What you’ll bring: Strong experience with Microsoft 365, CoPilot, and Intune deployment and migration. Deep knowledge of Microsoft productivity and security solutions. Expertise in identityandaccessmanagement, including Microsoft security tools. Familiarity with CoPilot capabilities and its impact on user productivity. Excellent communication and leadership skills. Proven experience facilitating complex customer workshops … and co-design sessions. It would be great if you had: Microsoft Cyber Security Expert or Identity & AccessManagement certifications. M365 Endpoint or Collaboration certification. Knowledge of Azure security services. Experience with M365 Security & Compliance and Apps Productivity Suite including SharePoint. If you are interested in this role but not sure if your skills More ❯
rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerability management, identity & accessmanagement, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering … the future direction of secrets management within the bank Enabling identity sharing and single sign-on across different organisations or domains. Securing, controlling, and monitoring access to critical systems by privileged users. Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. CISSP/CISM certification SABSA or TOGAF certified preferred If you are interested More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Onyx-Conseil
optimize cloud architecture and infrastructure. Design and configure networking components to ensure efficient and secure communication between services. Develop and implement security best practices, including identityandaccessmanagement, encryption, and threat detection. Monitor and manage detection contracts to ensure timely identification and resolution of security incidents. Automate infrastructure provisioning, deployment, andmanagement … RDS, Lambda, VPC, IAM, CloudFormation, and more. Strong background in networking, including VPN, DNS, load balancing, and firewall configurations. Demonstrated expertise in security practices, including identityandaccessmanagement, encryption, and threat detection. Experience with detection contracts and monitoring tools to identify and respond to security incidents. Proficiency in scripting languages such as Python More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations We are seeking a highly skilled Security Solution Architect with strong Privileged AccessManagement (PAM) experience to join our client’s IT transformation programme. This role requires a proven background in cybersecurity solution design , working across large-scale IT environments … decisions, ensuring clarity and transparency. Identify and mitigate technical risks, issues, and design deviations. Ensure designs are efficient, scalable, and cost-effective throughout the project lifecycle. Risk & Dependency Management Manage and escalate technical/project risks, articulating remediation strategies. Map design decisions to technical risks and communicate impact clearly. Collaboration & Teamwork Work as a cybersecurity SME across IT … transformation teams. Perform peer reviews of PAM solution designs. Collaborate closely with engineering and test teams to ensure delivery excellence. Preferred Skills & Experience Proven Solution Architect experience in Identity & AccessManagement (IAM) and especially PAM . Hands-on with PAM solutions: CyberArk, Centrify, Delinea/Thycotic, OneIdentity . Strong documentation skills (HLDs, LLDs, design More ❯
related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
workflows and eliminate manual tasks Familiarity with containerisation using Docker and orchestration best practices, along with configuration management using Ansible. Knowledge of secrets managementandaccess control using tools like Vault and IAM policies, ensuring secure handling of credentials and sensitive information Strong understanding of AWS security best practices, including encryption, patching, monitoring, least … environments Understanding of routing, traffic management, and load balancing, including configuration of NGINX and AWS-native tools for optimizing traffic flow. Experience with structured release and change management processes, including deployment governance, rollback strategies, and versioning control. Awareness of Java application environments and deployment considerations is a plus for supporting platform-wide consistency and integrations Proactive … Confluence and Bitbucket to support Agile delivery, documentation, collaboration, and CI/CD pipeline management Working knowledge of Active Directory and ADFS for identityandaccessmanagement, including group policy management, SSO, and integration with cloud authentication services Application Requirements: Hands-on experience: in any programming language e.g. python, bash More ❯
East Kilbride, Lanarkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
with engineers. Experience architecting and securing solutions within highly sensitive and classified environments, including familiarity with relevant security policies, regulations, and best practices. Experience with identityandaccessmanagement solutions, including privileged accessmanagement, and ability to architect secure authentication and authorisation mechanisms. (Desirable) Experience with software-defined networking, storage More ❯
East Kilbride, South Lanarkshire, Lanarkshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
with engineers. Experience architecting and securing solutions within highly sensitive and classified environments, including familiarity with relevant security policies, regulations, and best practices. Experience with identityandaccessmanagement solutions, including privileged accessmanagement, and ability to architect secure authentication and authorisation mechanisms. (Desirable) Experience with software-defined networking, storage More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQor SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level Design … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
