in on-prem backup solutions; cloud backup solutions an advantage Ability to diagnose and troubleshoot software and hardware issues logically and methodically Knowledge of Microsoft SQL Database Services andmanagement Strong written, oral, and interpersonal communication skills Keen attention to detail and adaptable to change Team-oriented and skilled in working within a collaborative environment Desirable Qualifications and … Experience: Experience with Microsoft 365 services Microsoft IdentityandAccessManagementand Conditional Access policies Knowledge of PowerShell Experience with server virtualisation (VMWare/Hyper-V) or VDI Strong understanding of networking concepts Proficiency with Microsoft Endpoint Configuration Manager MS Azure foundation level cloud certifications Experience with NIST-(Apply online only) andMore ❯
such as ISO 27001, NIST, CIS, GDPR and others. Lead threat modelling, risk assessments, and security reviews for GCP infrastructure and applications. Define and enforce IdentityandAccessManagement (IAM) policies, including roles, permissions and service accounts. Implement and maintain security monitoring, logging, and alerting tools (e.g., Cloud Logging, Cloud Monitoring, SCC). Skills More ❯
proactive checks to ensure the prevention of incidents and service interruption. Escalate issues to relevant Partners, Internal Teams and Client Escalation contacts in line with the P1 Incident Management process. Act as a point of escalation for the wider team as well as to the Service Desk Teams for infrastructure and complex end user incidents. Prioritise and respond … to incoming requests ensuring ITIL best practice ticket management is adhered to. Providing technical assistance to a key Ultima client and their IT teams in line with the agreed SLA’s. To always represent Ultima to our client in the most professional way and continually demonstrate our core company values. Supporting the Team Lead in the identification and … be knowledgeable and able to demonstrate in depth technical understanding across several of the skills and technologies below: Microsoft Azure infrastructure platform support (Compute, Storage, Data protection, Update Management, Azure DNS) Azure concepts such as App registrations, Enterprise applications, RBAC, IdentityAccessManagement Azure VMware Solution Microsoft Server Operating System Linux server More ❯
proactive checks to ensure the prevention of incidents and service interruption. Escalate issues to relevant Partners, Internal Teams and Client Escalation contacts in line with the P1 Incident Management process. Act as a point of escalation for the wider team as well as to the Service Desk Teams for infrastructure and complex end user incidents. Prioritise and respond … to incoming requests ensuring ITIL best practice ticket management is adhered to. Providing technical assistance to a key Ultima client and their IT teams in line with the agreed SLA’s. To always represent Ultima to our client in the most professional way and continually demonstrate our core company values. Supporting the Team Lead in the identification and … be knowledgeable and able to demonstrate in depth technical understanding across several of the skills and technologies below: Microsoft Azure infrastructure platform support (Compute, Storage, Data protection, Update Management, Azure DNS) Azure concepts such as App registrations, Enterprise applications, RBAC, IdentityAccessManagement Azure VMware Solution Microsoft Server Operating System Linux server More ❯
of IAC tools and best practices. Able to design and implement complex infrastructure. Security Knowledge: Knowledge of cloud security best practices. Familiarity and competency with IdentityandAccessManagement (IAM). Troubleshooting and Debugging: Strong troubleshooting and debugging skills. Experience in incident response. Experience working to an Agile methodology Ability to write technical documentation More ❯
Wolverhampton, West Midlands, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
processes. What youll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Tilt Recruitment Limited
processes. What youll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
Gillingham, Brompton, Medway, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
What you’ll need Proven experience in cloud security engineering within an enterprise setting, preferably on Microsoft Azure. Solid background in foundational security design – from identityandaccessmanagement to secure networking, container platforms (Kubernetes/AKS) and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI/CD pipelines and tools like More ❯
for us. In January, we announced a game changing deal to become part of the IG Group. We'll continue to operate as an independent business while gaining access to the resources and support of an established leader in the space. This year, we're accelerating our roadmap and taking our products to the next level. We're … a comprehensive cloud security program in partnership with DevOps and Platform teams. Define Policies and Implement Key Controls: Develop and enforce cloud security policies, including IdentityandAccessManagement (IAM) , Web Application Firewalls (WAFs) , and network segmentation strategies . Review System Architecture and Design: Conduct in-depth architecture and infrastructure reviews to uncover insecure … as-code, CI/CD pipelines, and cloud-native applications. Deploy and Manage Security Tooling: Select, implement, and operate key tools across GCP , such as Cloud Armor , Cloud Identity , Security Command Center , and VPC Service Controls for ongoing threat detection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage More ❯
