Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
lead transformative ERP engagements across diverse industries? We're partnering with a leading consultancy to find a Senior Manager who will spearhead SAP S/4 HANA security andaccessmanagement initiatives, driving innovation and compliance in financial transformation programmes. About the Role As a Senior Manager, you'll take ownership of SAP Security architecture and … implementation, leading teams through complex ERP transformations. You'll work closely with senior stakeholders to assess risks, define strategy, and deliver robust access governance solutions across SAP and non-SAP platforms. Key Responsibilities Lead SAP Security and GRC strategy development and implementation. Oversee accessmanagement policies, user provisioning, and SoD controls. Manage greenfield SAP … Security andIdentityAccessManagement projects. Conduct risk assessments aligned with frameworks like NIS2. Stay ahead of emerging threats and technologies to enhance application security. Build strong client relationships and deliver high-quality service. What We're Looking For Proven experience in large-scale SAP implementations. Deep knowledge of S/4 HANA, BW More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
lead transformative ERP engagements across diverse industries? We're partnering with a leading consultancy to find a Senior Manager who will spearhead SAP S/4 HANA security andaccessmanagement initiatives, driving innovation and compliance in financial transformation programmes. About the Role As a Senior Manager, you'll take ownership of SAP Security architecture and … implementation, leading teams through complex ERP transformations. You'll work closely with senior stakeholders to assess risks, define strategy, and deliver robust access governance solutions across SAP and non-SAP platforms. Key Responsibilities Lead SAP Security and GRC strategy development and implementation. Oversee accessmanagement policies, user provisioning, and SoD controls. Manage greenfield SAP … Security andIdentityAccessManagement projects. Conduct risk assessments aligned with frameworks like NIS2. Stay ahead of emerging threats and technologies to enhance application security. Build strong client relationships and deliver high-quality service. What We're Looking For Proven experience in large-scale SAP implementations. Deep knowledge of S/4 HANA, BW More ❯
Belfast, County Antrim, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
lead transformative ERP engagements across diverse industries? We're partnering with a leading consultancy to find a Senior Manager who will spearhead SAP S/4 HANA security andaccessmanagement initiatives, driving innovation and compliance in financial transformation programmes. About the Role As a Senior Manager, you'll take ownership of SAP Security architecture and … implementation, leading teams through complex ERP transformations. You'll work closely with senior stakeholders to assess risks, define strategy, and deliver robust access governance solutions across SAP and non-SAP platforms. Key Responsibilities Lead SAP Security and GRC strategy development and implementation. Oversee accessmanagement policies, user provisioning, and SoD controls. Manage greenfield SAP … Security andIdentityAccessManagement projects. Conduct risk assessments aligned with frameworks like NIS2. Stay ahead of emerging threats and technologies to enhance application security. Build strong client relationships and deliver high-quality service. What We're Looking For Proven experience in large-scale SAP implementations. Deep knowledge of S/4 HANA, BW More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Salt Search
Project Support Office/Analyst ((Identity & AccessManagement Programme) - Banking Client - London Duration: 12 months Rate: 400 - 600 per day (inside of IR35) Hybrid: 8 days onsite per month, the rest is remote working Locations: London, Paris, Brussels or Amsterdam Role description PSO Analyst - Planning & Budgeting … Identity & AccessManagement Programme) We're looking for a hands-on PSO Analyst to help managing the budgeting and planning side in the IDAM programme, which has a portfolio of 20 projects. You'll work closely with project managers, the central PMO team and other delivery teams across to keep finances on track, support … slides and collect input from several contributors. Meeting minutes and action tracking: Summarise key discussion points, actions and decisions and follow-up with action owners. Quality assurance and controls management: Frequent checkpoints with project managers to maintain a high standard in terms of project life cycle documents, monthly reports and status updates, and steer and support where needed. More ❯
