related field or equivalent work experience. professional-level certification(s) in work field. Typically 5-10 years of relevant experience. Essential Knowledge and Skills Required: IdentityandAccessManagement service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged AccessManagement principles knowledge More ❯
through challenging projects which demand ambitious innovation and thought leadership. The Role As a ForgeRock and Ping AIC Engineer , you will be responsible for involving the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping … Identity's Advanced Identity Cloud (AIC) platforms. The engineer will also be responsible for ensuring the security, scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: Install, configure, and deploy ForgeRock and PingOne AIC components in various environments … including web applications, mobile apps, APIs, and SaaS services. Develop and consume RESTful APIs for IAM functionalities. Troubleshoot integration issues and work with application teams to ensure seamless identity management. Implementing ForgeRock solutions including AM, IDM and DS as a minimum. Implementing automated deployment and configuration for these tools. Your Profile Essential skills/knowledge/experience: Experience More ❯
through challenging projects which demand ambitious innovation and thought leadership. The Role As a ForgeRock and Ping AIC Engineer , you will be responsible for involving the design, implementation, andmanagement of IdentityandAccessManagement (IAM) solutions utilizing both Ping's Advanced Identity Software (formally known as ForgeRock) and Ping … Identity's Advanced Identity Cloud (AIC) platforms. The engineer will also be responsible for ensuring the security, scalability, and reliability of these identity systems, integrating them with various applications and infrastructure, and providing technical expertise to the team and stakeholders. Your responsibilities: Install, configure, and deploy ForgeRock and PingOne AIC components in various environments … including web applications, mobile apps, APIs, and SaaS services. Develop and consume RESTful APIs for IAM functionalities. Troubleshoot integration issues and work with application teams to ensure seamless identity management. Implementing ForgeRock solutions including AM, IDM and DS as a minimum. Implementing automated deployment and configuration for these tools. Your Profile Essential skills/knowledge/experience: Experience More ❯
seeking for a talented Identity & Access Engineer to join our friendly and growing IAM team as we modernise their in-house IdentityandAccessManagement platform and explore deeper integration with Microsoft Security products. This is an exciting opportunity to make a tangible impact - helping to shape the next generation … teamwork Commercial Public sector or Education sector experience is highly desirable Why Join Play a key role in transforming our IAM landscape Gain exposure to modern Microsoft security andidentity technologies Work with experienced engineers who value mentoring and collaboration Enjoy a culture that encourages innovation, experimentation, and professional growth Be part of a team that values balance More ❯
Employment Type: Full-Time
Salary: £42,000 - £48,000 per annum, Pro-rata, Inc benefits
seeking for a talented Identity & Access Engineer to join our friendly and growing IAM team as we modernise their in-house IdentityandAccessManagement platform and explore deeper integration with Microsoft Security products. This is an exciting opportunity to make a tangible impact - helping to shape the next generation … teamwork Commercial Public sector or Education sector experience is highly desirable Why Join Play a key role in transforming our IAM landscape Gain exposure to modern Microsoft security andidentity technologies Work with experienced engineers who value mentoring and collaboration Enjoy a culture that encourages innovation, experimentation, and professional growth Be part of a team that values balance More ❯
Employment Type: Full-Time
Salary: £42,000 - £48,000 per annum, Pro-rata, Inc benefits
bristol, south west england, united kingdom Hybrid / WFH Options
Logiq
through team briefings and technical exchanges Scope of Impact The Senior Security Infrastructure Engineer leads technical implementation and governance across: Enterprise infrastructure and network security Identityandaccessmanagement Endpoint and virtualisation security Monitoring, detection, and vulnerability remediation You will evaluate alternative approaches considering risk, compliance, cost, and operational impact, ensuring sustainable security outcomes. … Active Directory, and Group Policies to enforce robust security baselines. Authentication & Access Control Deploy and manage Multifactor Authentication solutions (YubiKey, RSA) to safeguard identityandaccess across the enterprise. Virtualisation & Endpoint Protection Secure virtualisation platforms (Hyper-V, VMware) and implement endpoint security solutions including EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and … optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We're Looking For Proven experience in infrastructure or More ❯
london, south east england, united kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
slough, south east england, united kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
TECEZE
