and execute the organisation’s Identity & AccessManagement (IDAM) strategy to improve employee experience, productivity, and cyber resilience Lead the selection, implementation, and optimisation of IDAM technology solutions, ensuring seamless integration with existing systems and infrastructure Drive and deliver a major transformation programme focused on modernising identityandaccessmanagement … lifecycle of the IDAM Product, including budget management, change control, and obsolescence planning Ensure compliance with all relevant regulations and cyber standards, maintaining a robust and secure identity environment You’ll also have people management responsibilities in this role and will be directly hiring a number of key roles … to support programme execution Your skills and experiences: Essential: Significant experience of working in an IT Function within a complex environment Significant experience of managing identityandaccessmanagement in a relevant field Experience with enhancing and developing technical capability which will be applied across a range of large, complex, high value and strategically More ❯
enhance its Zero Trust Architecture, drive standardization initiatives, and support a multi-cloud, geo-distributed workforce. The ideal candidate will have hands-on experience with identityandaccessmanagement (IAM), securing cloud environments, particularly within the Microsoft ecosystem, and deep expertise in Azure Entra ID. A strong understanding of IT security best practices, regulatory … security best practices into CI/CD pipelines. We're excited if you have Strong analytical skills and attention to detail, with the ability to troubleshoot complex infrastructure andidentity-related issues. Excellent communication skills, with the ability to clearly explain technical concepts to both technical and non-technical stakeholders. 5+ years of hands-on experience with identityandaccessmanagementand securing cloud technologies, particularly within the Microsoft ecosystem. Advanced knowledge of Azure Single Sign-On (SSO) login methods including OAuth2, OpenID Connect, and SAML, and their integration with enterprise applications Experience onboarding and managing enterprise applications in Azure Entra ID Deep experience with Microsoft Entra ID, including Conditional AccessMore ❯
to accessing the Trust IT Applications. This includes secure password management, ensuring access is granted, modified, or withdrawn in line with service requests, and that access controls are in place to protect patient and staff data. In addition to overseeing these activities, the Supervisor will also be actively involved in carrying out the day … supporting information systems and accurately applying and maintaining access controls. Evidence of writing and implementing operational process/procedures Familiarity with access control systems andidentitymanagement protocols Desirable Administration of a Health Information Systems NHS experience Administering access to SaaS/Office 365 products Management of NHS … supervisory skills with the ability to guide a team in delivering secure and efficient IT system access services Knowledge of IT system administration processes, security practices, andaccess control policies Excellent communication skills to interact with staff across various departments and ensure effective collaboration Detail-oriented with a focus on accuracy, compliance, and documentation Problem-solving More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Networker Global Limited
the Cloud. We are looking for high quality candidates with significant experience and proven technical depth within SSH key management, cryptography, and the IdentityandAccessManagement space, including: Design and implement secure SSH key management solutions for large scale hybrid (on-prem, Cloud) environments. Expertise in cryptographic risk management … access reconfiguration and operational handover. Deep expertise in Identityandaccessmanagement, Privileged accessmanagementand secure access solutions (machine-to-machine and human-to-machine) Knowledge/understanding of hardware security modules (HSMs) for storing cryptographic keys securely, including integration with enterprise applications for key … Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation Present publications at technical design authorities for input, feedback, and approval Risk and Dependency Management: Effectively manages and escalates both technical and project risks or issues Articulates solutions and remediation steps to technical risks & issues Ability to map design decisions to resultant technical More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
standards. Access Control Implementation: Define and enforce role-based and attribute-based access controls (RBAC/ABAC) across data platforms, ensuring least privilege and zero standing access principles are applied. Lifecycle Management: Oversee provisioning, modification, and de-provisioning of user access in response to joiner, mover, and leaver events, integrating … the way we meet the ever-changing needs of our 26 million customers. We're growing with purpose. What you'll need: Proven experience in identityandaccessmanagement (IAM), preferably in a cloud-first or hybrid environment. Understanding of data protection principles, including GDPR, and their application in access governance. Familiarity … Locations time type Full time posted on Posted Yesterday time left to apply End Date: August 28, 2025 (20 days left to apply) Head of IdentityandAccessManagement Operations locations 5 Locations time type Full time posted on Posted 16 Days Ago time left to apply End Date: August 9, 2025 (1 day More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
