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven … IAM/PAM implementation experience (e.g. Entra ID, CyberArk, BeyondTrust). Hands-on with Azure AD/Entra ID , Conditional Access & Identity Protection. Understanding of OAuth2.0, SAML, OpenID Connect . Familiarity with ISO 27001, NIST CSF, CAF & GDPR . Experience leading or overseeing MSPs. Current SC clearance . Desirable: Knowledge of Microsoft Sentinel, Splunk, or Elastic More ❯
IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identityandaccessmanagement, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google … Workspace, Slack, Miro etc.). Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM … Lead , who manages service process, managementand support The IT Director , to align on overall strategy, operational reliability, governance, and security maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Humanoid
IT environment, ensuring it is secure, reliable, and scalable as the company grows.This is a hands-on leadership role , combining responsibility for end-user computing, identityandaccessmanagement, corporate networking, and cyber security operations . What You’ll Do Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google … Workspace, Slack, Miro etc.). Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching, and recovery. Maintain monitoring, alerting, and performance reporting for corporate systems. Lead vendor management for hardware, software, and managed services. Ensure operational standards for backup, configuration, and change management. Engineering team , who manage product infrastructure (AWS, CI/CD, robotics environments); ITSM … Lead , who manages service process, managementand support The IT Director , to align on overall strategy, operational reliability, governance, and security maturity with business growth. We’re Looking For Manage Humanoid’s corporate IT infrastructure, endpoints, office networks, connectivity, and productivity platforms (Google Workspace, Slack, Miro etc.) Oversee endpoint lifecycle management, across sourcing, procurement, deployment, patching More ❯
recommends improvements and enhancements to mitigate risks and threats. Roles & Responsibilities Shaping, leading and delivering value through technology advisory consultancy and through guiding transformational delivery engagements Strong stakeholder managementand relationship building skills at senior levels that will enable consensus building and shaping technology direction Leading in the development and presentation of client proposals collaborating with teams across … proposals, that includes presentations, specimen RFI/RFP content, methodologies, toolkits and deliverables. The Security Architect will have a strong foundation in the design of identityandaccessmanagement, web service security, and data protection solutions implemented in a Java and AWS environment. They will have experience of creating high-level designs (HLDs) from … non-technical and technical stakeholders. Core skills and experience Architecture design (HLD, SAD) Cloud-native (Microservice, EDA) Amazon Web Services (AWS) Security Web Gateway (WAF, API Gateway, Nginx) Identity & AccessManagement (IAM, WSO2) Key management (KMS, Entrust) Database security (RDS, PostgreSQL) Network security (GardDuty, Shield) Security frameworks (e.g., OWASP, NIST) UK legislation More ❯
HLD) Location: Harbour Exchange Square, London Hybrid: 2 days to office Job Type: Permanent role JD: Experience in authoring substantial quality high level designs-Must IdentityandAccessManagement (IAM) is Must Expertise in producing security solutions Expertise in designing and integrating various security tools specially. Expertise in Infrastructure cloud solutions (AWS, GCP, Azure … architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
HLD) Location: Harbour Exchange Square, London Hybrid: 2 days to office Job Type: Permanent role JD: Experience in authoring substantial quality high level designs-Must IdentityandAccessManagement (IAM) is Must Expertise in producing security solutions Expertise in designing and integrating various security tools specially. Expertise in Infrastructure cloud solutions (AWS, GCP, Azure … architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
security tools and systems (e.g., firewalls, SIEM, IDS/IPS, endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user accessandidentitymanagement controls across systems. • Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing … Familiarity with securing cloud-native applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and Data Loss Prevention. • IdentityAccessManagement … deployment Azure AD, MFA, SSO, RBAC • Security auditing and monitoring. • Experience in deploying security solutions across business projects. • Excellent analytical and problem-solving abilities. • Strong communication skills and stakeholder management skills. EDUCATION & EXPERIENCE • Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). • 3–5+ years of experience in cybersecurity or information security More ❯
About the Role Support delivery of multiple identity, access, governance and onboarding initiatives by owning the business analysis activities end-to-end. Act as the bridge between business stakeholders and delivery teams, ensuring clarity, alignment and measurable outcomes. Key Responsibilities Own the BA deliverables across projects including onboarding, IDP integration, support/change processes, governance and … resolution. Act as the “voice of the business” in technical discussions, ensuring outcomes deliver business value. Maintain clear documentation for handover and future audit. Required Skills Strong stakeholder management: able to communicate confidently with execs, governance forums and delivery teams. Comfortable taking ownership of outcomes, not just producing requirements. Skilled in requirements elicitation, analysis and documentation. Experience with … process mapping (e.g. BPMN, swimlanes, Visio, Lucidchart, Miro). Strong facilitation and workshop skills. Familiar with IT service management concepts (e.g. JSM/ITIL) and governance processes. Knowledge of identity/accessmanagement concepts is a plus, but willingness and ability to learn specifics is more important. Excellent written and verbal communication More ❯