Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … and Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccess Management. (PAM) Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to address More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
in adapting sophisticated IAM solutions and Active Directory and Azure Active Directory (ENTRA ID) systems. Develop and implement policies and procedures for identity and access management. Conduct assessments and provide solutions to improve information security gaps. Collaborate closely with IT and cybersecurity teams to ensure compliance. Provide technical training … and support to internal teams. Leading identity lifecycle and accessmanagement (IDM) and Identity Governance and Administration (IGA) policies working with IT teams. Maintain existing systems and ensure their accurate functioning. Review the configuration of different systems to evaluate security controls. Handle daily requests through the corporate IT … as CISSP, CISM. Experience with IAM tools like Okta, SailPoint, or Ping Identity - an advantage. Understanding of MSA, GMSA, and equivalent technologies. Knowledge of PAM (PrivilegedAccessManagement) and Vault solutions. Enjoying working in a dynamic and exciting environment. Hands-on experience working with operating systems. Knowledge More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & AccessManagement, PrivilegedAccessManagement, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO … understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and accessmanagement technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing … experience. Annual Leave - 26 days holiday per year increasing to 30 with the length of service. (plus bank holidays) Generous Pension Scheme through AON. Access to lots of benefits to help you take care of you and your family's health and wellbeing, and your finances - from annual health More ❯
Identity Governance Access Analyst - Nottingham CityContract type: PermanentHours: Full-time, 35 hoursLocation: Head Office, Nottingham (Hybrid working, minimum 2 days per week)Application process: Please apply via the application button which will direct you to our careers site. If … you require any adjustments to assist you in applying, please contact careers@thenottingham.comWe are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance … of user identities, managing access controls, and securing privileged accounts. You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments.Here’s a taste of More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
to £51,000 We are looking for an IDAM Analyst to play a crucial role in building and operating a new centralised Identity and AccessManagement (IDAM) solution. While architects and engineers will handle the technical aspects, this role requires a strong technical understanding of IDAM and the … business needs. Oversee identity governance , including Joiners, Movers, Leavers (JML) processes , role-based access control (RBAC) , and privilegedaccessmanagement (PAM) . Ensure authentication methods such as SSO, MFA, and identity federation are properly integrated and managed. Work with architects and engineers to support the implementation … Strong technical knowledge of IDAM , including identity governance, access control, and security policies . Experience with IAM frameworks such as RBAC, SSO, MFA, PAM, and identity lifecycle management . Ability to act as the ‘customer’ for an IDAM solution , influencing technical teams and ensuring the platform meets business More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing privileged accounts. … You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Heres a taste of what you will be doing as an Identity Governance Access Analyst … at Nottingham Building Society: Daily Operations: Collaborate with the IGA Manager to ensure smooth daily operations of our identity governance platform, adhering to user access policies. Process Management: Coordinate with HR and IT to manage joiner, mover, and leaver processes across systems. Access Certification: Assist in accessMore ❯
We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing privileged accounts. … You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Heres a taste of what you will be doing as an Identity Governance Access Analyst … at Nottingham Building Society: Daily Operations: Collaborate with the IGA Manager to ensure smooth daily operations of our identity governance platform, adhering to user access policies. Process Management: Coordinate with HR and IT to manage joiner, mover, and leaver processes across systems. Access Certification: Assist in accessMore ❯
We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our Information Security team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing privileged accounts. … You will collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Heres a taste of what you will be doing as an Identity Governance Access Analyst … at Nottingham Building Society: Daily Operations: Collaborate with the IGA Manager to ensure smooth daily operations of our identity governance platform, adhering to user access policies. Process Management: Coordinate with HR and IT to manage joiner, mover, and leaver processes across systems. Access Certification: Assist in accessMore ❯
Security Architect who will provide expert advice and guidance on Identity and AccessManagement (IDAM) and PrivilegedAccessManagement (PAM) solutions. This is a hybrid role - 2 days in London, 3 days remote. The role falls inside IR35 so you will need to work through … experience in a Cyber/Information Security Role. You must hold a relevant Security Certifications (e.g., CISSP, CISM). Extensive experience in IDAM/PAM consulting, with a proven track record of delivering successful solutions. Deep understanding of IDAM/PAM technologies (including Microsoft AD, Key Vault, Entra, AWS IAM … best practices. Good understanding of the concepts of "Secure by Design" and "Zero Trust" within implemented solutions. Experience in developing and presenting IDAM/PAM roadmaps and strategic recommendations is also required. You must be eligible for SC Clearance if not already cleared. Please apply ASAP to discuss further. More ❯
Title: CyberArk Engineer(Need Active SC Clearance) Location: Remote with some travel to Warwick Duration: 31/10/25 Role Description: Implementation and Management: Oversee the implementation and management of CyberArk solutions, ensuring they meet the organization's security requirements.Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance.Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management.Troubleshooting: Diagnose and resolve issues … Relevant certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred.Technical Skills: Strong understanding of IT security principles, PAM, and related technologies.Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues.Communication: Strong communication skills to effectively collaborate with various teams and More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Experis
