to support evolving user and business needs. Required Skills: • Strong, proven experience in Identity and Access Management architecture. • Expertise in identity governance, including RBAC and access provisioning. • Deep knowledge of IAM standards and best practices. • Hands-on experience with MS Windows Enterprise technologies and PowerShell scripting. • Ability to More ❯
Develop and maintain documentation for IdAM, experience in creating HLD/LLD's. Experience working with identity governance including Rolebasedaccesscontrol, access requests. Knowledge of key IdAM standards. Providing specialised expertise on IdAM tools and their integration within client More ❯
Basingstoke, Hampshire, South East, United Kingdom
CBSbutler Holdings Limited
Develop and maintain documentation for IdAM, experience in creating HLD/LLD's. Experience working with identity governance including Rolebasedaccesscontrol, access requests. Knowledge of key IdAM standards. Providing specialised expertise on IdAM tools and their integration within client More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using More ❯
essential governance features such as metrics tracking, audit logs, security measures and role-basedaccess controls (RBAC), to ensure compliance, transparency and enterprise readiness across AI systems. Holistic Thinking: Think critically about the interactions between AI models and product components to ensure More ❯
Python, SQL, and Scala for data processing. Strong understanding of Azure networking, security, and IAM , including Azure Private Link, VNETs, Managed Identities, and RBAC . Deep knowledge of enterprise-scale data architecture patterns , including Lakehouse, Medallion Architecture, and hub-and-spoke models . Strong problem-solving skills and ability More ❯
the business Required skills and experience: Strong knowledge of at least one Public Cloud provider: Azure, AWS or GCP (Managed Kubernetes offering, Compute, Networking, RBAC/IAM) Prior experience in Linux system administration in a production environment Prior experience in provisioning and operating Kubernetes clusters in a production environment Experience More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
KPMG UK
ID General knowledge across multiple IAM domains, with in-depth experience across two or more specific domains from: Enterprise identity, including provisioning, JML, certification, RBAC, entitlement management, policy management, data access governance, identity analytics; Customer IAM (CIAM), including registration, customer experience, authentication, multi-channel, privacy; Access management, including More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Nottingham Building Society
Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security Principles: Ensure segregation of duties and More ❯
Work closely with the Head of Information Security. Leadership: Lead the enterprise-wide IGA strategy and operations. User Management : Oversee user provisioning, de-provisioning, RBAC, access reviews, and certifications. Implementation: Implement and maintain IGA solutions (e.g., SailPoint, Saviynt, One Identity). Security Principles: Ensure segregation of duties and More ❯
based on the level of database access the user/groups require - Individual/Group/Rolebased (Security). Knowledge of cross connectivity to various data sources - SQL Server/Oracle/Access/Informix/Azure More ❯
services like Azure Data Factory , Azure Data Lake , or Azure Synapse . Understanding of Azure’s security and identity management practices (e.g., IAM, RBAC). Snowflake Data Warehouse Experience : Designing and optimizing Snowflake schemas for efficient querying. Implementing ETL/ELT pipelines to load and transform data in Snowflake. More ❯
and authorization layers. Lead IAM architecture design reviews, security assessments, and technical integrations. Develop and enforce policies for role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC), and just-in-time (JIT) access. Support certificate More ❯
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging More ❯
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting More ❯
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging More ❯
cyber security principles and architecture points Boundary controls, network segmentation and accesscontrol Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA Cryptographic techniques and implementations IT asset management and tracking Vulnerability Management and Patching SIEM principles, products and supporting More ❯
services and REST APIs Experience in mentoring, serving as a tech lead, or leading an engineering team Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require 5+ years of software development experience 2+ years of experience contributing to the system design More ❯
At least two years of hands-on production experience on Linux, OpenShift Good knowledge on Linux, Kubernetes and OpenShift Rolebasedaccesscontrol in relation to OpenShift roles and SCC's Good troubleshooting skills on OpenShift and Kubernetes Good troubleshooting skills in More ❯
is a plus. Deep and proven technical knowledge in Risk/Fraud and Identity and Access technologies - SSO, SAML Federated Identity, OAuth, OIDC, RBAC, REST APIs, Certificates and Management (trust chain), Identity Orchestration, WebAuthn (FIDO2 Passkeys). Technical awareness of AWS, Azure, GCP cloud architectures and OpenShift and Kubernetes More ❯
Certification with CKA or CKAD is a plus! Demonstrable experience with the following security principles and technologies: SSH, PKI, 2FA, SSO (SAML, OIDC), RBAC Exceptional hands-on software troubleshooting, testing, and debugging skills with a tenacity to identify and resolve the technical issue that may arise Outstanding soft skills More ❯
Experience & Skills: Extensive hands-on experience with Microsoft Azure in a production environment. Strong knowledge of Entra ID (Azure Active Directory) including group policies, RBAC, and identity management. Expertise in VMware (ESXi, vCenter) for managing virtual machines. Solid background in Windows Server administration and support (2016/2019/ More ❯