Birmingham, West Midlands, England, United Kingdom
Proactive Appointments
IAM Specialist Inside IR35 - Hybrid We’re seeking an experienced IdentityandAccessManagement (IAM) Specialist to join a leading organisation in Birmingham on a contract basis. You’ll be responsible for enhancing and supporting the organisation’s IAM framework across cloud and on-prem environments, with a particular focus on Microsoft 365 and … of BeyondTrust privileged access management. Key Responsibilities Support the design, implementation, and ongoing optimisation of IAM solutions across enterprise systems. Manage user lifecycle processes — provisioning, deprovisioning, andaccess reviews. Configure and administer Microsoft Entra ID (Azure AD) and Active Directory . Implement and manage Microsoft Purview policies for Data Loss Prevention (DLP) and information labelling/… identityand compliance administration) Microsoft Purview DLP and labelling/classification Experience implementing or supporting BeyondTrust (PAM) is highly desirable. Excellent understanding of authentication, authorisation, RBAC, andidentity governance principles. Strong problem-solving and stakeholder engagement skills. IAM Specialist Due to the volume of applications received for positions, it will not be possible to respond to More ❯
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
london (city of london), south east england, united kingdom
Harrington Starr
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
Harrington Starr are seeking an Identity & AccessManagement - IAM/Privileged AccessManagement - PAM SME/Specialist to work for our global financial services client in London (city) This is a newly created role which is part of a huge investment in both accessmanagementand … the wider cyber security function. The role will provide an internal consulting function supporting more technical engineering teams in the identity arena. On a day to day basis the role will involve: Company-wide development of a holistic IAM and PAM strategy. Conceptual development, optimisation, and automation of authorisation management, as well as the development of … one will be considered, but must have some experience of both Knowledge of directory services and authentication methods Knowledge of of Zero Trust, Least Privilege, and Role-Based Access Control (RBAC) Experience of working with cyber security standards/frameworks in a regulated financial services (or similar) environment More ❯
Governance solutions like SailPoint, IBM, Oracle, etc. Partner with DevSecOps teams to embed IAM best practices into CI/CD pipelines, automating identity governance andaccess controls. Define and enforce security andidentity policies across cloud platforms. (AWS, Azure, GCP) Document system configurations, standards, and procedures in a centralized location. Support Incident … and affiliate businesses. Monitoring, collecting, analyzing and reporting of security metrics and indicators to ensure the proper operations of our regional systems and services. Regional security incident response andmanagement point of contact and drive incident postmortems to find the root cause and track action items to completion. Experience working with Service Management, Incident Management, and Change Management required. Qualifications and Skills: Education Bachelor's Degree (or equivalent work experience). At least five+ years of identityandaccessmanagement experience in IT and/or Information Security combined. Must-Have Skills Manage Identity Providers such Microsoft Entra (formerly AAD), Okta, Ping One More ❯
Governance solutions like SailPoint, IBM, Oracle, etc. Partner with DevSecOps teams to embed IAM best practices into CI/CD pipelines, automating identity governance andaccess controls. Define and enforce security andidentity policies across cloud platforms. (AWS, Azure, GCP) Document system configurations, standards, and procedures in a centralized location. Support Incident … and affiliate businesses. Monitoring, collecting, analyzing and reporting of security metrics and indicators to ensure the proper operations of our regional systems and services. Regional security incident response andmanagement point of contact and drive incident postmortems to find the root cause and track action items to completion. Experience working with Service Management, Incident Management, and Change Management required. Qualifications and Skills: Education Bachelor's Degree (or equivalent work experience). At least five+ years of identityandaccessmanagement experience in IT and/or Information Security combined. Must-Have Skills Manage Identity Providers such Microsoft Entra (formerly AAD), Okta, Ping One More ❯
london (city of london), south east england, united kingdom
Cantor Fitzgerald