Remote Working £500-£550p/d via Umbrella ASAP Starter until October 2025 The successful candidate will hold SC Clearance. Role Brief: * Implementation and Management: Oversee the implementation and management … of CyberArk solutions, ensuring they meet the organization's security requirements. *Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. *Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. *Troubleshooting: Diagnose and … certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. * Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. * Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. * Communication: Strong communication skills to effectively collaborate with various More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Eteam Workforce Limited
Title: CyberArk Engineer(Need Active SC Clearance) Location: Remote with some travel to Warwick Duration: 31/10/25 Role Description: Implementation and Management: Oversee the implementation and management … of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and … certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
CyberArk Engineer Remote Working £500-£550p/d via Umbrella ASAP Starter until October 2025 Role Brief: Implementation and Management: Oversee the implementation and management … of CyberArk solutions, ensuring they meet the organization's security requirements. Technical Expertise: Provide technical expertise in CyberArk PrivilegedAccessManagement (PAM) solutions, including installation, configuration, and maintenance. Security Policies: Develop and enforce security policies and procedures related to privilegedaccess management. Troubleshooting: Diagnose and … certifications such as CyberArk Certified Delivery Engineer (CDE) or CyberArk Certified Trustee (CCT) are often preferred. Technical Skills: Strong understanding of IT security principles, PAM, and related technologies. Problem-Solving: Excellent problem-solving skills and the ability to troubleshoot complex issues. Communication: Strong communication skills to effectively collaborate with various More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
london, south east england, united kingdom Hybrid / WFH Options
Addition+
expertise and invests in your growth, this is the role for you. What You’ll Bring To The Table Oversee the deployment, configuration, and management of Zscaler and CyberArk solutions to ensure secure internet access and advanced threat protection for clients. Oversee the design, implementation, and management … threats, and technologies. Implement continuous improvement initiatives to enhance the effectiveness and efficiency of our cybersecurity programs. Drive the growth and development of the PrivilegedAccessManagement service offering, expanding … market presence and client base. Provide strategic guidance and technical expertise to clients throughout the project lifecycle. Stay up to date with the latest PAM technologies, tools, and best practices. Develop and implement best practices for privilegedaccessmanagement and ensure compliance with industry standards and regulations. More ❯
detect and respond to threats. Oversee identity and accessmanagement (IAM), including Active Directory security and privilegedaccessmanagement (PAM). Conduct vulnerability assessments and manage patch deployment using Vulnerability Manager Plus and Patch Manager Plus. Ensure compliance with security frameworks such as ISO More ❯
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) PrivilegedAccessManagement (PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … Cyber Security, with at least 5 years focused on IAM. Proven expertise with leading IAM technologies such as: IGA: SailPoint, Saviynt, Oracle Identity Governance PAM: CyberArk, BeyondTrust, Delinea SSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD) Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect … with cloud IAM in AWS, Azure or GCP. Hands-on experience designing and deploying IAM in large, complex enterprise environments. Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences. More ❯
roadmap development, solution design and implementation. Architect and implement enterprise IAM solutions including: Identity Governance and Administration (IGA) PrivilegedAccessManagement (PAM) Single Sign-On (SSO) and Multi-Factor Authentication (MFA) Directory Services and Federation Evaluate client environments to recommend appropriate IAM tools, policies and improvements. Collaborate … Cyber Security, with at least 5 years focused on IAM. Proven expertise with leading IAM technologies such as: IGA: SailPoint, Saviynt, Oracle Identity Governance PAM: CyberArk, BeyondTrust, Delinea SSO/MFA: Okta, Ping Identity, Microsoft Entra ID (formerly Azure AD) Strong knowledge of protocols and standards (SAML, OAuth, OpenID Connect … with cloud IAM in AWS, Azure or GCP. Hands-on experience designing and deploying IAM in large, complex enterprise environments. Excellent communication and client management skills; able to convey complex ideas to technical and non-technical audiences. More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
in Microsoft 365, Entra ID (Azure AD), Microsoft Intune, Defender Suite, and Zero Trust Security Architecture. This role will focus on identity security, endpoint management, compliance, and cloud security, ensuring a secure and scalable IT infrastructure aligned with industry best practices. Experience with Layer 7 firewalls, VPNs, SD-WAN … Microsoft 365 and Azure environments. Manage Entra ID (Azure AD), Conditional Access, Multi-Factor Authentication (MFA), and PrivilegedAccessManagement (PAM). Optimize Microsoft Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and … Infrastructure Security. Skills Deep expertise in Microsoft 365 Security, Entra ID (Azure AD), Microsoft Intune, and Microsoft Defender Suite. Strong knowledge of IAM, MFA, PAM, SIEM (Microsoft Sentinel), and security automation. Experience securing Microsoft Azure environments (Azure Security Center, Azure Policy, Conditional Access). Familiarity with hybrid and multi More ❯
Delivering an improved experience for students in the PC cluster environments and a more robust service for colleagues. Expanding services offering increased flexibility & remote access to Teaching & Learning software Documented designs & processes for new & existing services within Colleague & Student computing Stronger links between IT Services and the Teaching and … our core systems. Improved release management & data obfuscation technologies & processes. Robust guidelines, standards and governance Delivering a PrivilegedAccessManagement (PAM) solution to secure and manage privileged accounts, reducing attack surface, preventing unauthorized access, aligned to industry best practice. More ❯