github, Jenkins, TeamCity, Sonar, XLDeploy, Docker, Kubernetes • Infra as code: Terraform, ansible, azure cloud • Datastores: PostGre, OCP • Observability: ELK, Grafana, OpenTelemetry • Batch: airflow (python) • Security & Compliance: TLS, OAuth2/OIDC, data masking, GDPR/MiFID controls • Project & Process: Scrum/Kanban, backlog grooming, metrics driven retrospectives Why join us People join for the impact they can have on us. They More ❯
web services, messaging, and event-driven architectures. Cloud: Good knowledge and work experience in AWS. Strong knowledge of authentication and identity-related technologies and protocols is an advantage – e.g. OIDC, OAuth2 - Web Technologies and Containerisation: Proficiency in Java Spring, Docker, Kubernetes, with a heavy focus on automation and CI/CD practices. Agile Software Engineering: Strong skills and experience in More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
Trust In SODA
with IAM platforms, particularly IBM Security Identity Manager (ISIM) or alternatives like Ping Identity or Microsoft Identity Manager. Strong understanding of IAM protocols such as LDAP, SAML, OAuth, and OpenID Connect. Java development skills with frameworks such as Spring and Hibernate. Background in IAM administration: provisioning, role management, and access reviews. Familiarity with cloud environments (AWS, GCP, or Azure More ❯
will work on implementing Single Sign-On systems to integrate all applications under a unified platform. Key responsibilities: Design and develop solutions using authentication and authorization protocols such as OpenID and OAuth. Hands-on development in C# and Microsoft .NET. Design and develop cloud-native solutions using PaaS/SaaS technologies on Microsoft Azure. Build and consume APIs (REST More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vanloq
auditing at scale. Kubernetes RBAC: Knowledge of Role/ClusterRole Bindings and their integration with cloud-native IAM (EKS, AKS, GKE). SaaS IAM: Understanding of SSO (SAML, OAuth, OIDC), SCIM provisioning, and identity lifecycle management in tools like Office 365. ✅ Skills & Experience Required: 5+ years as a Business Analyst within IT Security, IAM, or Governance. Prior experience within financial More ❯
identity lifecycle management and security principles. Hands-on experience with Conditional Access, MFA, and SSO, Group Policy, Intune and related technologies. Knowledge of protocols such as SAML, OAuth, and OpenID Connect. Experience with identity governance and administration tools such as SailPoint or CyberArk. Experience of Cloud platforms such as Microsoft Azure, OCI or AWS Proficiency in PowerShell scripting and More ❯
example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365) EXPERIENCE: 5+ More ❯
example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365) EXPERIENCE: 5+ More ❯
Redis SQL Server Service bus (or similar broker) Automated testing frameworks and technologies Angular (ideally also AngularJS) Microsoft Entra/AD and a good working knowledge of OAuth and OpenID Azure DevOps including deployment pipelines Exemplary expertise in Microsoft .NET and the full web stack, deep knowledge of cloud technologies and architecture, and a strong understanding of modern practices More ❯
example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration). SaaS Application Identity Management Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM) Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365) EXPERIENCE: 5+ More ❯
Access. Solution Design and Implementation: Skilled in high-level and low-level design and implementation of complex consumer access management solutions. Technical Proficiency: Expertise in API Design, OAuth/OIDC, XACML, MFA, MMFA, and proficiency in scripting and automation using languages and tools like Python and Ansible. Excellent problem-solving skills, strong attention to detail, and effective communication skills. As More ❯
plus. Experience with microservices and containerization using Dockers, ECS and EKS. Experience with IT networking infrastructure such as directory services (LDAP/NIS), authentication protocols (such as Okta, OAuth, OpenID, etc.) is desired. Experience with software development methodologies such as Agile, SDLC as per IEC62304 is desired. Experience with end-to-end DevOps (from requirements to implementation to production More ❯
understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility … understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility More ❯
understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility … understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility More ❯
understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility … understanding of software design principles and business processes Proven ability to collaborate effectively with both local and global teams Experience with modern authentication standards and solutions such as OAuth2, OpenIDConnect, SAML, Google Sign-In, or Facebook Login Proficiency in general-purpose programming languages; strong preference for Java Experience working in cloud-native environments (AWS, Azure, or GCP) Flexibility More ❯
and implement mitigation strategies. Work with IAM tools such as Okta, Ping Identity, Microsoft Azure AD, ForgeRock, SailPoint, CyberArk, or similar platforms. Manage identity federation protocols like SAML, OAuth, OpenIDConnect, and LDAP. Oversee Privileged Access Management (PAM) implementations. #J-18808-Ljbffr More ❯
and implement mitigation strategies. Work with IAM tools such as Okta, Ping Identity, Microsoft Azure AD, ForgeRock, SailPoint, CyberArk, or similar platforms. Manage identity federation protocols like SAML, OAuth, OpenIDConnect, and LDAP. Oversee Privileged Access Management (PAM) implementations. #J-18808-Ljbffr More ❯
Preferred qualifications, capabilities, and skills Experience with AWS cloud services (e.g., EC2, S3, IAM, CloudWatch). Experience with Infrastructure as Code (e.g., Terraform). Familiarity with authentication protocols (OAuth2, OpenIDConnect). Experience working in Agile/Scrum teams. #J-18808-Ljbffr More ❯
firewalls Security Best Practices - Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption) Security Protocols - Experience with modern security protocols and practices - e.g. Zero Trust, OAuth, OpenID, TLS/SSL Agile Methodologies - Experience with Agile, Scrum, and Kanban DevOps - Expertise in managing processes aligned with DevOps principles Infrastructure as Code (IaC) - Experience with IaC tools to More ❯
to work collaboratively in local and global teams and develop meaningful relationships to achieve common goals. Experience with Authentication and modern authentication practices and solutions (such as OAuth2/OpenIDConnect, SAML, Facebook Login, Google Sign-In) are required Proficiency in one or more general purpose programming languages, Java is required Experience in Cloud native experience such as AWS More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
authoring product-focused technical documents such as RFIs, RFPs, etc. An understanding of the concept of Cryptography and Security - ideally including several of the following: PKI, digital signatures, certificates, OpenIDConnect, SAML, FIDO, SmartCard and SmartCard/FIDO Management systems e.g. Verasec CMS. Awareness of Hardware Security Modules is an advantage Other experiences with Identity & Access Management solutions (trust More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
Thales Group
authoring product-focused technical documents such as RFIs, RFPs, etc. An understanding of the concept of Cryptography and Security – ideally including several of the following: PKI, digital signatures, certificates, OpenIDConnect, SAML, FIDO, SmartCard and SmartCard/FIDO Management systems e.g. Verasec CMS. Awareness of Hardware Security Modules is an advantage Other experiences with Identity & Access Management solutions (trust More ❯
for security testing to be done early in SDLC (Software Development Lifecycle) and by ensuring security considerations are embedded in early architecture designs. Understanding of identity federation (SAML, OAuth, OpenIDConnect, etc.). Designing and documenting reusable security reference architecture patterns. Support Development of Technical security standards, aligning and enforcing these across the organization. Work closely with IAM architects More ❯
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
Verisk
knowledge of serverless architectures, event-driven patterns, and containerization. Experience designing and implementing secure, scalable, and high-availability architectures. Solid understanding of networking, security, authentication, and authorization (OAuth, JWT, OpenIDConnect, IAM roles, etc.). Familiarity with big data technologies, streaming platforms like Kinesis, and data lake architectures. Proficiency in C#, Python, or Node.js for backend development and scripting. More ❯