provider that offers a broad spectrum of capabilities across digital workplace, infrastructure, cloud/datacenter, and cybersecurity, with a focus on solutioning, service delivery, and end-to-end management for small to mid-size US clients. Below is a detailed, synthesized job-description-style profile for a Solution Consultant who could lead and own the practice for such … SMB/MSP needs. Service delivery leadership: Define and enforce service delivery frameworks, SLAs, and operational playbooks; ensure seamless transition from presales to delivery; oversee service continuity, incident management, change control, and problem management. Platform and technology scope: Digital workplace services (end-user devices, collaboration tools, unified communications, remote/mobile workforce enablement); infrastructure and network (LAN/… RFP/RFI responses, and executive-level communications; create compelling business cases grounded in the value of reduced downtime, improved productivity, and scalable future-state architectures. Governance and risk management: Define program governance, risk registers, milestone plans, and success metrics; ensure alignment with customer expectations and Teceze delivery standards. People and skills development: Mentor delivery teams on solutioning More ❯
translate technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, accessmanagement, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance … with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed … Essential Skills & Experience: Experience in cloud security. Strong knowledge of: Security services (IAM, Cloud KMS, VPC Service Controls, etc.) UK data protection and compliance frameworks (GDPR, ICO guidance) Identity federation, SSO, and role-based access control Network segmentation and firewall configuration in cloud environments. Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle) Experience with Infrastructure as More ❯
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
london (city of london), south east england, united kingdom
Persistent Systems
architecture and security policies. Design and architect solutions across various security domains including: Data Loss Prevention (DLP) Security Information and Event Management (SIEM) IdentityandAccessManagement (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders such as IT … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and technical documentation. Maintain up-to-date knowledge of emerging security More ❯
of the team, as well as the wider infrastructure team Contributing to improving quality and ways of working in the infrastructure team Supporting the transition from traditional infrastructure management into a modern, cloud-based approach. Designing a secure, scalable and high available hosting infrastructure architecture solutions Supporting technical discovery for initiatives to improve our IT systems and security … international team, advancing your career further. Experience/Knowledge You Will Need: The candidate would ideally have: Technical Requirements: Strong IT background around support and system administration Extensive identity & accessmanagement experience (Entra ID, AD DS, Azure AD DS, SSO) Strong experience of supporting on-prem and cloud services (Azure, Office 365) Strong experience … of Windows Server, IIS, Active Directory Strong experience in networks across firewalls, routing & switching, VLANS and VPNs Experience with device management solutions like Intune or Endpoint Central Experience of supporting both Windows and Linux based systems A strong understanding of working with best practices in Cyber Security PowerShell and scripting experience Virtualization/Virtual Desktop experience ITIL framework More ❯
organisation in Cardiff that is currently redefining its IT security strategy, and has an opportunity for an IAM Lead to play a key part in its delivery. With Identity & AccessManagement underpinning its core platforms, a critical step in their journey involves developing an IAM roadmap, and they’re looking for someone with strong … experience in building an identity strategy. Responsibilities: Lead the development and delivery of the IAM strategy Collaborate with suppliers and stakeholders to enhance IAM solutions and processes Work closely with Engineers to improve tooling, automation, and security controls Manage daily tasks, projects, and resource planning across the IT Security team Champion best practices and contribute to continuous improvement … experience in an IT Security role Strong technical knowledge across IAM platforms and security tooling Experience in developing and delivering an IAM roadmap Strong knowledge with Entra and enterprise identity platforms Skilled in stakeholder management, problem-solving, and root cause analysis This is an excellent opportunity to play a key role in an IT security transformation More ❯
organisation in Cardiff that is currently redefining its IT security strategy, and has an opportunity for an IAM Lead to play a key part in its delivery. With Identity & AccessManagement underpinning its core platforms, a critical step in their journey involves developing an IAM roadmap, and they’re looking for someone with strong … experience in building an identity strategy. Responsibilities: Lead the development and delivery of the IAM strategy Collaborate with suppliers and stakeholders to enhance IAM solutions and processes Work closely with Engineers to improve tooling, automation, and security controls Manage daily tasks, projects, and resource planning across the IT Security team Champion best practices and contribute to continuous improvement … experience in an IT Security role Strong technical knowledge across IAM platforms and security tooling Experience in developing and delivering an IAM roadmap Strong knowledge with Entra and enterprise identity platforms Skilled in stakeholder management, problem-solving, and root cause analysis This is an excellent opportunity to play a key role in an IT security transformation More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Sterling Bridge Limited