and application issues, driving resolution end-to-end. Collaborate with development teams, infrastructure, and vendors to diagnose and resolve bugs, performance issues, and outages. Lead application upgrades, patch management, UAT, and post-deployment support. Ensure data integrity, system reliability, and compliance with internal IT governance and policies. Develop and maintain technical documentation, support procedures, and knowledge base articles. … configurations. Familiarity with macOS, iOS, iPadOS. Jamf Pro or Kandji experience. Basic SQL proficiency. Experience with Java and Oracle-based applications. Experience with Azure Virtual Desktop and cloud identity/access management. Basic Linux skills. Strong understanding of network protocols and troubleshooting skills. Familiarity with PAM tools like BeyondTrust is a plus. Scripting or automation skills More ❯
playbooks for most frequent or critical incident types. 2+ years of working with security tools such as SIEM, Analytics & Intelligence, Intrusion Detection, Email Forensics, Data Loss Protection, andIdentity & Access Management. Solid understanding of system and security controls on at least two OSs (Windows, Linux/Unix, and MacOS (Advantage). Familiarity with cloud infrastructure (e.g. … Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure). Fireblocks' mission is to enable every business to easily and securely access digital assets and cryptocurrencies. In order to do that, we strongly believe our workforce should be as diverse as our clients, and this is why we embrace diversity andMore ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
services organisation based in London. This newly created role will be responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s security posture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on … a daily basis will include: Designing all IAM frameworks aligning to industry best practices User accessmanagement – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross team collaboration … technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management/SME role Understanding if IAM tooling (SailPoint More ❯
Scarborough, Yorkshire, United Kingdom Hybrid / WFH Options
Intello Technologies Inc
Select how often (in days) to receive an alert: Senior Software Developer - IdentityAccessManagement (IAM) Location: Scarborough, ON, CA, Burnaby, BC, CA, Calgary, AB, CA, Edmonton, AB, CA, Ottawa, ON, CA, Toronto, ON, CA, Vancouver, BC, CA Jobs by Category: Technology Solutions Job Function: Engineering & Development Status: Full Time Schedule: Regular Join our … TELUS entities. What you will do Design, develop, and implement high-quality Identity platform solutions and enhancements Utilize Identity domain knowledge, including OAuth, SAML, andIdentity provider customization, to implement secure and scalable authentication and authorization mechanisms. Lead and mentor junior developers in best practices and coding standards. Collaborate with product managers, architects, and … remarkable human outcomes in a digital world. You'll find our engaging, high-performance culture personally fulfilling, professionally challenging, and financially rewarding. We're committed to diversity and equitable access to employment opportunities based on ability. Your unique contributions and talents will be valued and respected here. When you join our team, you're helping us make the More ❯
Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth knowledge of Conditional Access, Azure Active Directory (Azure AD), andidentity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid … identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, andaccess reviews. Monitor and respond to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
Microsoft 365 environments, with a strong track record of managing complex, multi-tenant architectures, and in-depth knowledge of Conditional Access, Azure Active Directory (Azure AD), andidentity governance. Key Responsibilities: Design, implement, and manage Conditional Access policies to enforce secure access to M365 services. Administer and optimise Azure AD, including hybrid … identity configurations and synchronisation (e.g., AAD Connect). Manage identity lifecycle processes, including provisioning, de-provisioning, andaccess reviews. Monitor and respond to identity-related security incidents and alerts. Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged IdentityManagement (PIM), and role-based access control (RBAC). Troubleshoot complex identityandaccess issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM best practices. Required Skills and Experience: Extensive experience in IdentityandAccessManagement, with a focus on More ❯
IAM Security Engineer Job Description Who we are looking for State Street cyber IdentityandAccessManagement is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. A robust strategy, architecting zero trust building blocks, deployment, and a passion for effecting change across the … the organization Collaborative leadership and work style with the ability to effectively interact with and earn the trust of peers, CTO, development teams across the organization Project and process management skills, including proven ability to manage multiple projects simultaneously. Self-starter with a keen sense of ownership and commitment to work, and passion for delivering results. Education & Preferred … around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs andaccess to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. State Street's Speak Up More ❯
Senior Software Engineer - IdentityandAccessManagement (f/m/d) Join Contentful as a Senior Software Engineer and take a central role in enhancing our IdentityandAccessManagement ( IAM ) capabilities. Our platform serves billions of requests daily, with customers trusting us with their content-making … with a track record of developing practical solutions that drive product growth. Team Player : Excellent English communication skills with proven ability to work effectively in collaborative environments. Time Management : Strong organizational skills with ability to prioritize tasks in fast-paced settings. Development Practices : Experience with continuous development methods ( XP experience is beneficial). Initiative : Self-motivated with a … are proud to be an equal opportunity employer. All qualified applications will receive consideration for employment without regard to race, color, national origin, religion, sexual orientation, gender, gender identity, age, physical dis ability, or length of time spent unemployed. We invite you to apply and join us! If you need reasonable accommodations at any point during the application More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
