We do work that matters to our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & AccessManagement this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
the Information Technology department. The IdentityAccessManagement Analyst will collaborate with university business stakeholders to develop and administer IdentityandAccessManagement (IAM) capabilities that enable the full lifecycle management of UMass Amherst account identities, credentials, and entitlements according to security, privacy, and compliance requirements. … academic business operations, compliance-related laws, regulations and audits. Essential Functions IdentityAccessManagementand Administration Executes and improves IdentityandAccessManagement (IAM) control activities which may include, but not limited to, access provisioning/de-provisioning, entitlement review & access recertification, role-based … ensure compliance with access controls and audit procedures. Provides operational support and oversight for authentication/authorization services such as Multi-Factor Authorization (MFA), Active Directory, andIdentityManagement (IdM). Works with stakeholders, vendors, UITS, and internal IT departments, identifies, documents, and leads remediation of information security and operational issues impacting university identityMore ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
Role Title: IdentityandAccessManagement (IAM) Engineer Duration: contract to run until 30/12/2025 Location: Northampton, hybrid 2-3 days onsite Rate: up to £441.60 p/d Umbrella inside IR35 Role purpose/summary We are seeking an experienced IdentityandAccessManagement (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across a range of enterprise systems and applications. Key Skills/… Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenID Connect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, andaccess reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience building and maintaining secure applications. Familiarity with cloud platforms (AWS, Apaas, or GCP) and deploying IAM solutions More ❯
and deadlines Nice to have skills: Experience with Salesforce Lightning and Experience Cloud Knowledge of data analytics and reporting tools such as Tableau Experience with identityandaccessmanagement tools such as OKTA Certification in Salesforce (e.g., Technical Architect, Developer, or Administrator) Experience with cloud-based technologies such as AWS or Azure Knowledge of … ITIL and IT service management principles skill level: 9 Sector: LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
and deadlines Nice to have skills: Experience with Salesforce Lightning and Experience Cloud Knowledge of data analytics and reporting tools such as Tableau Experience with identityandaccessmanagement tools such as OKTA Certification in Salesforce (e.g., Technical Architect, Developer, or Administrator) Experience with cloud-based technologies such as AWS or Azure Knowledge of … ITIL and IT service management principles skill level: 9 Sector: LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies More ❯
Cambridge, Cambridgeshire, England, United Kingdom Hybrid / WFH Options
AWD online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
AWD Online
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
business objectives. Integrate with API Gateway solutions (e.g., Kong, Apigee, AWS API Gateway) to enforce access control and manage API lifecycles. Implement secure authentication and authorization using IDAM platforms such as Ping Identity, Okta, or Auth0 with OAuth2, OIDC, and JWT. Collaborate with mobile application teams to optimize backend services for mobile-specific needs like caching … modules (MVC, Data, Security). Strong track record in architecting and deploying microservices in enterprise environments. Experience with API Gateway technologies and secure API development. Hands-on experience with IDAM platforms like Ping Identity, Okta, or Auth0. Proven collaboration with mobile development teams to support seamless integration. Prior experience in banking or financial services with awareness of compliance More ❯
City of London, London, United Kingdom Hybrid / WFH Options
developrec
business objectives. Integrate with API Gateway solutions (e.g., Kong, Apigee, AWS API Gateway) to enforce access control and manage API lifecycles. Implement secure authentication and authorization using IDAM platforms such as Ping Identity, Okta, or Auth0 with OAuth2, OIDC, and JWT. Collaborate with mobile application teams to optimize backend services for mobile-specific needs like caching … modules (MVC, Data, Security). Strong track record in architecting and deploying microservices in enterprise environments. Experience with API Gateway technologies and secure API development. Hands-on experience with IDAM platforms like Ping Identity, Okta, or Auth0. Proven collaboration with mobile development teams to support seamless integration. Prior experience in banking or financial services with awareness of compliance More ❯
on-premise and cloud technologies, including file system and permissions management, device and software management via Microsoft Intune, as well as identityandaccessmanagement across platforms like Microsoft 365 Setting up and issuing hardware such as laptops and peripherals, overseeing equipment lifecycles (e.g., retirement and disposal), and maintaining an … solutions, and providing required equipment Coordinating the delivery of IT services in satellite offices by working closely with non-technical representatives Supporting with system audits, such as checking access rights and reporting on inactivity Collaborating with the remote managed service provider (MSP) to provide deskside support Representing the TechOps team across the company by explaining IT processes, announcing … standard qualification (e.g., CompTIA, Microsoft, ITIL) Experience with Windows operating systems and Microsoft Office applications Experience administrating enterprise IT solutions, particularly in the areas of identityandaccessmanagement, and file system administration Excellent written and verbal communication skills, with the ability to communicate confidently and professionally to both technical and non-technical audiences More ❯