Governance solutions like SailPoint, IBM, Oracle, etc. Partner with DevSecOps teams to embed IAM best practices into CI/CD pipelines, automating identity governance andaccess controls. Define and enforce security andidentity policies across cloud platforms. (AWS, Azure, GCP) Document system configurations, standards, and procedures in a centralized location. Support Incident … and affiliate businesses. Monitoring, collecting, analyzing and reporting of security metrics and indicators to ensure the proper operations of our regional systems and services. Regional security incident response andmanagement point of contact and drive incident postmortems to find the root cause and track action items to completion. Experience working with Service Management, Incident Management, and Change Management required. Qualifications and Skills: Education Bachelor's Degree (or equivalent work experience). At least five+ years of identityandaccessmanagement experience in IT and/or Information Security combined. Must-Have Skills Manage Identity Providers such Microsoft Entra (formerly AAD), Okta, Ping One More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Business Analyst within the IDAM 2.0 Programme , you will play a key role in delivering new systems and enhancing existing ones across the organisation's identityandaccess ecosystem. Acting as the bridge between business and technology, you will analyse needs, define requirements, and guide delivery teams to ensure the successful implementation of IAM solutions. This … role blends traditional Business Analysis expertise with a strong understanding of IdentityandAccessManagement principles, tools, and processes. Key Objectives Support the Project Lead in defining the scope, objectives, and constraints within the IAM domain. Collect, analyse, and document business and technical requirements, transforming them into actionable deliverables. Develop and maintain the benefits … standards. Required Skills and Experience 3-5 years' experience as a Business Analyst, ideally within cybersecurity, IAM, or a regulated IT environment. Strong understanding of IdentityandAccessManagement concepts, including access provisioning/deprovisioning, RBAC, JML processes, ServiceNow integration, and security standards (e.g. SAML, OAuth). Hands-on experience onboarding applications More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
remote working - UK based An IT Systems Engineer is required to augment our internal IT function. This role focuses on optimising, automating, and documenting key IT systems across identity, device management, productivity platforms, and IT operations. The successful candidate will work closely with internal teams to streamline workflows, enhance security, and improve overall system efficiency. Role … Device & Application Management (Workspace ONE) The IT Systems Engineer will administer and manage the Workspace ONE environment. Recommend and implement optimal configuration and usage strategies. Streamline device and application deployment and lifecycle management. Develop automation strategies for user/device onboarding and compliance. Scripting & Automation (PowerShell & GAM) Audit and optimise existing PowerShell scripts. Develop new scripts to support … Okta, Workspace ONE, Active Directory, onboarding/offboarding, alerting, and reporting. Utilise GAM to automate Google Workspace administrative tasks. Identity, Directory & AccessManagement Administer and manage Okta SSO environment, improving workflows, policies, and integrations. Maintain Active Directory, including group policies, user/device management, and domain architecture. Manage CyberArk privileged accessMore ❯
ASAP | IR35: Outside | Clearance: SC required The Role We're seeking an experienced IAM/PAM Specialist to lead the design and delivery of greenfield IdentityandAccessManagementand Privileged AccessManagement solutions. You'll provide hands-on technical leadership, ensure secure-by-design implementation, and contribute to the … Responsibilities Lead end-to-end IAM/PAM design and delivery. Integrate IAM/PAM telemetry into SIEM tooling. Provide technical oversight for MSPs and vendors. Develop and manage Conditional Access, MFA, and RBAC policies. Mentor junior team members and build internal capability. Maintain IAM/PAM architecture and standards aligned to ISO 27001 & NIST. Skills & Experience Proven … IAM/PAM implementation experience (e.g. Entra ID, CyberArk, BeyondTrust). Hands-on with Azure AD/Entra ID , Conditional Access & Identity Protection. Understanding of OAuth2.0, SAML, OpenID Connect . Familiarity with ISO 27001, NIST CSF, CAF & GDPR . Experience leading or overseeing MSPs. Current SC clearance . Desirable: Knowledge of Microsoft Sentinel, Splunk, or Elastic More ❯
london, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Entasis Partners
