depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
warrington, cheshire, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
bolton, greater manchester, north west england, united kingdom
CDW UK
depth knowledge and experience in your chosen field to effectively influence and develop our services and teams. What you will do Respond to incidents logged in the Incident Management system and provide end users with a technical solution. Provide a point of technical escalation and expertise. Resolving technical issues escalated from 2nd line support Investigating and diagnosing complex … solutions to critical technical problems Collaborating with other teams to resolve technical issue Maintain technical accreditations in line with catalogued services. Recommend and deploy changes via the change management process when required. Proactively maintain and develop knowledge, skills and experience through client contact, industry sources, formalised training and development plan. Work with consultants to better understand issues and … Microsoft 365 Administration: Exchange on-line, Teams, SharePoint, OneDrive Administration Conditional Access Security and Compliance Policies Microsoft Endpoint Device Management Azure Azure Entra ID andIdentityManagement AD Connect, ADFS, WAP, PTA, MFA Virtual Machines, VNET, EFS, Route 53 Security Center Backup, ASR, ANF AWS IdentityAccessManagementMore ❯
Start Date - ASAP Role Overview We are seeking a highly skilled and security-cleared Identity Architect to lead the design and implementation of identityandaccessmanagement (IAM) solutions across secure environments. This role is critical in ensuring robust authentication, authorization, andidentity governance within classified systems and networks. Key … Design and architect scalable IAM solutions aligned with enterprise security policies and compliance standards Lead technical delivery of identity platforms including Azure AD, Active Directory, and federated identity systems Collaborate with security, infrastructure, and application teams to integrate identity services across platforms Define and enforce identity lifecycle management, role-based … access control (RBAC), and privileged access strategies Conduct risk assessments and ensure identity solutions meet NCSC and MOD security requirements Provide technical leadership and mentoring to IAM engineers and support staff Maintain documentation and contribute to architecture governance boards Required Skills & Experience Active DV clearance (Developed Vetting) – essential Proven experience in identityMore ❯
swindon, wiltshire, south west england, united kingdom
Stable
Start Date - ASAP Role Overview We are seeking a highly skilled and security-cleared Identity Architect to lead the design and implementation of identityandaccessmanagement (IAM) solutions across secure environments. This role is critical in ensuring robust authentication, authorization, andidentity governance within classified systems and networks. Key … Design and architect scalable IAM solutions aligned with enterprise security policies and compliance standards Lead technical delivery of identity platforms including Azure AD, Active Directory, and federated identity systems Collaborate with security, infrastructure, and application teams to integrate identity services across platforms Define and enforce identity lifecycle management, role-based … access control (RBAC), and privileged access strategies Conduct risk assessments and ensure identity solutions meet NCSC and MOD security requirements Provide technical leadership and mentoring to IAM engineers and support staff Maintain documentation and contribute to architecture governance boards Required Skills & Experience Active DV clearance (Developed Vetting) – essential Proven experience in identityMore ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
IAM Business Change Management Analyst – SC Cleared Location: Hybrid (London or Birmingham, on-site twice per month) Contract: 3 Month rolling … contract Day Rate: £500 (Inside IR35) End Client: National Highways Overview An opportunity has arisen for an experienced Business Change Analyst to join a major IdentityandAccessManagement (IAM) transformation programme, supporting National Highways. The role focuses on leading business change activities to ensure people, processes, and systems are ready for the introduction … clear business outcomes Skills and Experience Minimum of 5 years’ experience in business change or transformation analysis within large or complex organisations Strong understanding of IdentityandAccessManagement (IAM) concepts, including IGA and PAM Proven experience developing business change and engagement plans for technology-led initiatives Excellent stakeholder managementand communication More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
IAM Business Change Management Analyst – SC Cleared Location: Hybrid (London or Birmingham, on-site twice per month) Contract: 3 Month rolling … contract Day Rate: £500 (Inside IR35) End Client: National Highways Overview An opportunity has arisen for an experienced Business Change Analyst to join a major IdentityandAccessManagement (IAM) transformation programme, supporting National Highways. The role focuses on leading business change activities to ensure people, processes, and systems are ready for the introduction … clear business outcomes Skills and Experience Minimum of 5 years’ experience in business change or transformation analysis within large or complex organisations Strong understanding of IdentityandAccessManagement (IAM) concepts, including IGA and PAM Proven experience developing business change and engagement plans for technology-led initiatives Excellent stakeholder managementand communication More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