. This is an exciting opportunity to work at the forefront of Microsoft Entra solutions, helping enterprise clients design, deliver, and optimise secure identityandaccessmanagement strategies. Responsibilities Act as a trusted advisor to clients, shaping solutions around Microsoft Entra ID, Entra Permissions Management, and Entra Verified ID . … IAM and guide clients through adoption, migration, and transformation programmes. Qualifications Proven experience as a Solutions Architect within consultancy or professional services. Strong background in IdentityandAccessManagement (IAM) with a focus on Microsoft Entra (Azure AD, Conditional Access, MFA, Identity Governance, etc.). Demonstrated presales experience - able to … workshops, and contribute to bids/proposals. Broad technical knowledge of Microsoft cloud technologies (Azure, M365) and security standards (Zero Trust, SSO, federation protocols). Excellent communication and stakeholder management skills, with the ability to simplify complex technical concepts. Benefits Opportunity to deliver high-impact digital identity transformation projects across multiple industries. Work with one of More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
. This is an exciting opportunity to work at the forefront of Microsoft Entra solutions, helping enterprise clients design, deliver, and optimise secure identityandaccessmanagement strategies. Key Responsibilities Act as a trusted advisor to clients, shaping solutions around Microsoft Entra ID, Entra Permissions Management, and Entra Verified ID … and guide clients through adoption, migration, and transformation programmes. About You Proven experience as a Solutions Architect within consultancy or professional services. Strong background in IdentityandAccessManagement (IAM) with a focus on Microsoft Entra (Azure AD, Conditional Access, MFA, Identity Governance, etc.). Demonstrated presales experience - able to … workshops, and contribute to bids/proposals. Broad technical knowledge of Microsoft cloud technologies (Azure, M365) and security standards (Zero Trust, SSO, federation protocols). Excellent communication and stakeholder management skills, with the ability to simplify complex technical concepts. Why Join? Opportunity to deliver high-impact digital identity transformation projects across multiple industries. Work with one More ❯
per day (deemed inside IR35) Reference: 19713 The Enterprise Directory Services (EDS) team engineers and manages solutions and infrastructure supporting the client's global enterprise directory services andidentity & accessmanagement, including Microsoft Active Directory and Microsoft Entra ID. You'll join the EDS team as a hands-on engineer focused on day-to … and Quest Active Roles, ensuring adherence to SLAs. You will implement Tier-0/DC hardening, manage GPO governance, and enhance security through Kerberos/LDAP protections and Conditional Access/PIM controls. Your engineering expertise will be pivotal in executing changes based on SME/architect designs, utilising PowerShell and Microsoft Graph for automation and configuration management. … to monitoring, ops quality, and compliance processes. Collaboration with SMEs and various teams is essential, alongside actively participating in major-incident support and knowledge sharing. Experience & Qualifications Microsoft identity stack: Deep experience with Active Directory and Entra ID (Azure AD), plus associated infrastructure such as AD FS and Azure AD Connect; excellent knowledge of AD 2016/ More ❯
Hampton, New Hampshire, United States Hybrid / WFH Options
Unitil Service Corporation
IT environment from cyber threats and ensuring the continuous and safe operation of essential industrial processes. Additionally, this position will be responsible for OT asset inventory and vulnerability management for the company's network assets including firewalls, switches, IoT devices which includes physical security systems, cameras, UPS devices, HVAC and lighting controls. Key Responsibilities: Cybersecurity Assessment: Conduct security … plans specific to OT environments to detect and mitigate cyber incidents. Network Security: Design, implement, and maintain security measures for OT networks, including firewalls, intrusion detection systems, andaccess controls. Patch Management: Oversee patch management processes for OT systems, ensuring timely updates and minimal disruption to critical operations. Security Policies: Develop and enforce security … policies and procedures for the OT environment, aligned with industry standards and regulatory requirements. Security Monitoring: Implement real-time monitoring solutions to detect anomalies and unauthorized access in OT networks and systems. Risk Assessment: Perform risk assessments and develop risk mitigation strategies for OT assets and processes. Compliance: Ensure compliance with relevant industry standards and regulations, such as More ❯
Architect page is loaded Cyber Security Architectremote type: Hybrid or Remotelocations: Remote UKtime type: Full timeposted on: Posted Todayjob requisition id: RLocation: Remote UK, United KingdomThales people architect identitymanagementand data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they … funds, people cross borders, energy become smarter and much more. More than 30,000 organizations already rely on us to verify the identities of people and things, grant access to digital services, analyze vast quantities of information and encrypt data to make the connected world more secure.Together we offer fantastic opportunities for committed employees to learn and develop … Design, Security Supervision Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & AccessManagement (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You have the More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Nextgen Solutions Corporation