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
to and resolve escalated technical incidents and service requests Monitor and maintain the health, performance, and security of cloud and hybrid systems. Implement and support identityandaccessmanagement using Azure AD, conditional access, and MFA. Work closely with the Projects and Security teams on cloud deployments, patching strategies, and compliance (e.g. More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
but we do promise to listen to what matters to you. Learn more about our flexible status at Flexa Careers Why Work for Us? Joining BMT means gaining access to a comprehensive set of employee benefits designed to empower your success. In addition to a competitive salary, our offerings encompass health, family, finance, and personal development, including: Private … join our team and engage in a diverse range of client projects within the defence, national security, environmental, and research sectors. This includes the provision of strategic risk management advice and/or technical consultancy within the context of cybersecurity. You will join a team of highly skilled professionals dedicated to safeguarding technologies and systems, many of which … analysis). DevSecOps. Zero Trust Architecture (ZTA) expertise for enterprise, cloud and air-gapped environments along with knowledge of operational use of Zero Trust within any of the following: , IdAM systems, application security, supply chain security, data protection, other. As a Principal Cyber Security Consultant, you will be responsible for leading technical delivery teams, shaping and carrying out complex technical More ❯
You will work with client management to assess, design and implement stainable solutions, operating processes and people models to address key and evolving identityandaccess related risks. You will articulate business risks of governing digital identities and identify and communicate findings to client personnel. You will analyze processes, documentation, and workflows through interviews … analysis and identify and prioritize security process improvements based on current risk of components adding professional insight. You will assist clients in the development of identityandaccessmanagement procedures and processes that align with leading practices. You will analyze IAM capabilities, playbooks and documentation and work with client staff to implement sustainable improvements. …/or working knowledge of SailPoint, Okta, CyberArk, Azure AD are considered a plus. You are familiar with security concepts and technologies in the wider IdentityandAccessmanagement space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, etc.). As a certified Top Employer we offer: An international corporate More ❯
to assess, design and implement stainable solutions, operating processes and people models to address key and evolving risks in the field of identity governance andaccess management. You will analyze processes, documentation, and workflows through interviews with staff performing security and human resource related duties, develop gap analysis and identify and prioritize process improvements … engagement team and maintain relationships with client account leadership to manage expectations of service, including work products, timing, and services to be delivered. You will demonstrate excellent project management skills, promote teamwork and individual accountability with engagement team members, and use available technology, tools, and KPMG assets to enhance the effectiveness of deliverables and services. Skills & Qualifications : You …/or working knowledge of SailPoint, Okta, CyberArk, Azure AD are considered a plus. You are familiar with security concepts and technologies in the wider IdentityandAccessmanagement space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, etc.). As a certified Top Employer we offer: An international corporate More ❯
Whiteley, Hampshire, United Kingdom Hybrid / WFH Options
Specsavers
all colleagues are proud to belong as we grow our business. Our IdAM Platform Team plays a vital role in this mission. We deliver global IdentityandAccessManagement (IdAM) and Customer IdentityandAccessManagement (CIAM) services that enable secure, seamless access for employees and … consultancy across the business, and oversee third-party technical implementations. You'll support incident investigations, contribute to roadmap prioritisation, and lead improvement initiatives. Your work will involve developing and monitoring IdAM services, collaborating with IT and business teams to advocate for strong controls, and working with architecture teams on solution designs. You'll also be hands-on with SailPoint ISC … and providing 2nd and 3rd line support. To succeed in this role, you'll bring proven experience as an IdAM engineer, with a strong track record in operating and developing IdAM tools. You'll have end-to-end experience of IdAM programmes, a deep understanding of JML processes, and familiarity with both on-prem and cloud-based solutions. You'll More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
R3vamp Limited