IAM & PAM Architects – Manager Level Location: UK (Flexible/Hybrid) Practice: Identity & AccessManagement (IAM) As cyber threats grow and digital landscapes evolve, identity has become the new security perimeter. We’re working with a leading consulting organisation that’s helping some of the UK’s most high-impact institutions redefine how … Build & Implementation Oversee configuration and integration across leading IAM/PAM platforms (e.g. SailPoint, Saviynt, CyberArk). Lead technical workshops and ensure robust deployment of policies, roles, certifications, andaccess controls. Strategy & Innovation Advise on IAM/PAM strategy, governance models, operating models, and roadmap development. Stay ahead of trends, product updates, and regulatory changes shaping the identity … more IAM/PAM platforms (Saviynt, SailPoint, CyberArk, or similar). Strong understanding of IGA, authentication, access control, privileged access, role management, andidentity lifecycle. Proven ability to lead client engagements in regulated or complex environments. Familiarity with integrating identity platforms with cloud and enterprise systems (e.g. Azure AD, Workday More ❯
growing IT team in Bournemouth. This is an excellent opportunity for someone early in their career who’s keen to develop hands-on experience in identityandaccessmanagement within a supportive environment. Key Responsibilities: Administer and maintain Identity & AccessManagement (IAM) systems Manage Active Directory and Azure … processes Assist with user support, troubleshooting, and documentation Key Requirements: 6 months to 2 years of IT experience, preferably in IAM, AD, or Azure AD Familiarity with permissions management , MFA , SSO , and JML processes Strong attention to detail and willingness to learn Good communication skills and ability to work in a team Apply now to speak with VIQU More ❯
cyber capabilities to support delivery of a key cybersecurity programme focused on securing and modernising the application estate. This role will play a vital part in helping the Identityand Authentication team drive change across hundreds of applications, ensuring alignment with modern security practices, including Microsoft Entra ID and SailPoint, Microsoft Sentinel, Privileged AccessManagement … to: Engage with stakeholders across the airline to gather, refine and prioritise business and technical requirements. Own and manage the project backlog in JIRA, working closely with the Identityand Authentication Lead and product stakeholders. Conduct workshops with application owners and technical teams to extract key information and drive decision-making. Translate business requirements into technical stories suitable … knowledge of JIRA and backlog management. Excellent stakeholder engagement skills with the ability to communicate at all levels. Experience working on cybersecurity projects – particularly around IdentityandAccessManagement (IAM), PAM or Security Monitoring. Ability to translate non-technical input into structured technical requirements. Comfortable running workshops and engaging stakeholders in high-pressure environments. More ❯
waterside, southern scotland, united kingdom Hybrid / WFH Options
Hays
cyber capabilities to support delivery of a key cybersecurity programme focused on securing and modernising the application estate. This role will play a vital part in helping the Identityand Authentication team drive change across hundreds of applications, ensuring alignment with modern security practices, including Microsoft Entra ID and SailPoint, Microsoft Sentinel, Privileged AccessManagement … to: Engage with stakeholders across the airline to gather, refine and prioritise business and technical requirements. Own and manage the project backlog in JIRA, working closely with the Identityand Authentication Lead and product stakeholders. Conduct workshops with application owners and technical teams to extract key information and drive decision-making. Translate business requirements into technical stories suitable … knowledge of JIRA and backlog management. Excellent stakeholder engagement skills with the ability to communicate at all levels. Experience working on cybersecurity projects – particularly around IdentityandAccessManagement (IAM), PAM or Security Monitoring. Ability to translate non-technical input into structured technical requirements. Comfortable running workshops and engaging stakeholders in high-pressure environments. More ❯
Bicep, Terraform, and PowerShell DSC. Monitored, troubleshot, and optimized Azure workloads for high availability, performance, and cost efficiency. Designed and implemented security best practices, including identityandaccessmanagement, secure networking, encryption, and compliance controls. Collaborated with software development teams to create CI/CD pipelines and automate deployments using Azure DevOps and GitHub … using Azure DevOps, Git, and GitHub. Experience with Docker and Kubernetes containerization and orchestration. Familiarity with monitoring and observability tools: Azure Monitor, Log Analytics, Application Insights. Knowledge of identity, accessmanagement, governance, and compliance in Azure. Strong troubleshooting and root-cause analysis skills across cloud and hybrid infrastructures. Excellent communication, documentation, and interpersonal skills. More ❯