Assets with an associated taxonomy in support of cost rebilling, reporting, and compliance. Proficient in core Microsoft technologies including Windows, Windows server administration, Active Directory, IdentityandAccessManagement, DNS, SQL Design, build, upgrade, and decommission various Windows and Linux systems, features, and services including but not limited to: Active Directory (Azure AD) Azure … Linux Servers and Services. Expert knowledge of Azure CLI PowerShell, ARM Templates, Azure Networking, Azure Virtual Networks, and Site-to-Site-VPN. Intermediate knowledge of Azure DevOps configuration andManagement, Azure Security Center, and Azure IdentityManagement, including Azure AD, Azure AD B2C, SSO. Experience with cloud monitoring including Azure Log Analytics, Azure Monitor … proof, complex global solutions Expert knowledge of Azure CLI PowerShell, ARM Templates, Azure Networking, Azure Virtual Networks, and Site-to-Site-VPN. Intermediate knowledge of Azure DevOps configuration andManagementMore ❯
and strategies, manage roadmaps, and ensure delivery of value-driven outcomes across enterprise-scale environments. We’re looking for individuals who combine sharp technical understanding with strong product management skills , ideally with experience in insurance or financial services. Role Responsibilities Define product vision, strategy, and roadmaps within your domain (Cloud, Networking, IAM or End User). Translate business … WAN, SD-WAN, VPN, firewalls, load balancing. Vendor experience could include Cisco, Juniper, Palo Alto, Fortinet, VMware NSX . Knowledge of network performance monitoring, resilience, and security. IAM (Identity & AccessManagement) Product Manager Hands-on knowledge of Okta, Ping Identity, ForgeRock, Azure AD/… Entra ID and MFA/SSO platforms. Experience with identity lifecycle management, PAM solutions (CyberArk, BeyondTrust), and regulatory compliance. Understanding of Zero Trust architectures andidentity governance. End User Product Manager Experience with M365, Google Workspace, VDI solutions (VMware Horizon, Citrix), Intune, JAMF . Proven ability to drive workplace modernisation and improve user experience More ❯
SailPoint solutions for a leading organisation. This role requires hands-on expertise with SailPoint ISC and a proven track record in delivering end-to-end identityandaccessmanagement (IAM) projects. As a trusted consultant, you will play a pivotal role in ensuring the security and efficiency of identity governance processes, working … z2bz0 years of proven hands-on experience with SailPoint ISC (Identity Security Cloud), including end-to-end implementations. Strong understanding of IAM principles, governance, and lifecycle management . Proficiency in creating rules, workflows, and custom configurations from scratch . Experience onboarding applications and running certification campaigns. Strong communication and presentation skills, with the ability to engage … acting as an Employment Business in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. More ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £85,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with experience designing and implementing IAM frameworks, managing access governance, and improving security posture in large-scale environments. You'll combine hands … with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're seeking a senior-level Identity & AccessManagement (IAM) and Security specialist to take ownership of a global security roadmap and design IAM frameworks that protect operations across multiple countries. This … security objectives into practical, scalable solutions. Key Responsibilities: Own and deliver the Global Technology Operations security roadmap Design & implement IAM frameworks (Saviynt preferred, Okta/SailPoint/Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Work with CISO and leadership to identify & mitigate security risks Respond to identity/accessMore ❯
Position Available: Security & Identity Consultant Location: London (Hybrid, 2 days a week in office) Salary: £75,000 - £100,000 (DoE) + Bonus Experience needed: We are seeking a senior-level IAM and security professional with a proven track record in designing security roadmaps and influencing at executive level. You'll combine hands-on IAM expertise with strategic leadership … shaping global identity strategies while engaging with CISOs and senior stakeholders. Experience with IAM tools (Saviynt preferred), authentication protocols, cloud security, and frameworks like RBAC and least privilege is highly desirable. About the role: We're looking for an Identity & AccessManagement (IAM) and Security specialist to own and drive a global … priorities into scalable, actionable security solutions. Key Responsibilities: Design, own, and deliver the Global Technology Operations security roadmap Build and implement IAM frameworks (Saviynt preferred; Okta, SailPoint, Ping Identity also welcome) Develop IAM policies and ensure compliance with RBAC & least privilege Partner with CISO and senior leadership to define security strategy and mitigate risks Provide expert guidance during More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
