alignment of IAG solutions with business objectives, security policies, and regulatory requirements. Solution Development: Lead the development and deployment of IAG solutions, including role-basedaccesscontrol (RBAC), attribute-basedaccesscontrol (ABAC), and privilege management. Design workflows for user provisioning, de-provisioning, access requests More ❯
Reading, England, United Kingdom Hybrid / WFH Options
idibu
of Active Directory (AD) , including both on-prem and Azure AD. Oversee the support of accesscontrol policies, user lifecycle management, and Role-BasedAccessControl (RBAC) . Drive automation of AD processes (e.g., onboarding, offboarding, and permissions management). Implement and ensure compliance with Group Policy Objects (GPOs) and More ❯
Knowledge Skills and Abilities, Key Responsibilities: Design, implement, and manage IAM systems and solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA) and role-basedaccesscontrol (RBAC). Configure and maintain identity and access management tools. Work with IT and security teams to define and enforce securityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Xcede
Collaborate with security, compliance, and IT teams to ensure alignment with organisational policies. Support multi-factor authentication (MFA), Privileged Identity Management (PIM), and role-basedaccesscontrol (RBAC). Troubleshoot complex identity and access issues across hybrid and cloud environments. Maintain documentation and provide training to internal teams on IAM More ❯
Knowledge Skills and Abilities, Key Responsibilities: Design, implement, and manage IAM systems and solutions, including Single Sign-On (SSO), Multi-Factor Authentication (MFA) and role-basedaccesscontrol (RBAC). Configure and maintain identity and access management tools. Work with IT and security teams to define and enforce securityMore ❯
NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs More ❯
NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
NIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM, SSO, Key and Secrets Management, JML, Attestation, RBAC, Identity Governance, Hybrid Cloud Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs More ❯
Wolverhampton, England, United Kingdom Hybrid / WFH Options
DIB BVBA Heliowatt
design and implementation of secure cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group Information Security (GIS) to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Apache Associates
modern DevOps practices. Preferred Qualifications: SC Cleared - current and valid Okta certifications and/or hands-on experience with Okta's FedRAMP offerings. Experience with identity governance, SSO, MFA, RBAC, and federated identity systems. Familiarity with security best practices and compliance frameworks (e.g., FedRAMP, NIST) ** Outside IR35 role ** 6 month duration - 100% Remote Due to the More ❯
Chatham, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
design and implementation of secure cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group Information Security (GIS) to More ❯
Wolverhampton, Bushbury, West Midlands (County), United Kingdom Hybrid / WFH Options
Tilt Recruitment
design and implementation of secure cloud services (primarily Azure) within a self-service model. Acting as the cloud security SME, embedding security principles across compute, storage, networking, RBAC, and containerised environments. Building scalable, compliant solutions using Security-as-Code, Terraform, and native cloud tooling. Collaborating closely with delivery teams and representing Group Information Security (GIS) to More ❯
following skills are required for the infrastructure engineers: VMware Infrastructure Design and deployment of large-scale Vmware environments Configuration and management of ESXi, vCenter, vSAN, and NSX Implementation of RBAC for Vmware accesscontrol High availability, disaster recovery, and backup strategies Operating Systems Deployment, configuration, and management of Linux (various distributions) Windows Server setup, including Active Directory, DNS … pipeline integration for infrastructure deployment Containerisation & Orchestration Deploying and managing services in Docker or Kubernetes Integration with VMware environments Access Management & SecurityRole-BasedAccessControl (RBAC) for secure user access Managing permissions within VMware, Windows, and Linux environments Desirable Building complex network solutions (routing, VLANs, firewalls, VPNs) Connectivity More ❯
Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). • Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. • System More ❯
Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). • Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. • System More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
requirements ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. System More ❯
Gillingham, Brompton, Medway, Kent, United Kingdom Hybrid / WFH Options
Tilt Recruitment
This means shaping the architecture and security standards from the ground up. As the cloud security expert, you’ll embed security principles across compute, storage, networking, RBAC and containerised environments. You’ll build scalable, compliant solutions using Security-as-Code, Terraform and native cloud tooling. Working closely with delivery teams, you’ll ensure security is More ❯
requirements ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. System More ❯
requirements ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-basedaccesscontrol (RBAC). Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. System More ❯
web security, VPC segmentation, and automated vulnerability scanning. Container Security & Orchestration: Expertise in Docker, ECS, EKS, Kubernetes, implementing security best practices like image vulnerability scanning, Kubernetes RBAC, IAM Roles for Service Accounts (IRSA), Pod Security Policies, and automated compliance enforcement. Infrastructure Automation & Security: Strong experience in IaC tools (Terraform, CloudFormation, Ansible), applying least privilege IAM … policies, role-basedaccess controls (RBAC), automated compliance checks, and zero-trust security principles. Monitoring, Logging & Alerting: Expertise in building centralized logging solutions, integrating ELK Stack, Prometheus, Grafana, Splunk, and AWS-native security monitoring tools such as CloudWatch, Security Hub, SIEM integrations. CI/CD Security & Automation: Proficient in More ❯
but are not limited to): Drive the technical implementation and continuous optimization of identity services, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Role-BasedAccessControl (RBAC) and Fine Grain Authorization (FGA). Design and integrate authentication solutions using protocols such as SAML, OAuth2, OpenID Connect, and SCIM with tools More ❯
London, England, United Kingdom Hybrid / WFH Options
Endava
engineers and enforce best practices (version control, CI/CD for data pipelines). Participate in technical presales activities and client engagement initiatives. Governance & Compliance Apply robust security measures (RBAC, encryption) and ensure regulatory compliance (GDPR). Document data lineage and recommend improvements for data ownership and stewardship. Qualifications Programming: Python, SQL, Scala, Java. Big Data: Apache Spark … Architectural Competencies Data Modelling: Designing dimensional, relational, and hierarchical data models. Scalability & Performance: Building fault-tolerant, highly available data architectures. Security & Compliance: Enforcing role-basedaccesscontrol (RBAC), encryption, and auditing. Additional Information Discover some of the global benefits that empower our people to become the best version of themselves: Finance More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
or medium scale experience in designing Infrastructure-as-Code. Good knowledge of configuration, implementation and management of different Azure networking. Implement and manage Azure role-basedaccesscontrol (RBAC) & Azure resource manager with Azure tag. Excellent communication skills with strong analytical skills and organizational skills. Experience with VMWARE environment, vSphere, vCenter, NSXT More ❯
Typescript, Node.js, React), cloud platforms (AWS, Azure, GCP, Oracle), Kubernetes and IaC with Terraform Strong grasp of data privacy and security frameworks, including role-basedaccesscontrol (RBAC), encryption at rest and in transit, secure API design, and identity/auth protocols (e.g., OAuth2, OpenID) Outstanding communication and collaboration skills, capable More ❯