Business Analyst – Identity & AccessManagement (IAM) Migration Programme Location: Sheffield (Hybrid working model, 3 days in the office) Contract Duration: 6 Months, Initially Job Type: Contract Start Date: October 2025 Interview Schedule: Interviews will be conducted in September We are seeking three experienced Business Analysts to join a strategic migration project for a prestigious … client. This role involves transitioning from legacy identity systems to a unified platform, enhancing cybersecurity and operational efficiency. Day-to-Day Responsibilities: Lead end-to-end requirements gathering for the migration from SailPoint IIQ and SAP IDM to SailPoint Identity Security Cloud (ISC). Conduct thorough stakeholder analysis and engagement to uncover undocumented users, processes, and … and data flows. Translate business needs into high-quality, testable requirements and develop corresponding test cases. Work autonomously to advance analysis and support the testing lifecycle. Facilitate change management by helping stakeholders understand the benefits and strategic goals of the migration. Required Skills & Qualifications: Extensive business analysis experience in complex enterprise environments. Demonstrated ability to produce detailed, testable More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oliver James
IDAM Solution … Architect - Outside IR35 - London - Financial Services/Insurance We're working with a leading financial services and insurance client who are looking for an experienced IdentityandAccessManagement (IDAM) Solution Architect to join them on a long-term Outside IR35 contract. This is a hybrid role, with 1-2 days a week onsite … You'll work closely with stakeholders, technical teams, and vendors to ensure solutions meet business needs and align with security best practices. Key Experience: Strong background in IAM/IDAM architecture and delivery. Understanding of accessmanagement, identity lifecycle, and governance. Experience with application onboarding and migration. Exposure to hybrid and multi-cloud environments. More ❯
Job title: Data Products Access Governance Manager Location: Leeds, Bristol or Edinburgh Salary: Pay Group 4E Hours: Full time Working Pattern: Our work style is hybrid, which involves spending at least two days per week, or 40% of our time, at one of our office sites. About this opportunity: We're looking for a dynamic, motivated, forward-thinking … standards. Access Control Implementation: Define and enforce role-based and attribute-based access controls (RBAC/ABAC) across data platforms, ensuring least privilege and zero standing access principles are applied. Lifecycle Management: Oversee provisioning, modification, and de-provisioning of user access in response to joiner, mover, and leaver events, integrating … training materials and guidance to promote awareness of accessmanagement responsibilities across the organisation. What you'll need: Proven experience in identityandaccessmanagement (IAM), preferably in a cloud-first or hybrid environment. Understanding of data protection principles, including GDPR, and their application in access governance. Familiarity More ❯
the team. Reporting to the Head of IT Security, the Security Access Analyst role is integral to the managementand integrity of network and system access within the group. You will be responsible for ensuring that access rights are granted according to role-based access control (RBAC) principles and are … and adjustments under guidance Assist in utilising automated tools or mechanisms to facilitate periodic access reviews within specific operational domains Aid in defining RBAC roles, permissions, andaccess levels aligned with business needs The ideal candidate for the role of Security Access Analyst will have: A Level or higher qualification in Computer Science, Information … increasing responsibility Possess an analytical mind-set, enabling the assessment of security risks and formulation of appropriate mitigation strategies Knowledge of accessmanagement solutions andidentitymanagement protocols Good analytical skills to interpret access data and identify security risks Awareness of regulatory requirements affecting access controls, such as More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
VE3
a remote position. SailPoint Solution Architect Role Overview The SailPoint Solution Architect will provide strategic leadership, enterprise architecture, and security governance for the organisation's IdentityandAccessManagement (IdAM) transformation, with SailPoint IdentityNow as the central platform. This role combines solution architecture and security architecture responsibilities - ensuring that SailPoint deployments are secure, compliant … SailPoint with security solutions such as Privileged AccessManagement (PAM) for enhanced access control. Define RBAC models, identity lifecycle processes, andaccess governance standards. 3. Security Architecture & Compliance Lead security-by-design for all SailPoint deployments. Conduct threat modelling , risk assessments , and security impact analyses for IAM solutions. Establish and … tools (e.g., DUO Security). Strong understanding of IAM security architecture, governance, and compliance frameworks (GDPR, ISO 27001, WCAG 2.2). Skilled in threat modelling, risk assessment, and vulnerability management for IAM systems. Good-to-Have Skills Experience in higher education or public sector environments. Familiarity with other IAM platforms, directory services, and security tooling. Knowledge of cloud More ❯
