s critical information and relevant information systems, assuring the integrity, availability, authentication, confidentiality and non-repudiation. As well as the protection of information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Role Responsibilities Key responsibilities for this role may include: Lead and Manage all … the completion of IT Health Checks (ITHC) Co-ordinate and support with MOD and other authority assurance activities To support the Development and maintenance of our Information Security Management System (ISMS) to best support the Company's activities, including Risk Managementand Accreditation Document Sets (RMADS) and Company Security Policies. To examine any risks to the … Design policy and process. Deep technical expertise in security technologies and solutions, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, encryption, identityandaccessmanagement (IAM), and security information and event management (SIEM) systems. Strong understanding of security frameworks, standards, and regulations, including ISO 27001, NIST Cybersecurity Framework More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records … in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems. What You'll Do: As a Security … Content Creation: Lead and execute the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction & Decision Making: Provide guidance to More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE … Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for IdentityandAccessManagementand Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate … Speciality • ISO27001 Lead Implementor • Strong knowledge of cloud and on-premises technology environments, including information security, physical security solutions. • Financial Industry regulations (UK and Europe) • Excellent leadership and team management skills. • Strong problem-solving skills with the ability to make sound decisions in emergency situations. • Excellent communication skills with the ability to explain complex security issues to non More ❯
Role: IdentityandAccessManagement (IAM) Engineer Location: Northampton, UK (2 - 3 days onsite a week) Job Type: Contract Role Overview: We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM … . In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de … Manager). • Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). • Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. • Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. • Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Your new company Join a global financial powerhouse at the forefront of innovation in IdentityandAccessManagement (IAM). This is a rare opportunity to be part of a greenfield build within the Corporate & Investment Bank (CIB) division, developing a next-generation IAM platform that underpins secure access to critical services More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement : Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business : Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Years . Key Responsibilities: Active Directory Migration: Lead the planning, design, and execution of the Active Directory migration project, ensuring minimal disruption to business operations. IdentityandAccessManagement (IAM): Review and optimise existing Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS) to ensure secure, resilient and efficient access management. Manage and optimize Entra ID for identityandaccessmanagement, including hybrid identity scenarios. Conditional AccessManagement: Define and implement Conditional Access policies to secure access to resources based on real-time risk assessments. Collaborate with security teams to ensure alignment … third-party systems. Windows Hello for Business: Manage Windows Hello for Business to provide secure, passwordless authentication for users Required Skills & Experience : Good experience in identityandaccessmanagement, with a focus on Active Directory and related technologies. Proven experience managing and executing Active Directory migration projects. Expertise in Active Directory Domain Services (AD More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
Entra (formerly Azure Active Directory) to join our IT Infrastructure team. The ideal candidate will play a critical role in architecting, deploying, and maintaining secure identityandaccess solutions, enabling seamless and secure user experiences across our cloud and hybrid environments. Key Responsibilities: Design, implement, and manage solutions built on Microsoft Entra, including Entra ID (Azure … Collaborate with security and compliance teams to ensure adherence to regulatory and organizational identity standards. Provide Tier 3 support and troubleshooting for complex identityandaccess issues. Lead or support migration efforts from legacy identity platforms to Microsoft Entra. Contribute to the development of automation and Infrastructure-as-Code (IaC) for identity … and governance using tools like PowerShell, Bicep, or Terraform. Requirements: Essential: 3-5+ years of experience in infrastructure engineering, with a strong focus on identityandaccessmanagement (IAM). Previous experience within a similar scale organisation (10k+ colleagues). Ideally retail, but not essential. Deep expertise in Microsoft Entra/Azure Active More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing … to global resources and top-tier engineering talent, you'll be empowered to solve challenging problems and make a meaningful impact. Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing will contribute to delivering secure, resilient, and high-quality solutions that drive real business impact. In this role, you'll tackle complex, mission-critical problems while leveraging cutting-edge technologies and modern engineering practices. You'll More ❯
Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing … to global resources and top-tier engineering talent, you'll be empowered to solve challenging problems and make a meaningful impact. Senior Software Engineer - IdentityandAccessManagement As a seasoned Software Engineer, you'll play a key role on a team of innovators and technologists shaping the future of identityandaccessmanagement (IAM). Your deep technical expertise and passion for design, analytics, development, coding, and testing will contribute to delivering secure, resilient, and high-quality solutions that drive real business impact. In this role, you'll tackle complex, mission-critical problems while leveraging cutting-edge technologies and modern engineering practices. You'll More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
with their offices around the world to support cyber security initiatives. The successful candidate will possess strong analytical skills, an understanding of security administration, risk managementandidentityaccessmanagement solutions. The main focus of the role will include: Performance of system security administration on designated technology platforms in accordance with the … action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Collating security incident and event data to produce monthly exception andmanagement reports Reporting unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes Developing and maintains documentation for security systems and procedures Responding to and … succeed in this role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment andmanagement, threat and vulnerability management, incident response, andidentityandaccessmanagement Experience in developing, documenting and maintaining security procedures Knowledge More ❯
