IAM Sailpoint) 680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQ or SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQ or SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £100,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with a proven track record in designing security roadmaps and influencing at executive level. You'll combine hands-on IAM expertise with strategic leadership … shaping global identity strategies while engaging with CISOs and senior stakeholders. Experience with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're looking for an Identity & AccessManagement (IAM) and Security specialist to own and drive a global … priorities into scalable, actionable security solutions. Key Responsibilities: Design, own, and deliver the Global Technology Operations security roadmap Build and implement IAM frameworks (Saviynt preferred; Okta, SailPoint, Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Partner with CISO and senior leadership to define security strategy and mitigate risks Provide expert guidance during More ❯
The Role This role involves the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security … scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: * Design, Implementation and Deployment: o Install, configure, and deploy ForgeRock and PingOne AIC components in various environments (on-premise, cloud, hybrid). o Develop custom workflows, authentication/authorization policies, and integrations using … with the IAM platforms. o Automate deployment and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. * Managementand Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to identify and resolve More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & AccessManagement (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled … in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
for risks, issues, and deadlines Deliver initiatives across people, process, technology, and governance Manage smaller internal cyber security projects outside the partner's scope Maintain programme governance, risk management, and resource planning Collaborate with senior stakeholders, IT teams, and external suppliers Drive change managementand embed new security disciplines across the organisation Monitor progress against KPIs … Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and … information security Deep understanding of Microsoft Azure security architecture Experience managing vendor selection and consultancy engagement Proven track record of delivering security programmes end to end Excellent stakeholder managementand communication skills Relevant certifications (e.g. SC-100, CISSP, CISM, ISO 27001 Lead Implementer More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
/Application connectors within SailPoint IdentityIQ Knowledge Windows & Linux server operating systems is highly recommended. Scripting Knowledge eg: PowerShell is a plus At least 3-5 years of Identity & AccessManagement (IAM) engineering experience required. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues efficiently. Strong communication More ❯
/Application connectors within SailPoint IdentityIQ Knowledge Windows & Linux server operating systems is highly recommended. Scripting Knowledge eg: PowerShell is a plus At least 3-5 years of Identity & AccessManagement (IAM) engineering experience required. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues efficiently. Strong communication More ❯
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Robert Walters
of systems Hands on, automation, cross-functional collaboration Manage Azure and M365 Cloud Platforms Oversee enterprise application stack - M365, Azure, Atlassian, Telephony, IT Service tools Manage/Develop IdentityandAccessManagement solutions Identity/Automate tasks - streamline workflows Implement/Manage monitoring tools Troubleshoot and Incident Response: Investigate, Resolve issues Security … systems procedures CI/CD Support: Implementation of Continuous Integration/Deployment pipelines Provide tech config on cyber security controls Lead tech implementation of enterprise solutions Provide daily management of digital workplace tech stack Act as senior escalation point Tech Ops Engineer: Technical Skills Networking, Azure Cloud Platforms, AVD Virtualization, M365 Collaboration solutions Experience to Azure and M365 More ❯
security operations, security consulting, incident response, etc.) Hands-on security experience in two or more of the following: Cloud Security, Application Security (security SDLC, threat modeling, code review), Identity & AccessManagement, Network Security, Data Protection, Incident Response. Hands-on experience with enterprise security solutions (Data Loss Prevention, WAF, SIEM, etc.) Track record of leading … complex security projects Experience contributing to the professional development of technical contributors (direct management, mentoring, coaching, etc) Able to communicate effectively in English within technical and business settings. Preferred Qualifications Relevant security certifications (AWS Security Specialty, CISSP, CCSP, etc.) Experience leading cloud transformation projects Ability to navigate complex stakeholder relationships and drive change Strategic thinking and decision-making More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO … and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identityandaccessmanagement (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and … Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies and standards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls and continuous compliance checks. Lead risk mitigation efforts with technical solutions that scale across diverse user and … native environments (AWS, Azure, GCP). Proven track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, andMore ❯
every stage of the ML lifecycle (data ingestion, feature store, model training, deployment, monitoring). Implement secrets management, network security (firewalls, VPCs), andidentityandaccessmanagement (IAM) for data and model assets. Compliance & Governance: Ensure the MLOps platform adheres to stringent financial industry regulations (e.g., GDPR, SOX, PCI-DSS, SWIFT CSCF … Automate compliance evidence collection. Threat Modeling & Risk Assessment: Proactively conduct threat modeling for AI/ML systems, identifying risks related to data poisoning, model inversion, adversarial attacks, and unauthorized access to sensitive models. Tooling & Automation: Develop and maintain infrastructure-as-code (IaC) using Terraform or CloudFormation. Automate security scanning for container images, ML models, and dependencies. Build monitoring … cloud security principles (Zero Trust, Least Privilege), IAM, network security, and encryption (at-rest and in-transit). Practical experience with security tools for SAST, DAST, SCA, and secrets management (e.g., HashiCorp Vault). MLOps & AI/ML Knowledge: Must have practical experience with MLOps tools and workflows (e.g., MLflow, Kubeflow, Seldon Core) and an understanding of the More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Sanderson are working with our client on an exclusive basis to help the recruit a permanent Senior Identity Consultant during a phase of growth in the organisation. This is a newly created role so you will need to have the depth of knowledge to be able to interpret architecture requirements whilst collaborating with developers, business analysts and architects … Microsoft Entra for customer needs against project deadlines. To carry out this role successfully you will need to have a blend of the following skills; IdentityandAccessManagement knowledge Configuration Management Active Directory Security best practises Troubleshooting & Support Software Configuration Agile Methodologies Data Orchestration & Transformation The ability to work across internal More ❯
industry-leading solutions. This role offers the opportunity to shape and deliver cutting-edge security architectures that span Secure Access Service Edge (SASE), identityandaccessmanagement, cloud security, and data centre protection. As a Technology Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory … teams Deliver robust governance and due diligence throughout the solution lifecycle What you'll need Proven experience leading security architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE/SASE projects Ability to provide presales advisory, requirements gathering More ❯
database, LDAP, IIS 7.x, Jboss and webservers such as apache and iplanet webserver. CHEF, IBM WebSphere application server, Inspec, Splunk, CA Wily. Sound knowledge in Identityandaccessmanagement tools, IBM Security/Tivoli Access manager, IBM Security/Tivoli directory server, RSA access manager, RSA entitlement server, Active directory More ❯