super guarantee. 25% off UWA full fee courses, discounted health insurance, and convenient on-campus childcare options. Incremental progression based on 12 months continuous service. IdentityandAccessManagement Engineer Job no: 520877 Work type: Full Time Location: Crawley Categories: Information Technology Develop secure, automated identity solutions to support UWA's digital … plus 17% superannuation. About the area UWA IT enables excellence in teaching, learning, research, and operations by delivering reliable, secure digital services and platforms. The IdentityandAccessManagement (IAM) function supports robust security and user experience through lifecycle governance, access automation, and risk-based access About the opportunity Support … access governance and role engineering, enabling effective access policies and compliance. Collaborate with cybersecurity and IT teams to refine access controls, policies, andidentity data reporting. About you Experience configuring identity governance systems, including Saviynt or similar. Strong scripting and automation skills (e.g., PowerShell, Python, SQL). Knowledge of hybrid More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
changes in cybersecurity and IAM improvements in technologies. Build and maintain methodology and technology used to implement Identity Governance and Administration (IGA) andIdentityandAccessManagement (IAM) systems including SSO. MFA, Provisioning/Reconciliation, Federations, Access reviews. In-depth knowledge of multifactor authentication (MFA) architectures, Role-based Access … of a team when required. Work collaboratively within Infrastructure Services and other IT functions to ensure effective managementand delivery of Security andIdentityandAccessManagement services. Provide a clear documentation for services and projects. You will need to demonstrate the following skills and experience; Minimum of 3 years of experience … in IT/Cyber Security roles. Microsoft Security Stack experience, i.e, Entra ID, Defender Suite or Sentinel, Azure Security. Good understanding of Microsoft identityandaccessmanagement (IAM) concepts and technologies, including EntraID and MFA. Experienced with Zero Trust Security. Experience with security frameworks and standards such as CyberEssentials Plus. Microsoft Azure experience. Experience More ❯
Wokingham, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Contract Day Rate: £500 - 515 Inside IR35 About the Role We are seeking an experienced JML Solution Architect to design and implement a robust solution for managing employee access rights throughout the Joiner, Mover, and Leaver (JML) lifecycle. This role is critical in ensuring secure, efficient, and compliant accessmanagement across the organization. The … will integrate multiple data sources, automate workflows, and provide actionable insights to support decision-making and stakeholder engagement. Key Responsibilities Design and architect solutions for JML processes within Identity & AccessManagement (IAM). Integrate HR systems (e.g., Workday, ServiceNow HRSD) with accessmanagement workflows. Develop scalable, secure, and automated solutions … Proven experience as a Solution Architect designing enterprise-level systems. Experience creating dashboards and data visualizations. Excellent communication skills, both written and verbal. Strong analytical, problem-solving, and project management abilities. Desirable Skills & Experience Experience leading technical teams. Experience with monitoring and analysis tools. Previous work in identity, access, or security-focused architecture. Esther More ❯
SASE. support and supervise two mid-level IT infrastructure engineers, helping them grow professionally. drive automation and Infrastructure as Code (IaC) initiatives, leveraging tools like Terraform for configuration managementand continuous integration/continuous deployment (CI/CD). develop and maintain helpful applications and scripts (PowerShell, Bash, Terraform and Python) to automate manual processes and improve efficiency. … define Solutions, Architectural Standards and Controls Ownership serve as an escalation point and architectural owner for all internal technology platforms.Support the wider team's Implementation of mass deployment andmanagement strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous … IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in designing, implementing, maintaining, and supporting IdentityandAccessManagement (IAM) solutions (e.g. Azure AD, Okta, Google Workspace). capable of leading the lifecycle of Privileged AccessManagement (PAM) solutions, including More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Reed Professional Services