DV Cleared Identity Engineer Location: Corsham, Wiltshire Clearance Required: UK Government DV (Developed Vetting) Start Date: ASAP Contract Type: Contract We’re seeking a highly skilled and … security-cleared Identity Engineer to join a dynamic team supporting critical national infrastructure. This is a unique opportunity to work on high-impact identityandaccessmanagement (IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identityandaccessmanagement systems Integrate IAM … Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure environment Requirements DV Clearance (must be active and transferable) Proven experience in identity engineering or IAM roles Strong knowledge of Microsoft More ❯
swindon, wiltshire, south west england, united kingdom
Stable
DV Cleared Identity Engineer Location: Corsham, Wiltshire Clearance Required: UK Government DV (Developed Vetting) Start Date: ASAP Contract Type: Contract We’re seeking a highly skilled and … security-cleared Identity Engineer to join a dynamic team supporting critical national infrastructure. This is a unique opportunity to work on high-impact identityandaccessmanagement (IAM) solutions within a secure environment. Key Responsibilities Design, implement, and maintain identityandaccessmanagement systems Integrate IAM … Manage authentication protocols (e.g., SAML, OAuth, OpenID Connect) Support Active Directory, Azure AD, and other directory services Collaborate with security and infrastructure teams to ensure compliance Troubleshoot and resolve identity-related issues in a secure environment Requirements DV Clearance (must be active and transferable) Proven experience in identity engineering or IAM roles Strong knowledge of Microsoft More ❯
expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identitymanagement, key management, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses to Requests for Proposals (RFPs), Requests for Information (RFIs), and … Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across IdentityandAccessManagement (IAM), key management, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of … cryptographic key management, Hardware Security Modules (HSMs), and Key Management Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. More ❯
london (city of london), south east england, united kingdom
MCG Talent
expertise in security assurance, audit, and cloud security, and a passion for advancing Web3 and blockchain technologies. Key Responsibilities Design, conduct, and implement testing of security controls for identitymanagement, key management, and infrastructure (network and cloud) configurations. Support client assurance by preparing responses to Requests for Proposals (RFPs), Requests for Information (RFIs), and … Requirements Minimum of 8 years of experience in security assurance, audit, compliance, or cloud security engineering. Proven expertise in testing and validating security controls across IdentityandAccessManagement (IAM), key management, and network/cloud environments. Strong understanding of IAM principles and their application in secure systems. In-depth knowledge of … cryptographic key management, Hardware Security Modules (HSMs), and Key Management Systems (KMS). Solid understanding of cloud and network security architecture and configurations. Demonstrated experience supporting external audits and assessments, such as SOC 1, SOC 2, ISO 27001, or PCI DSS. Hands-on experience with major cloud platforms (AWS, GCP, Azure) and infrastructure-as-code practices. More ❯
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
warrington, cheshire, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
bolton, greater manchester, north west england, united kingdom
Areti Group | B Corp™
of DDoS protection , Web Application Firewalls (WAF) , Endpoint Detection & Response (EDR) , Identity & AccessManagement (IDAM) , Mobile Device Management (MDM) , and Vulnerability Management tools. Excellent opportunity for professionals with a solid operational background in these areas who are looking to transition into a pre-sales or solution consulting role . Key More ❯
Peterborough, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
Noir
Software Development Manager - Enterprise Software - Peterborough/Hybrid (Key skills: Software Development Manager, Agile, Software Engineering Leadership, Product Delivery, Application Security, Identity & AccessManagement, .NET 4.8 & 8, SQL Server, Microservices, Cloud (AWS/Azure), DevOps, CI/CD, Jenkins, Ansible, Stakeholder Engagement, Resilience Engineering, Full Stack Development) Are you an experienced and inspiring software … cross-functional collaboration. You will manage agile teams working on a mix of internal and client-facing applications, with a strong focus on application security, identityandaccessmanagement, and platform resiliency. Working closely with architecture, design, infrastructure, and product teams, you will ensure the successful delivery of new and enhanced software solutions across More ❯