IAM Business Change Management Analyst – SC Cleared Location: Hybrid (London or Birmingham, on-site twice per month) Contract: 3 Month rolling … contract Day Rate: £500 (Inside IR35) End Client: National Highways Overview An opportunity has arisen for an experienced Business Change Analyst to join a major IdentityandAccessManagement (IAM) transformation programme, supporting National Highways. The role focuses on leading business change activities to ensure people, processes, and systems are ready for the introduction … clear business outcomes Skills and Experience Minimum of 5 years’ experience in business change or transformation analysis within large or complex organisations Strong understanding of IdentityandAccessManagement (IAM) concepts, including IGA and PAM Proven experience developing business change and engagement plans for technology-led initiatives Excellent stakeholder managementand communication More ❯
for the day-to-day operation, monitoring, and improvement of the organization’s cybersecurity posture. This role ensures that systems and data remain secure and available through proactive management, incident response, and collaboration with SOC and SIEM teams. The successful candidate will have hands-on experience in Microsoft 365 and Azure environments, as well as familiarity with MDR … configurations, firewall rules, and endpoint protection settings. Identify, assess, and remediate manual configuration vulnerabilities in systems and applications. Maintain and review user access controls, MFA enforcement, andidentity protection settings. Review, audit, and remediate IdentityandAccessManagement (IAM) credentials and permissions to ensure least privilege access, reduce … risk of credential misuse, and maintain compliance with security policies. Review, monitor, and manage Data Loss Prevention (DLP) policies and technologies to prevent unauthorized data access, transmission, or exfiltration across endpoints, email, and cloud services. Assist in the implementation and upkeep of MDR (Managed Detection and Response) solutions. Administer and optimise email security controls (e.g., Microsoft Defender for More ❯
for the day-to-day operation, monitoring, and improvement of the organization’s cybersecurity posture. This role ensures that systems and data remain secure and available through proactive management, incident response, and collaboration with SOC and SIEM teams. The successful candidate will have hands-on experience in Microsoft 365 and Azure environments, as well as familiarity with MDR … configurations, firewall rules, and endpoint protection settings. Identify, assess, and remediate manual configuration vulnerabilities in systems and applications. Maintain and review user access controls, MFA enforcement, andidentity protection settings. Review, audit, and remediate IdentityandAccessManagement (IAM) credentials and permissions to ensure least privilege access, reduce … risk of credential misuse, and maintain compliance with security policies. Review, monitor, and manage Data Loss Prevention (DLP) policies and technologies to prevent unauthorized data access, transmission, or exfiltration across endpoints, email, and cloud services. Assist in the implementation and upkeep of MDR (Managed Detection and Response) solutions. Administer and optimise email security controls (e.g., Microsoft Defender for More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Experis
PL/SQL development. Oracle APEX development. Preferred Skills (Some Required) Oracle WebLogic Administration Oracle Database Administration Apache Tomcat & Webserver Administration Oracle WebCenter Content (WCC) & Portal (WCP) Oracle Identity & AccessManagement (OIG/OUD/OAM/AD) Oracle Business Intelligence Discoverer (BI) Oracle Primavera (P3M) Oracle Forms & Reports Oracle Enterprise Manager (OEM) Linux … acting as an Employment Agency in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Business Analyst with strong consulting instincts - someone who thrives on turning complex requirements into clear, actionable outcomes. You'll play a key role in delivering a range of Identity, Access, Governance, and Onboarding initiatives, bridging the gap between business needs and delivery teams. This is a hands-on role where you'll take ownership of the … technical discussions, ensuring that outcomes deliver real value. What You'll Bring Proven experience as a Business Analyst in consulting or client-facing environments . Strong communication and stakeholder management skills - comfortable engaging with execs, delivery teams, and governance boards. Confidence in taking ownership of deliverables and outcomes, not just documentation. Experience in requirements gathering, analysis, and process … mapping (e.g. BPMN, Visio, Lucidchart, Miro). Workshop facilitation and problem-solving expertise. Familiarity with IT Service Management or governance frameworks (JSM/ITIL experience desirable). A curious mindset and ability to quickly grasp new technologies - exposure to Identity & AccessManagement is a plus. Excellent written and verbal communication skills with More ❯