Business Analyst – Identity & AccessManagement (IAM) Migration Programme Location: Sheffield (Hybrid working model, 3 days in the office) Contract Duration: 6 Months, Initially Job Type: Contract Start Date: October 2025 Interview Schedule: Interviews will be conducted in September We are seeking three experienced Business Analysts to join a strategic migration project for a prestigious … client. This role involves transitioning from legacy identity systems to a unified platform, enhancing cybersecurity and operational efficiency. Day-to-Day Responsibilities: Lead end-to-end requirements gathering for the migration from SailPoint IIQ and SAP IDM to SailPoint Identity Security Cloud (ISC). Conduct thorough stakeholder analysis and engagement to uncover undocumented users, processes, and … and data flows. Translate business needs into high-quality, testable requirements and develop corresponding test cases. Work autonomously to advance analysis and support the testing lifecycle. Facilitate change management by helping stakeholders understand the benefits and strategic goals of the migration. Required Skills & Qualifications: Extensive business analysis experience in complex enterprise environments. Demonstrated ability to produce detailed, testable More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Reed Professional Services
Business Analyst – Identity & AccessManagement (IAM) Migration Programme Location: Sheffield (Hybrid working model, 3 days in the office) Contract Duration: 6 Months, Initially Job Type: Contract Start Date: October 2025 Interview Schedule: Interviews will be conducted in September We are seeking three experienced Business Analysts to join a strategic migration project for a prestigious … client. This role involves transitioning from legacy identity systems to a unified platform, enhancing cybersecurity and operational efficiency. Day-to-Day Responsibilities: Lead end-to-end requirements gathering for the migration from SailPoint IIQ and SAP IDM to SailPoint Identity Security Cloud (ISC). Conduct thorough stakeholder analysis and engagement to uncover undocumented users, processes, and … and data flows. Translate business needs into high-quality, testable requirements and develop corresponding test cases. Work autonomously to advance analysis and support the testing lifecycle. Facilitate change management by helping stakeholders understand the benefits and strategic goals of the migration. Required Skills & Qualifications: Extensive business analysis experience in complex enterprise environments. Demonstrated ability to produce detailed, testable More ❯
Cheltenham, Gloucestershire, England, United Kingdom
Lorien
IDAM Engineer - Contract Location: Cheltenham We're supporting a government client in strengthening their IdentityandAccessManagement (IDAM) capabilities and seeking an experienced IDAM Engineer to join the Live Services team. You … ll help maintain and monitor key identity infrastructure, support project delivery, and drive continuous service improvement. Key Responsibilities: Provide 2nd/3rd line support for Active Directory andIDAM solutions. Support privileged accessmanagementand certificate-based authentication. Collaborate with support and project teams to implement changes. Monitor system health, respond to incidents, and … Manager. Excellent communication and stakeholder engagement skills. ITIL or service management qualifications (desirable). If you're a proactive engineer with a passion for secure infrastructure andidentity services, apply now to join a high-performing team. Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy. More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
Engineer to join their IT Infrastructure team. This is an exciting opportunity to work in a complex hybrid environment, supporting and evolving enterprise-scale identityandaccessmanagement (IAM) solutions using Microsoft Entra ID (formerly Azure AD) and related Microsoft 365 technologies. You'll act as a subject matter expert (SME) for identity … practices in access control, authentication, and governance. Key Responsibilities Provide third-line support for IAM systems across hybrid cloud environments. Lead on the technical design and implementation of identity solutions. Monitor, identify, and resolve security risks and operational incidents. Improve the organisation's security posture through configuration of Microsoft Secure Score, Conditional Access, and … PIM. Manage and migrate single sign-on (SSO) integrations for third-party business applications. Automate identity processes and configurations using PowerShell. Required Skills & Experience Proven experience managing hybrid identity environments with Active Directory and Microsoft Entra ID . Strong scripting abilities using PowerShell . Expertise in multi-factor authentication (MFA) , Conditional Access, self-service More ❯
Applications team. The ideal candidate will have deep expertise inOracle ERP and EPM products, strong proficiency incloud technologies and hands-on experience withGitHub,API integrations,IdentityandAccessManagement (IAM)includingSingle Sign-On (SSO). This role will be instrumental in designing, implementing and optimising enterprise solutions that support our business operations and strategic … APIs to integrate Oracle systems with internal and third-party applications, ensuring seamless data flow and interoperability. Implement IAM and SSO Solutions: Manage and implement IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions using tools like Azure AD, Okta, and Oracle Identity Cloud Service. Enhance DevOps and Automation: Establish … e.g., Planning, Financial Consolidation). Proficiency in developing and maintaining RESTful and SOAP APIs, with strong knowledge of JSON and XML. Hands-on experience with IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions, including Azure Active Directory, Okta, and Oracle Identity Cloud Service. Proven experience in designing and managing More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