in several of the following technologies: Infrastructure as Code (IaC) tools: ARM templates, Azure Bicep Azure DevOps (ADO) and YAML Pipeline Logic Apps, Function Apps, Service Bus API Management Services (APIM) and APIs App Services, User Managed Identity Certificate managementand renewal App Registration, Managed Identities, Key Vault, Storage Account Azure networking core components … subnets, NSG, Routing Azure Monitoring: Log Analytics Workspace (LAW), Application Insights (App Analytics) Scripting languages: PowerShell, Python, Bash Knowledge of Azure Security: Defender for Cloud, identityandaccessmanagement (IAM), network security groups (NSGs), and encryption best practices. Branching strategies Continuous integration, deployment, delivery, and testing Modern DevSecOps and GitOps practices Monitoring and alerting More ❯
and analyse performance metrics to support security troubleshooting and continuous improvement. Identity & AccessManagement Provide expert technical leadership for identityandaccessmanagement, ensuring secure, high-performing services aligned with SLAs. Oversee day-to-day monitoring and maintenance of identity services, ensuring reliability and user demand …/processes in line with ITSM best practices. Maintain and review operational documentation and processes for effectiveness and efficiency. Continuous Improvement & Innovation Design and implement long-term security andaccessmanagement capabilities. Analyse complex technical data to inform strategy, policy, and decision-making. Stay informed on internal and external developments, assessing their impact on digital services. … Key Requirements Core Skills Strong leadership in security andidentity technologies, including M365. Effective prioritisation and problem-solving across complex systems. Proven experience managing teams and delivering complex projects. Excellent collaboration and communication across technical and non-technical teams. Qualifications Degree or equivalent industry certification. Professional certification in security/identity (e.g. CREST, GIAC). ITIL More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
AWD Online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
with API Gateway technologies (e.g., Kong, Apigee, AWS API Gateway) to enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile … architecting and deploying microservices-based systems in complex enterprise environments. • Hands-on experience with API Gateways (Kong, Apigee, or AWS API Gateway) and secure API development. • Working knowledge of IDAM platforms like Ping Identity, Auth0, or Okta. • Work closely with mobile app teams to ensure backend services are optimized for mobile/web delivery. • Experience working in banking More ❯
with API Gateway technologies (e.g., Kong, Apigee, AWS API Gateway) to enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile … architecting and deploying microservices-based systems in complex enterprise environments. • Hands-on experience with API Gateways (Kong, Apigee, or AWS API Gateway) and secure API development. • Working knowledge of IDAM platforms like Ping Identity, Auth0, or Okta. • Work closely with mobile app teams to ensure backend services are optimized for mobile/web delivery. • Experience working in banking More ❯
from servers and networks to storage and endpoint solutions. Working as the Senior Infrastructure Engineer/Network Support Technician youll lead on project workstreams, contribute to critical incident management, and be a go-to expert for more complex technical challenges. Your insight and experience will help shape the way the organisation deliver services to their colleagues and ultimately … or similar) or equivalent experience. Youll have hands-on experience managing cloud and hybrid systems, networks, storage and virtualised platforms, alongside solid knowledge of Microsoft 365, Azure, and endpoint management tools such as Intune. Youll also be a clear communicator and proactive problem solver, able to stay calm under pressure and comfortable working across multiple priorities. If you … in a multi-site environment Experience of virtualised Windows Server platforms and components i.e. Hyper-V, VMWare In depth understanding of Active Directory, Azure AD, IdentityandAccessManagement, account risk managementand role-based access tools Experience in deploying and managing network switches, WiFi, routers, firewall and network appliance More ❯
Bracknell, England, United Kingdom Hybrid / WFH Options
Lorien
technical stakeholders which will require comprehensive communication skills. Work collaboratively with with internal agile engineering teams Deliver value by ensuring quality, efficiency and cost effectiveness from all infrastructure management contracts. Manage suppliers and vendors to ensure Infrastructure Platforms remain secure, stable, robust and performant by delivering and maintaining end to end Operational Excellence Ensure that the services provided … Hosted Service principles, along with proven experience of how these technologies support an enterprise business. Proven experience of managing high value third party contracts delivered predominantly offshore, and having budgetary management skills, understanding of contract penalties and experience with service renewals and supporting processes The ability to work in a time-sensitive situation in a busy environment, with … the following skills and experience: Data Centre Hosting - Virtualisation (VMware | GCVE) Data Centre Storage - SDS, and NAS, and SAN Operating Systems - Wintel, Linux Active Directory | IdentityandAccessManagement | PAM Sever Configuration and Patch Management (SCCM) If this role is of interest to you and you meet the criteria's, please apply More ❯
Your new company Join a global financial powerhouse at the forefront of innovation in IdentityandAccessManagement (IAM). This is a rare opportunity to be part of a greenfield build within the Corporate & Investment Bank (CIB) division, developing a next-generation IAM platform that underpins secure access to critical services More ❯
Your new company Join a global financial powerhouse at the forefront of innovation in IdentityandAccessManagement (IAM). This is a rare opportunity to be part of a greenfield build within the Corporate & Investment Bank (CIB) division, developing a next-generation IAM platform that underpins secure access to critical services More ❯
Employment Type: Contract
Rate: £500 - £700/day Day Rate Contract | 6 months
and partners, providing collective experience from across the AWS customer base and are obsessed with helping our customers succeed. We collaborate across the entire AWS organisation to bring access to product and service teams, to get the right solution delivered and drive feature innovation based upon customer needs. This is a customer facing role. You will be required … more sensitive workloads to AWS. You're an expert in operating within an enterprise security program and developing a security model in the AWS cloud - identityandaccessmanagement, logging and monitoring, infrastructure security, data protection, and incident response. Delivery - As a consultant you will often go on-site to customers to deliver projects … of enterprise risk management methods and techniques to drive successful outcomes in complex public sector or highly regulated organisations - Significant experience in IT security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and/or hybrid scenarios - Understanding architectural implications of meeting More ❯