requirements. Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & AccessManagement (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled … in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Rocket Science Group
standards for a fast-growing globally distributed studio. Support hardware (PC, Mac, Console Devkits etc). Establish and maintain a secure, scalable computing environment. Manage and improve our identityaccessmanagement, remote access solutions and more. Install and manage AV and conference solutions for global collaboration. Create accessible, easy-to-use self … etc. Experience using remote networking tools such as Parsec. Proficient in running and supporting office networks. History working with cloud platforms (AWS, GCP, Azure) Experience with Mobile Device Management (MDM) solutions Experience with Rippling HRIS or SecureFrame. Automation or scripting skills (Bash, PowerShell, Python, etc.) Implemented low latency remote access solutions for desktops and consoles AndMore ❯
and integration, PostgreSQL, JavaScript, GoLang, and Python. You will be comfortable using the supporting tools for Agile product delivery such as JIRA (User Story/Defect/Task Management), Confluence (Documentation/Comms), and Slack (collaboration/comms). Key Responsibilities Lead development of microservices and front-end components using Node.js (TypeScript) and React (TypeScript). Configure and … Hasura GraphQL Engine, including permissions, computed fields, and API integrations. Design and implement PostgreSQL schemas, migrations, and triggers; ensure data integrity and performance. Integrate with IdentityandAccessManagement (IdAM) systems. Ensure secure coding practices and compliance with platform security posture. Collaborate with UX, QA, and DevSecOps teams to deliver accessible, performant, and maintainable … to design discussions, code reviews, and maintain documentation in Confluence. Essential Technical Skills Languages & Frameworks TypeScript (Proficient) - primary language for backend and frontend. React (Proficient) - SPA development, state management, performance optimization. js (Proficient) - microservices architecture. GraphQL (Working) - queries, mutations, schema awareness. SQL (PostgreSQL) (Working) - schema design, queries, migrations. JavaScript (Working) - legacy code and Jest tests. Go (Awareness) - infrastructure More ❯
knowledge of information security frameworks, pertinent regulation and legislation, vulnerability management, incident managementand response, secure development techniques and approaches, Cyber Security engineering and operations, andmanagementand governance of Cyber risk and Cyber Security. Please review the Job Description and Person Specification document attached for details of the role and comparison against your … a range of IT applications Significant evidence of continued professional development Desirable ITIL Qualification COBIT Knowledge and Experience Essential Proven and significant leadership experience and/or formal management qualification Demonstrated expertise in an IT Security environment Direct experience of strategic and budgetary planning and financial managementand controls Previously worked within the NHS A good practical knowledge of security technologies and wider business solutions including Firewalls, IDS/IPS, Identityandaccessmanagement, SIEM, remote working and cloud technologies Proven experience of working at a senior level leading and delivering IT Security in a sensitive and complex environment More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … or related field 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
Management SIEM tools and respond to security incidents in a timely and effective manner Collaborate with cross functional teams to develop and enforce identityandaccessmanagement IAM policies and network access control NAC solutions Stay abreast of the latest security threats industry trends and best practices to proactively enhance … or related field 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and secure network design principles Zscaler Private Access Internet Access Experience in design and delivery of Zero Trust Network Access in ITOT environments Proficiency in configuring managing and troubleshooting firewalls Cisco Palo Alto More ❯
Lincoln, Massachusetts, United States Hybrid / WFH Options
WINGBRACE LLC
Establishing enterprise-wide architecture practices that are used by various architects to ensure the client's vision can be diligently executed upon Deploying and configuring identityandaccessmanagement solutions Assisting with the identification of mission assurance risks, impacts, and artifact generation for compliance Translating customer's IT needs and future goals into a … developing, testing, and integrating complex systems solutions Supporting analysis and developing actions to address technology or operations gaps Supporting requirements management, interface managementand architecture change management processes using best-of-breed tools like Rational DOORS and Siemens Teamcenter Developing a data analytics pipeline using data lake and data warehouse architectures and visualizations with … in-house, online, mentoring, conferences and classroom training. Wingbrace LLC is an equal opportunity employer that does not discriminate on the basis of race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic. We value each individual and empower our people to fearlessly drive lasting change. About Wingbrace Wingbrace () is a More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