ideal candidate will have deep expertise in Oracle ERP and EPM products, strong proficiency in cloud technologies and hands-on experience with GitHub, API integrations, IdentityandAccessManagement (IAM) including Single Sign-On (SSO). This role will be instrumental in designing, implementing and optimising enterprise solutions that support our business operations and … APIs to integrate Oracle systems with internal and third-party applications, ensuring seamless data flow and interoperability. Implement IAM and SSO Solutions: Manage and implement IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions using tools like Azure AD, Okta, and Oracle Identity Cloud Service. Enhance DevOps and Automation: Establish … eg, Planning, Financial Consolidation). Proficiency in developing and maintaining RESTful and SOAP APIs, with strong knowledge of JSON and XML. Hands-on experience with IdentityandAccessManagement (IAM) and Single Sign-On (SSO) solutions, including Azure Active Directory, Okta, and Oracle Identity Cloud Service. Proven experience in designing and managing More ❯
Job summary Bright and motivated individuals are required to join our ICT Operation section to take responsibility for accurately allocating and maintaining access to key Trust systems, to enable staff to perform their duties effectively and deliver care to patients. This is an exciting time to join our busy ICT department, who are fully focused on providing service … Management - Support Assistant performs routine administration tasks associated with accessing the Trust ICT Network and Systems. This includes secure password administration for providing, withdrawing and maintaining access in line with authorised service requests. Perform routine system administration tasks by following defined policy and procedures. Provide administration of designated information systems by following procedures Receive and … Educated to A-level standard (preferably at least one IT/IS related or Science based subject) Experience Essential Experience of supporting information systems and accurately applying and maintaining access controls. Evidence of writing and implementing operational process/procedures Desirable Administration of a Health Information Systems NHS experience Administering access to SaaS/N365/ More ❯
with the potential of extension Location - Hertforshire - 4-5 days a week onsite Responsibilities Lead the end-to-end delivery of multiple IAM-related projects (e.g., role-based access control, identity lifecycle management, privileged accessmanagement, SSO/MFA implementations). Define and manage project scopes, goals, milestones, deliverables, and … and consistency with organisational standards Oversee deployment and configuration activities, ensuring security and compliance are built into IAM implementations Key Skills Proven experience as Technical Project Manager within IdentityAccessManagement Strong knowledge of IAM principles, technologies and frameworks IAM deployment experience Strong technical acumen with the ability to engage confidently with engineers, architects More ❯
london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
Non-Human Identity Manager – Security-Led Transformation Sector: Financial Services, Government and other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & AccessManagement (IAM), Privileged AccessManagement (PAM), and modern DevOps practices to protect non-human identities at scale for a leading consultancy. If you thrive on tackling complex security challenges, enjoy working across traditional security and cutting-edge automation teams … and have a knack for designing elegant solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Entasis Partners
Non-Human Identity Manager – Security-Led Transformation Sector: Financial Services, Government and other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & AccessManagement (IAM), Privileged AccessManagement (PAM), and modern DevOps practices to protect non-human identities at scale for a leading consultancy. If you thrive on tackling complex security challenges, enjoy working across traditional security and cutting-edge automation teams … and have a knack for designing elegant solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
Non-Human Identity Manager – Security-Led Transformation Sector: Financial Services, Government and other sectors Location: London (Hybrid – Client Site & Home) In today’s cloud-first world, it’s not just people who need identities. Applications, microservices, APIs, containers all have credentials, secrets, and keys that must be secured. We’re looking for a Non-Human Identity Manager who can connect the dots between Identity & AccessManagement (IAM), Privileged AccessManagement (PAM), and modern DevOps practices to protect non-human identities at scale for a leading consultancy. If you thrive on tackling complex security challenges, enjoy working across traditional security and cutting-edge automation teams … and have a knack for designing elegant solutions, this role is for you. What You’ll Do as a Non-Human Identity Manager Design & Architect: Shape secure, scalable strategies for managing service accounts, application credentials, and secrets across hybrid environments (cloud + on-prem). Define the Rules: Help clients establish policies and lifecycle controls for non-human More ❯