broader technology leadership within the firm. Required Skills: Proven track record in senior security roles (e.g. Head of Security, CISO, or equivalent) Strong technical foundation in cloud security, identity & accessmanagement, network security, encryption, threat modelling Hands-on knowledge securing hybrid and cloud infrastructure (AWS/Azure/GCP) Experience building and managing security … teams, setting processes (incident response, SOC, vulnerability management) Familiarity with compliance/legal security requirements (e.g. GDPR, Legal Privilege, regulatory/security audits) Strong stakeholder management able to communicate with partners, executives, and legal professionals Exclusive Benefits: £80,000 £100,000 base pay + performance bonus & equity Hybrid working model (some days in Southampton office) Significant … influence over security direction and technology choices Funding for certifications, conferences & continued education Generous pension, health benefits, and wellness programs 25+ days holiday + public holidays Access to senior leadership and roadmap into broader tech leadership If you are interested in this role, please click APPLY NOW and attach your full updated CV for immediate consideration, and I More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP More ❯
migration of critical on-premises infrastructure, including Domain Controllers , Certificate Servers , DNS , DHCP , and various file services ( DFS , FTP , SFTP ), to their corresponding Azure-native or hybrid solutions. Identity & AccessManagement: Architect the migration of our on-premises Active Directory and implement a robust IAM strategy in Azure. This includes designing and deploying a … including the use of Azure storage solutions like Azure Files or Azure NetApp Files . Create a strategy to integrate these new cloud services with our existing document management platforms such as Google Drive and AO Docs . SAP Workload Migration (Desirable): Advise on and architect the migration of our legacy SAP environments, including SAP ECC and SAP More ❯
Cheltenham, Gloucestershire, South West, United Kingdom
Sanderson Government and Defence
s' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing security management strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information … in technical client deliveries across a range of cyber security related projects You can demonstrate subject matter expertise in one of the following domains: Security Architecture, Security Operations, Identity & AccessManagement, Security Engineering. You have experience of programming, programming and scripting concepts. You have experience working with security controls within cloud-based infrastructure (e.g More ❯
and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & accessmanagement, and secure configuration of cloud assets Research emerging cyber threats, malware trends, and document recommended countermeasures Support creation of incident response plans, SOPs … Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details & role expectations Onboarding Access provisioning, training roadmap & project kickoff Stipend UK : Minimum 15/hour (in accordance with UK minimum wage guidelines for interns), with potential increment based on interview scores and skill More ❯
london (city of london), south east england, united kingdom
WillHire
and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & accessmanagement, and secure configuration of cloud assets Research emerging cyber threats, malware trends, and document recommended countermeasures Support creation of incident response plans, SOPs … Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details & role expectations Onboarding Access provisioning, training roadmap & project kickoff Stipend UK : Minimum £15/hour (in accordance with UK minimum wage guidelines for interns), with potential increment based on interview scores and skill More ❯
Architecture/Consulting roles, presenting to Senior Stakeholders Experience in the telecommunications sector (ideally on a global scale), working to GSMA standards Advanced Security Architecture & Threat Modeling Vulnerability management Penetration testing & exploitation Cloud security (AWS, Azure, GCP) and container security (Docker, Kubernetes) Network security (firewalls, SIEM, IDS/IPS, packet analysis) Secure software development & code review Incident response … digital forensics, malware analysis Identity & accessmanagement (IAM, Zero Trust, SSO/MFA) Security frameworks & compliance (NIST, CIS, SOC2) Interviews: October/November 2025 Start Date: January 2026 How to Apply: Apply to Gary Hargreaves at X4 Technology to learn more about the role or connect with me on LinkedIn to hear about regular More ❯
in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a team: We are seeking an experienced IdentityandAccess Lead Business Architect to join our growing Security and Digital Identity Practice . In this pivotal role, you will be responsible for defining, designing, and driving … the business and technology architecture for enterprise and customer identityandaccessmanagement (IAM/CIAM) transformations. You will work across clients, industry verticals, and technology ecosystems to develop strategic IAM roadmaps that align business priorities, regulatory requirements, and user experience goals. You will also play a key role in leading RFPs, solution design More ❯
Andover, Hampshire, South East, United Kingdom Hybrid / WFH Options
Data Careers
reviews ensuring secure integration across systems and deployments. Produce detailed architectural artefacts and documentation (e.g. in Sparx Enterprise Architect using ArchiMate/NAFv4 ). Develop and maintain security management plans covering configuration, cryptography, and assurance controls. Collaborate with senior stakeholders to align with governance and programme requirements. Essential Experience: Strong UK Defence background , ideally within the British Army … & accessmanagement, and secure system integration. Skilled in architectural modelling (Sparx EA) and familiarity with Defence standards and frameworks. Excellent communication and stakeholder management across technical and non-technical teams. More ❯