at the forefront of digital transformation. This role sits within a high-performing cloud infrastructure and security team, where you’ll help design and deliver identityandaccessmanagement solutions that keep enterprise environments secure and scalable. What You’ll Be Doing: Designing, developing, and implementing ForgeRock-based IAM solutions (Now Ping) aligned with … clear technical documentation and providing training to support teams and clients. Staying current with evolving IAM trends and technologies. Main Skills Needed: Proven experience delivering ForgeRock or Ping Identity solutions. Strong background in Java, J2EE, OpenAM, OpenIDM, OpenDJ, and Groovy scripting. Deep understanding of IAM principles — authentication, authorisation, and directory services. Experience with SSO, MFA, OAuth, OpenID Connect … designing and integrating IAM systems across multiple platforms. Excellent troubleshooting, communication, and stakeholder engagement skills. What’s in It for You: Work with cutting-edge identityandaccessmanagement technologies. Join a collaborative, forward-thinking team within a global organisation. Access to continuous learning, development, and career progression opportunities. Inclusive, innovative culture More ❯
at the forefront of digital transformation. This role sits within a high-performing cloud infrastructure and security team, where you’ll help design and deliver identityandaccessmanagement solutions that keep enterprise environments secure and scalable. What You’ll Be Doing: Designing, developing, and implementing ForgeRock-based IAM solutions (Now Ping) aligned with … clear technical documentation and providing training to support teams and clients. Staying current with evolving IAM trends and technologies. Main Skills Needed: Proven experience delivering ForgeRock or Ping Identity solutions. Strong background in Java, J2EE, OpenAM, OpenIDM, OpenDJ, and Groovy scripting. Deep understanding of IAM principles — authentication, authorisation, and directory services. Experience with SSO, MFA, OAuth, OpenID Connect … designing and integrating IAM systems across multiple platforms. Excellent troubleshooting, communication, and stakeholder engagement skills. What’s in It for You: Work with cutting-edge identityandaccessmanagement technologies. Join a collaborative, forward-thinking team within a global organisation. Access to continuous learning, development, and career progression opportunities. Inclusive, innovative culture More ❯
london (city of london), south east england, united kingdom
Addition+
at the forefront of digital transformation. This role sits within a high-performing cloud infrastructure and security team, where you’ll help design and deliver identityandaccessmanagement solutions that keep enterprise environments secure and scalable. What You’ll Be Doing: Designing, developing, and implementing ForgeRock-based IAM solutions (Now Ping) aligned with … clear technical documentation and providing training to support teams and clients. Staying current with evolving IAM trends and technologies. Main Skills Needed: Proven experience delivering ForgeRock or Ping Identity solutions. Strong background in Java, J2EE, OpenAM, OpenIDM, OpenDJ, and Groovy scripting. Deep understanding of IAM principles — authentication, authorisation, and directory services. Experience with SSO, MFA, OAuth, OpenID Connect … designing and integrating IAM systems across multiple platforms. Excellent troubleshooting, communication, and stakeholder engagement skills. What’s in It for You: Work with cutting-edge identityandaccessmanagement technologies. Join a collaborative, forward-thinking team within a global organisation. Access to continuous learning, development, and career progression opportunities. Inclusive, innovative culture More ❯
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged AccessManagement (PAM) solution as part of a wider Identity & AccessManagement transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click to find out more about our Key Information Documents. More ❯
days on-site Sheffield, Barnsley or Birmingham A leading financial services organisation is seeking a Security Solution Architect to support the design and delivery of a strategic Privileged AccessManagement (PAM) solution as part of a wider Identity & AccessManagement transformation. Key Responsibilities Design and maintain end-to-end PAM … practices and collaborate with global teams. What You'll Need Proven experience in IAM/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click here to find out more about our Key Information More ❯
dartford, south east england, united kingdom Hybrid / WFH Options
Europa Worldwide Group
Prisma Cloud and App Check. Work with DevOps and Infrastructure teams to embed security best practices into CI/CD pipelines. Apply strong knowledge of cloud networking, security, andidentitymanagement to ensure robust and secure environments. Manage identityandaccessmanagement (IAM), encryption mechanisms, and key management systems across Azure. Maintain and optimise AKS environments, ensuring best practices for cluster configuration, container lifecycle management, and operational resilience. Ensure adherence to organisational security policies, regulatory requirements, and industry best practices. Stay up to date with emerging Azure, cloud security, and containerisation technologies to drive continuous improvement. Our Ideal Person 3+ years of experience in … package Hybrid working Generous Time Off: Benefit from 25 days of annual leave. Enhanced Family Leave: Benefit from enhanced maternity, paternity, and adoption pay. Benefits portal: where you access a wide range of exclusive discounts, company benefits, wellbeing resources and much more. Wellbeing Focus: Access our employee wellbeing programme for your overall health and happiness. Referral More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
coding standards Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls andidentitymanagement systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident … Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identityandaccessmanagement (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP More ❯