The Bridge (IT Recruitment) Limited
requirements Cyber Security Leadership Shape the cyber security vision and build a corresponding technical roadmap which delivers a world class security controls across cloud infrastructure, networks, end points, identity & accessmanagement, application security, and threat detection. Collaborate closely with the SNOPs Lead to adapt the SNOPs roadmap priorities in line with shifts in industry … culture of continuous improvement, collaboration, and innovation across all teams. Support recruitment, onboarding, and capability development to meet evolving technology needs. Technology Platform Delivery Oversee the delivery and lifecycle management of: Microsoft 365 and collaboration platforms Cloud platforms (design, automation, cost optimisation) Network and security operations (compliance, threat management) Monitoring, observability, and backup/recovery systems … external vendors to ensure service excellence and alignment with user needs. Represent Technology in all relevant Information Security, Risk and project Committees, ensuring visibility and accountability for and robust management of cyber security risks. Represent Security and Platforms and in governance forums such as the Architectural Review Board (ARB). Essential Skills Proven leadership in managing cyber security More ❯
As a Solution ArchitectatSemperis, you will be an essential member of our Customer Success Technical Delivery team.You will collaborate withproduct, sales and engineering to deliver the latest security andidentity products. You will be responsible for the technical aspects of security andidentity products offered to our customersduringpost-sale activities. Providing technical solutions to meet customer … Administered, or supported Azure AD/Entra ID environments. Experience with Linux (Ubuntu & Red Hat) and Kubernetes. Experience with Cloud technologies like Azure, AWS and GCP. Awareness of identity, accessmanagement, and infosec product landscapes. Proven Customer Facing orientation. Fluent Hebrew and English, an additional language, is a big advantage. Excellent verbal and written … employer and will not discriminate against an applicant or employee based on race, color, religion, creed, national origin or ancestry, ethnicity, sex (including gender, pregnancy, sexual orientation, and gender identity), age, physical or mental disability, veteran or military status, genetic information, citizenship, marital status, or any other legally recognized protected basis under federal, state, or local law. The More ❯
cloud threats, crafting effective mitigation strategies, and empowering our engineering teams with comprehensive training. We maintain up-to-date cloud security standards, baseline, implement Just-in-Time (JIT) access controls, and will establish and lead our cloud incident management process What you will do Perform Threat Modelling of architectural infrastructure changes and new cloud infrastructure and … outset. You'll actively manage and enhance our cloud security posture using tools like DataDog and automate security controls with Terraform. You'll be responsible for implementing and managing JIT access controls and establishing our cloud incident response framework. You'll collaborate closely with infrastructure and engineering teams, integrating cloud security seamlessly into their workflows. You'll research … monitoring and Terraform for Infrastructure as Code. You have proven experience in designing, implementing, and managing cloud security controls and configurations. You have experience with IdentityandAccessManagement (IAM) in cloud environments, including the implementation andmanagement of Just-in-Time (JIT) access solutions. You have a proven ability More ❯
Vienna, Virginia, United States Hybrid / WFH Options
ALTA IT Services
and W2 options Position Type: Multiyear Contract Description To support the effective operation and administration of user accounts across various systems and applications. This role involves provisioning, managing access, auditing, and troubleshooting user accounts to ensure secure and efficient access to company resources. Responsibilities: • Create and manage user accounts in accordance with established policies and procedures. … Ensure timely and accurate provisioning of new users, including employees, contractors, and partners. • Administer access rights to ensure users have appropriate access levels to perform their job functions while maintaining security protocols. • Conduct regular audits of user accounts andaccess levels to ensure compliance with company policies and regulatory requirements. Assist in preparing audit … reports and remediation plans as necessary. • Provide first-line support for user account-related issues. Troubleshoot access problems and work with other teams to resolve issues promptly. • Develop and maintain documentation related to user account management processes, procedures, and best practices. Ensure documentation is up-to-date and accessible to relevant stakeholders. • Work closely with the More ❯