IAM Sailpoint) £680 a day (Inside IR35) Hybrid (1-2 days in Manchester) 18 Months We are seeking a Solution Architect with strong expertise in IdentityandAccessManagement (IAM), particularly with SailPoint, to join our ITS Strategy & Architecture team. This team leads architectural design and governance, translating IT strategy into actionable design principles … standards, and guidance. The role will focus on IAM-related initiatives within the programme, ensuring robust identity governance andaccess controls are embedded across our systems.Key Responsibilities Lead the design and implementation of IAM solutions, with a focus on SailPoint IdentityIQ or SailPoint IdentityNow. Conduct stakeholder engagement, product fit/gap analysis, and produce High-Level … ensuring alignment with organisational security and compliance standards. Drive service design quality to ensure IAM solutions are scalable, maintainable, and user-centric. Enhance identity provisioning and lifecycle management for managed devices. Integrate IAM capabilities into PC cluster provisioning and automation strategies. Deliver secure, on-demand environments with integrated identity governance. Implement automated builds with More ❯
The Role This role involves the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping Identity's Advanced Identity Cloud (AIC) platforms. The engineer will be responsible for ensuring the security … scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: * Design, Implementation and Deployment: o Install, configure, and deploy ForgeRock and PingOne AIC components in various environments (on-premise, cloud, hybrid). o Develop custom workflows, authentication/authorization policies, and integrations using … with the IAM platforms. o Automate deployment and configuration tasks using tools like Ansible, Terraform, or similar. o Ensure solutions are scalable, highly available, and meet security and compliance requirements. * Managementand Administration: o Administer and maintain the health and performance of ForgeRock and PingOne AIC environments. o Monitor system logs and performance metrics to identify and resolve More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & AccessManagement (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled … in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
for risks, issues, and deadlines Deliver initiatives across people, process, technology, and governance Manage smaller internal cyber security projects outside the partner's scope Maintain programme governance, risk management, and resource planning Collaborate with senior stakeholders, IT teams, and external suppliers Drive change managementand embed new security disciplines across the organisation Monitor progress against KPIs … Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning Data Loss Prevention (DLP) Candidate Profile Proven experience delivering large-scale cyber and information security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Center Information Security (On-Premise): Firewalls (e.g. Palo Alto, Fortinet) Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Protection Platforms (EPP) SIEM tools (on-prem or hybrid) Identity & AccessManagement (IAM) Patch managementand vulnerability scanning tools Data Loss Prevention (DLP) solutions Candidate Profile: Strong hands-on experience in cyber and … information security Deep understanding of Microsoft Azure security architecture Experience managing vendor selection and consultancy engagement Proven track record of delivering security programmes end to end Excellent stakeholder managementand communication skills Relevant certifications (e.g. SC-100, CISSP, CISM, ISO 27001 Lead Implementer More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
/Application connectors within SailPoint IdentityIQ Knowledge Windows & Linux server operating systems is highly recommended. Scripting Knowledge eg: PowerShell is a plus At least 3-5 years of Identity & AccessManagement (IAM) engineering experience required. Excellent analytical and problem-solving skills, with the ability to identify and resolve complex technical issues efficiently. Strong communication More ❯
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Robert Walters
of systems Hands on, automation, cross-functional collaboration Manage Azure and M365 Cloud Platforms Oversee enterprise application stack - M365, Azure, Atlassian, Telephony, IT Service tools Manage/Develop IdentityandAccessManagement solutions Identity/Automate tasks - streamline workflows Implement/Manage monitoring tools Troubleshoot and Incident Response: Investigate, Resolve issues Security … systems procedures CI/CD Support: Implementation of Continuous Integration/Deployment pipelines Provide tech config on cyber security controls Lead tech implementation of enterprise solutions Provide daily management of digital workplace tech stack Act as senior escalation point Tech Ops Engineer: Technical Skills Networking, Azure Cloud Platforms, AVD Virtualization, M365 Collaboration solutions Experience to Azure and M365 More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
of Microsoft-Based Environments across both on-prem and cloud environments. Understanding of network security principles, including firewalls, segmentation, and secure remote access. Knowledge of identityandaccessmanagement (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Familiarity with common regulatory and compliance frameworks (e.g.NIST, CIS Controls, ISO … and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access principles. Familiarity with endpoint protection platforms and vulnerability management tools. Experience securing hybrid identity solutions and federated authentication models Understanding of security automation concepts, including security orchestration and response (SOAR) including ability to script or More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Sanderson are working with our client on an exclusive basis to help the recruit a permanent Senior Identity Consultant during a phase of growth in the organisation. This is a newly created role so you will need to have the depth of knowledge to be able to interpret architecture requirements whilst collaborating with developers, business analysts and architects … Microsoft Entra for customer needs against project deadlines. To carry out this role successfully you will need to have a blend of the following skills; IdentityandAccessManagement knowledge Configuration Management Active Directory Security best practises Troubleshooting & Support Software Configuration Agile Methodologies Data Orchestration & Transformation The ability to work across internal More ❯
database, LDAP, IIS 7.x, Jboss and webservers such as apache and iplanet webserver. CHEF, IBM WebSphere application server, Inspec, Splunk, CA Wily. Sound knowledge in Identityandaccessmanagement tools, IBM Security/Tivoli Access manager, IBM Security/Tivoli directory server, RSA access manager, RSA entitlement server, Active directory More ❯