We are a Global Recruitment specialist that provides support to the clients across EMEA, APAC, US and Canada. We have an excellent job opportunity for you. Role Title: Identity Verification Product Owner Location: Northampton Duration: 31/12/2025 Rate: 402GBP/Day(Inside IR35) Role Description: A Digital Identity Verification Product Owner needs a … and make informed decisions. Here's a more detailed breakdown of the key skills: Technical Acumen: IdentityManagement: Deep understanding of identityandaccessmanagement (IAM) solutions, including technologies like federation, single sign-on (SSO), multi-factor authentication (MFA), and entitlement management. Fraud Detection: Familiarity with fraud detection systems, including … Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS and Azure, and their respective identityandaccessmanagement services. Analytical Skills: Ability to interpret complex data, identify trends, and translate them into actionable strategies. Understanding of risk management principles and the More ❯
any adjustments to assist you in applying, please contact We are seeking a talented and strategic IGA/IAM/PAM Manager to spearhead our identityandaccessmanagement efforts across the organization. This role involves overseeing the governance of digital identities, enforcing access controls, and safeguarding privileged accounts and credentials. The … Governance Access Manager at Nottingham Building Society: - Collaboration: Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security … federation solutions (e.g., Okta, Azure AD, Ping). Integration: Drive integration of IAM policies into enterprise applications and cloud platforms. Stakeholder Engagement: Work with stakeholders to define and enforce user access policies and workflows. About you: - Experience: Extensive background in accessmanagement, IGA implementation, and endpoint security. Knowledge: Familiarity with industry best practices andMore ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
to the way we manage identity, security, endpoints, and user experience. Whether you bring strengths in endpoint management (Jamf Pro, Intune), identityandaccessmanagement (Okta), or infrastructure security, we're looking for someone who thrives on solving problems, improving systems, and mentoring others. What You'll Do Acting as … support issues across hardware, software, and SaaS environments Supporting Apple macOS devices at scale using Jamf Pro, and managing Windows endpoints via Microsoft Intune Administering identityandaccessmanagement using Okta, including user lifecycle, SSO, and MFA policies Contributing to the design and improvement of email security and hygiene processes using platforms such as … Proofpoint or similar tools Participating in onboarding and offboarding workflows, system provisioning, andaccess governance Supporting compliance, documentation, and technical controls in line with standards such as ISO 27001 or Security+ Supporting and evolving AV and video conferencing systems for meeting and collaboration spaces Collaborating with vendors on hardware procurement, lifecycle management, and inventory tracking Contributing More ❯
Engineer to join our cyber security team! Working alongside the team you will help to design, develop, and mature the company's cybersecurity capability, including the selection, implementation, andmanagement of security tools/technologies, focused on detection, prevention, and analysis of security threats. This role offers a great opportunity to help define and shape the security function … needs. Support the definition, execution and continuous improvement of key cybersecurity processes including vulnerability & patch management, security incident response, security monitoring, endpoint security, identityandaccessmanagement, network security, and cryptography. Assist with developing and maintaining security policies, processes and incident response management plans and playbooks. Prepare and document standard … technology development & acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at increasing enterprise security capabilities e.g., identityandaccessmanagement, log aggregation, etc. Required experience: Minimum of 2 years' experience in a Security Engineer/Analyst role focusing on designing and implementing security solutions andMore ❯
pension plan of an additional 5% of your base salary paid by us monthly to save for your future. Your role and responsibilities A Security Consultant specializing in Identity & AccessManagement (IAM) services, helps organizations understand and manage the entire identity lifecycle within their enterprise. They utilize commercially available IAM tools such … is proficient in directory services like TDI and AD, and has hands-on experience with SAML, OAuth, and scripting. This skillset enables them to create a secure and streamlined identitymanagement system for the organization. The consultant is also proficient in developing scripts to automate the provisioning and migration of identities across … Cloud, OT, IOT and enterprise IT. Required education None Preferred education Bachelor's Degree Required technical and professional expertise Deep Expertise: Specialist/Engineer in IdentityandAccessManagement (IAM), serving as a Subject Matter Expert (SME) in IBM Security Verify Access. Solution Design and Implementation: Skilled in high-level and low-level design More ❯
Azure and GCP Deep understanding of cloud computing concepts including IaaS, PaaS and SaaS Expertise in designing and implementing hybrid multi cloud solutions including appropriate IdentityandAccessManagement options Experience of TOGAF and Zachman methodologies Knowledge of Infrastructure as Code tools (e.g. Terraform, ARM/Bicep, etc.) Knowledge of cloud security best practices More ❯