forward-thinking public sector organisation. About the Role As Security Operations Manager, you'll be responsible for safeguarding critical digital infrastructure, leading the response to cyber threats and ensuring secure access to systems across a large, complex estate. You … ll manage a team of specialists covering Microsoft Entra ID (Azure AD), Microsoft 365 and broader technical security tooling, while shaping the strategic direction of identityandaccessmanagement services. What You’ll Be Doing Leading a small but highly skilled team across identity, M365, and security operations Overseeing day-to-day … technical delivery and long-term strategy for identityandaccess services Driving improvements in security monitoring, incident response and threat management Managing the relationship with an outsourced 24/7 SOC partner Influencing roadmap decisions around tooling, automation and “shift-left” initiatives Acting as the go-to expert on Microsoft Entra ID and Active More ❯
Berkshire, England, United Kingdom Hybrid / WFH Options
Oscar Technology
scripts to automate cloud administration tasks Ensure security compliance and governance across M365 and Azure environments Monitor and maintain cloud infrastructure performance and availability Work on cloud migration, identity/accessmanagement (Entra ID), and hybrid cloud projects Collaborate with cybersecurity and infrastructure teams on cloud best practices Provide escalation support for technical issues … Azure AD, Intune, Conditional Access, and Exchange Online Experience with Azure IaaS/PaaS (e.g., VMs, Load Balancers, Storage, App Services) Knowledge of identityandaccessmanagement, device compliance, and hybrid environments Familiarity with Azure Monitor, Security Center, and Defender for Cloud Understanding of cloud networking, DNS, and firewalls Experience in ITIL More ❯
infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to … storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identityandaccessmanagement tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Techfellow Limited
infrastructure, security, and systems operations. You’ll operate with meaningful autonomy from the UK office, joining a highly technical environment focused on Red Hat Linux systems, infrastructure automation, identitymanagement, and cross-platform integrations. Prior experience in financial services or similarly high-stakes environments is preferred - but not essential. What matters most is the ability to … storage, networking, and hardware components Maintain and enhance automation scripts and infrastructure-as-code processes using Ansible, Terraform, and Python/Bash Administer and troubleshoot identityandaccessmanagement tools, including Active Directory integrations and Kerberos-based authentication Collaborate with Windows, Security, and Engineering teams to ensure system performance, integrity, and compliance Conduct detailed … actions, and maintain updated operational documentation Manage filesystem configurations, NFS/CIFS mounts, and storage technologies including LVM and ZFS (where applicable) Participate in change control processes, release management, and cross-team project delivery Support hybrid on-prem and cloud infrastructure environments, contributing to continuous platform modernisation initiatives Participate in an on-call rotation (typically one week in More ❯
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … automation and tooling development Planning and Implementing Long-term Cloud IT security strategies Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … automation and tooling development Planning and Implementing Long-term Cloud IT security strategies Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
London, West End, United Kingdom Hybrid / WFH Options
Computappoint
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Computappoint
creatively using innovative approaches Automate security processes and systems to scale security operations Secure containerized environments using Kubernetes and AWS container services Implement and manage identityandaccessmanagement solutions across AWS organizations Design, implement, and run security solutions at a global scale Drive security innovation while maintaining business enablement focus Qualifications and Requirements … Specialist Level: AWS Core IT Security Principles: Expert-level understanding of fundamental security concepts and frameworks AWS IdentityManagement: Advanced expertise in IAM, SSO, andidentity federation AWS Organizations: Deep knowledge of multi-account governance and security controls AWS Environment Security: Comprehensive experience securing AWS infrastructure and services Security Automation: Proven ability to automate … and tooling development Planning and Implementing Long-term Strategies for Cloud IT Security Must Have - Good Competence Level: Code Repository Management: Proficient in version control and code management practices AWS Services: core AWS services and architecture, ECR, ECS, AWS networking, AWS Secrets Manager, AWS CDK, and K8s CI/CD Pipelines: Hands-on experience integrating security More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Starling Bank Limited
of one of our offices so that we're able to interact and collaborate in person. About the Role As an IAM Engineer, you will be designing and implementing identity … solutions across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identityandaccessmanagement team and act as a liaison to the wider business, providing SME knowledge on identityandaccessmanagement solutions. … of identity concepts, including authentication protocols, Identity Lifecycle Management, Privileged AccessManagement, Role Based Access Control andIdentity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to More ❯