Roles & Responsibilities: In this role, you will define the IAM strategy and vision in alignment with the overall business, IT strategy and regulatory standards. You will work with client management to assess, design and implement stainable solutions, operating processes and people models to address key and evolving identityandaccess related risks. You will articulate business risks of governing … digital identities and identify and communicate findings to client personnel. You will analyze processes, documentation, and workflows through interviews with staff performing IAM related duties, develop gap analysis and identify and prioritize security process improvements based on current risk of components adding professional insight. You will assist clients in the development of identityandaccessmanagement procedures and processes … that align with leading practices. You will analyze IAM capabilities, playbooks and documentation and work with client staff to implement sustainable improvements. Facilitate table-top exercises and work with client staff to develop a plan for remediation and improvements. You will work with leading IAM products and technologies from SailPoint, Okta, Microsoft, CyberArk, etc. You will produce andMore ❯
Mission Support a leading consultancy in strengthening its IAM delivery capability by bringing senior expertise, providing advisory guidance, and mentoring junior consultants across multiple ongoing client projects. You will play a key role in delivering IAM strategies and enhancing the security posture of end clients across the region. Key Outcomes Deliver Strategic IAM Advisory: Provide expert input … on the design and implementation of IAM frameworks across various projects, ensuring alignment with security best practices and business needs. Coach and Mentor Junior Consultants : Act as a senior presence within the IAM team, supporting skill development through knowledge sharing, peer reviews, and technical guidance. Contribute to Architecture and Roadmaps : Collaborate with internal stakeholders and technology partners to … develop future-proof IAM playbooks and architectures using tools like SailPoint, Microsoft Entra ID, Ping Identity, or Okta. Ensure Quality and Compliance : Work closely with clients and internal teams to assess risks, define access policies (RBAC, ABAC), and support compliance efforts. Core Competencies & Requirements 5+ years of hands-on experience in Identity & AccessManagement (IAM) Deep understanding of More ❯
Are you passionate about identity , access , and everything Microsoft ? At SecWise , we're looking for someone who lives and breathes IAMand wants to help organizations stay secure in the cloud . What will you be doing? As an IAM Security Consultant , you'll be the go-to expert for everything related to Microsoft Entra and … help our clients design and implement secure identityandaccessmanagement solutions that fit seamlessly into their business and IT environments. From strategy to execution, you'll: Advise on IAM architecture and lifecycle integration Implement and configure secure cloud infrastructures Ensure best practices are followed across the board Stay ahead of evolving threats and technologies You'll work closely … concepts into clear, actionable solutions. Who are you? You're someone who combines technical expertise with strong communication skills . You can talk shop with engineers, but also explain IAM value to business leaders. You're adaptable, collaborative, and always thinking a few steps ahead. Here's what helps you shine: Solid experience with Microsoft IAM technologies A More ❯
Technical IAMConsultant required for global financial services firm. This role encompasses strategic direction and technical delivery of SailPoint, CyberArk (PAM) and Zero Trust projects. Key Responsibilities Lead IAM Strategy: Develop and manage the global IAM strategy to align with business and security goals. Zero Trust Adoption: Drive the strategic implementation of Zero Trust principles … across the organization. Governance & Policy: Define IAM governance frameworks, policies, and standards for the entire organization. Risk & Compliance: Ensure IAM practices meet global security regulations and mitigate risks. Engage Stakeholders: Work with senior executives and business units to align IAM strategies with company objectives. IAM Transformation: Oversee the adoption of new IAM technologies and systems … across the business. Incident Response: Lead IAM-related incident response strategies and ensure organizational resilience. Stay Current: Keep up with IAM trends and best practices to inform the company's security strategy. As an ideal candidate, you will have industry certifications such as CISSP, CIAM or SABSA. SailPoint and CyberArk experience necessary. You will also have a proven More ❯
Senior IAMConsultant/Architect 6 months Remote £800 per day Inside ir35 - Umbrella only Active SC or eligible candidates Some blend of the following: Low-level design and implementation of IAM services for single sign-on, identity governance and privilege user/secrets management in AWS (using ServiceNow for governance) AWS IAM AWS Identity … Secrets Manager IdentityandAccessManagement Active Directory Customer Identity & AccessManagement (CiDAM)/IBM Security Verify Access API authentication Integration & development Platform build & deployment Risked based authentication Federated IAM (Okta Auth0) Oauth/OIDC, XACML, MFA, MMFA All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only More ❯
Senior IAMConsultant/Architect 6 months Remote £800 per day Inside ir35 - Umbrella only Active SC or eligible candidates Some blend of the following: Low-level design and implementation of IAM services for single sign-on, identity governance and privilege user/secrets management in AWS (using ServiceNow for governance) AWS IAM AWS Identity … Secrets Manager IdentityandAccessManagement Active Directory Customer Identity & AccessManagement (CiDAM)/IBM Security Verify Access API authentication Integration & development Platform build & deployment Risked based authentication Federated IAM (Okta Auth0) Oauth/OIDC, XACML, MFA, MMFA All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only More ❯