Identity Access Management Jobs in the UK

76 to 100 of 198 Identity Access Management Jobs in the UK

IDAM & Entra ID Engineer

City Of London, England, United Kingdom
DGH Recruitment
IDAM & Entra ID/Azure AD Engineer (Contract) PLEASE NOTE: This role will fall Inside IR35. DGH Recruitment are currently recruiting on behalf of a leading client in the professional services industry … who require an IAM & Azure AD Engineer to join the team in London. The role will support the firms Global Identity and Access Management Service and new Entra ID system. Delivering security, efficiency and scalability of Identity environments. Responsibilities: * Working with the … as OAuth, SAML and OpenID Connect, SCIM * Strong understanding of security concepts, including authentication and authorization. PLEASE NOTE: This role will fall Inside IR35. IDAM & Entra ID/Azure AD Engineer (Contract more »
Posted:

Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford

Reading, England, United Kingdom
Areti Group
required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … remote access products LAN & WAN networking using routers, switches, and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability management and defense against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function more »
Posted:

Security Engineer

Greater London, England, United Kingdom
RBW Consulting
and continuous improvement of key cybersecurity processes, including vulnerability and patch management, security incident response, monitoring, endpoint security, identity and access management, network security, and cryptography. Assist in developing and maintaining security policies, processes, incident response management plans, and playbooks. … Create and document standard operating procedures and protocols. Provide expertise on security requirements for core technology processes, such as asset management, change management, third-party management, technology development and acquisition, configuration management, etc. Contribute as a team member in projects and change initiatives aimed at enhancing enterprise security capabilities, such as identity and access management, log aggregation, etc. Required experience: Minimum of 3 years of experience in a Security Engineer/Analyst role, focusing on more »
Posted:

PAM and EPM Specialist

Warwick, England, United Kingdom
Maclean Moore
and non-human privileged users. Continuously improve the PAM and EPM process, including alignment with IAM specific processes, to ensure the least privileged access is provided for the minimum time possible Identify PAM & EPM related risks and proactively work to ensure that these risks are identified, assessed and … PAM & EPM Best Practices to different stakeholders/teams Required experience: Significant prior experience as a subject matter expert within Identity and Access Management, in particular deep technical knowledge of identity management and privilege escalation within a Microsoft Environment (Windows … Operating Systems & Active Directory), Linux based operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing information security risk relating to identity Significant knowledge of Endpoint Privilege Management more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Silicon Logic UK Ltd
leading compliance assessment and enforcement efforts, designing and implementing robust security architectures, managing threat detection and response activities, and overseeing identity and access management initiatives. Responsibilities: Conduct compliance assessments and enforce security policies and standards to ensure adherence to regulatory requirements and industry best … threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop and implement identity and access management strategies, including user authentication, authorization, and privileged access management. Collaborate with cross-functional teams to integrate security controls … e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and access management. Deep understanding of cybersecurity principles, methodologies, and technologies, with hands-on experience in implementing security controls and measures. more »
Posted:

Linux Engineer

London Area, United Kingdom
Miller Maxwell Ltd
Exciting Opportunity for a Linux Engineer! 🌐. Amazing opportunity to work on a highly visable Identity and Access Management programme of work. Ideally the client seeks a Linux Engineer with IAM - IDAM - PAM or SIEM Tooling experience. In the rapidly evolving world of electronic … a pivotal member of the team the Linux Engineer can expect to: 🔧 Craft and maintain robust Linux server environments. 🔒 Be heavily involved in Identity Access Management project. ⚡ Support lightning-fast high-frequency trading systems. 💡 Deploy the latest upgrades to Linux Servers ensuring peak performance. … Unix – Linux support and engineering. 🛠 Mastery in enterprise Linux, with a preference for Red Hat, CentOS, or Oracle Linux. 🔒 Recent hands-on exposure with IDAM, PAM, or SIEM tooling. 👁️‍🗨️ A track record with monitoring tools like Prometheus or Nagios. 🖥️ Scripting skillset in Python, Shell, Bash, or Ruby. 🌐 In-depth understanding more »
Posted:

Systems Security Engineer - Sailpoint

United Kingdom
Brio Digital
current systems System integration with the Cloud and and using your experience with Active Directory to build scalable/reliable and secure systems Identity issues and liaise with development and management teams to collaboratively overcome both workflow and security issues Perform integration, configuration, and customization of …/implementation and support (IGA/PAM etc) will be a key aspect of the role Troubleshoot and resolve technical issues related to identity management systems. Provide technical expertise and guidance to support ongoing projects and initiatives. Be the champion for company wide access … need for this position: CISSP certification is a must have for this role Proven experience as a Systems Engineer, with a focus on identity and access management. Hands-on experience with SailPoint IdentityNow, including implementation and administration. If you have a background of working Linux systems more »
Posted:

Dynamics 365 Security Specialist

London Area, United Kingdom
Hybrid / WFH Options
Catch Resource Management
Dynamics 365 Security Specialist – D365, Dynamics 365, Power Platform, Security, F&O, Finance & Operations. F&SCM, Finance & Supply Chain Management, Access & Permissions, Technical Consultant, Functional Consultant, SQL – UK – Hybrid – London - £550-600pd outside IR35 Our client, a large professional services company, is looking for a … with the team during design and development security roles including custom roles development, deployment and testing Strong experience of integrating identity and access management controls in MSD365. Experience with Microsoft Entra ID governance. Location: Hybrid - UK/London Candidates must be eligible to work … in this country. Catch Resource Management is a leading provider of Dynamics 365, JD Edwards, NetSuite and other ERP resources to both end users and to product suppliers/authors. Our consultants deliver a completely professional resourcing service, always backed up by our team of ERP specialists who more »
Posted:

Software Engineer

Birmingham, England, United Kingdom
Maxegan Recruitment
Our client is a Midlands based Software Development company offering Identity Access Management, Secure Payments, personal data management to companies Nationally. They are looking for a permanent individual to join their expanding team and who is able and willing to attend their more »
Posted:

Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Next Ventures
using Go or Kotlin for IAM tasks. Implement and manage SCIM provisioning for automated user lifecycle management Integrate identity and access management systems like Azure Active Directory (Azure AD) or Entra ID with our existing infrastructure. Configure and manage access controls to ensure secure and role-based access to resources. For more information or to apply please reach out to Luke Finn on +44 203 053 3723/luke@next-ventures.com more »
Posted:

Senior Analyst - Cyber Advisory

London Area, United Kingdom
Hybrid / WFH Options
S-RM
transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation plans Work … internal client project teams, subcontractors and partners Understand and utilise the full range of S-RM’s people and expertise Client Engagement, Account Management and Business Development Our delivery team is at the heart of our business development activities. You will: Support engagement with clients to understand their … of: Cyber Security frameworks, standards and regulations Information security principles, tools, technologies and techniques Technical cyber knowledge, including: Cloud Security Identity and Access Management Software development lifecycle Operational Technology OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their more »
Posted:

Security Architect

Luton, England, United Kingdom
Hybrid / WFH Options
Gamma
controls, and privilege management. Managing and maintaining endpoint security solutions, including endpoint protection platforms (EPP), endpoint detection and response (EDR), and mobile device management (MDM) using Microsoft Intune. Developing and enforcing Data security/Application security policies, standards, and procedures across the organisation. Ensure compliance with … Microsoft Intune, Azure Active Directory, Azure Security Center, and other Microsoft security solutions. Strong understanding of network security, endpoint security, identity and access management, and data protection concepts. Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving … skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance,Identity Fundamentals and Cybersecurity (SC-100) are a plus. Hybrid and multi-cloud infrastructures Security Cleared or able to attend Security Clearance. A few things to note This is a more »
Posted:

IAM Managing Consultant

United Kingdom
Hybrid / WFH Options
Transition Partners
excited to be working with a growing global cyber security consultancy to recruit a Managing Consultant/Project Lead IAM (Identity and Access Management) This is an excellent opportunity to join a group of passionate individuals with a shared purpose to help the world … that has experience in delivering consulting projects. Experience working with leading IAM technologies such as SailPoint, ClearSkye, CyberArk, Delinea. 5 years proven project management experience within IAM. Delivery of large scales IAM projects, Ideally in SailPoint and/or PAM technologies In-depth knowledge of IAM principles, standards … effectively interact with diverse stakeholders. Ability to manage multiple projects in parallel. Experience with IAM technologies such as identity governance and privileged access management. Familiarity with regulatory requirements related to data privacy and security Proficiency in project management tools and methodologies Responsibilities will involve more »
Posted:

Cloud Engineer - Azure

London Area, United Kingdom
Silicon Logic UK Ltd
Clearance Certificate We are seeking a skilled Cloud Engineer with expertise in Azure to join our team and contribute to the design, implementation, and management of our cloud infrastructure. The ideal candidate will be responsible for provisioning and configuring Azure resources, managing security and compliance, setting up monitoring … Azure Resource Manager (ARM) templates, Azure CLI, or Azure PowerShell. Experience in implementing security and compliance controls in Azure, including identity and access management, network security, encryption, and data protection. Knowledge of monitoring and alerting tools such as Azure Monitor, Azure Security Center, Azure more »
Posted:

Developer

London Area, United Kingdom
Hybrid / WFH Options
Janus Henderson Investors
be a developer in the Client Reporting Product Team within Distribution Technology. The Client Reporting Product team partners with Marketing, Reporting Operations and Data Management teams in Technology to build data integration solutions for the automation of a wide variety and high volume of reports. This role requires … an understanding of timing of data loads, data transformation, and optimization of ETL load performance. Provide production support and test approaches for data management projects Work within the agile delivery methodology, picking up data development tasks within a 2-week sprint, providing work estimates for tasks to project … tools to expedite UI development. Azure Active Directory B2C: Experience in configuring and integrating Azure Active Directory B2C for user identity and access management in web applications. NET Development: Strong proficiency in .NET development, including ASP.NET Core, ASP.NET MVC, C#, and related technologies for more »
Posted:

DevOps Engineer

London Area, United Kingdom
Hybrid / WFH Options
Modo Energy
place to come to for information on the global journey to net zero. Take a look at our platform , where we provide open access to an array of content on the energy transition. We're a dedicated and passionate team building a category-defining business, working on one … and adapt to a flexible, evolving environment. Preferred skills: Building CI/CD pipelines. Experience with AWS ECS. Experience in managing permissions and identity/access management across different teams and regions. Important Details: We work in a Hybrid Environment: You split your time … qualifications, merit and business need. We do not discriminate against age, national origin, physical or mental disability, race, religion, pregnancy, sexual orientation, gender identity, veteran status or any other characteristic protected by federal, state, or local law. If you need assistance or a reasonable accommodation with an application more »
Posted:

🌳🌳🌳 Cyber Security Consultant 🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
Posted:

IT Auditor - Independent Consultant - London Based

Greater London, England, United Kingdom
Grant Thornton UK LLP
from the planning phase to the reporting stage. Good understanding of IT General Controls – for example: IT Risk and Governance, Identity and Access Management, IT Development, IT Change, IT Disaster Recovery Experience of performing audits of Cloud Computing, Cyber Security and Operational resilience at … track record of performing IT audits over IT Projects & Programmes (inc Agile), Cloud & Virtualisation technologies, IT transformations, System Implementations, Digital, and Third-Party Management Arrangements Cyber security related qualifications Other relevant qualifications, including ITIL, COBIT, PRINCE2, ACA, etc. Why choose Grant Thornton Agile Talent: Work on a exciting more »
Posted:

Information Technology Auditor - 3rd Line of Defence

Greater London, England, United Kingdom
Grant Thornton UK LLP
Security, Data Privacy, ERP, Cloud and IT SOX Good understanding of IT General Controls - for example: IT Risk and Governance, Identity and Access Management, IT Development, IT Change, and IT Disaster Recovery. The minimum criteria you’ll need is a professional qualification (ITIL, COBIT … This means that our working environment is one where everyone’s experience is important. Where people are treated fairly, and everyone has equal access to opportunities and where everyone feels safe to be themselves. We want to create a culture where it’s okay to ask questions and more »
Posted:

Security Engineer- Cloud WAF

London Area, United Kingdom
Wipro
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents General connectivity/network issue management/service management experience OTHER SKILLS Strong stakeholder management skills Attention to detail in analysing large data sets Excellent interpersonal skills with strong communication skills both written and verbally more »
Posted:

Cloud WAF Engineer

United Kingdom
Hybrid / WFH Options
World Wide Technology
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. … Experience interfacing with SOC during WAF related security incidents General connectivity/network issue management/service management experience more »
Posted:

Senior Associate - Cyber Advisory

London Area, United Kingdom
Hybrid / WFH Options
S-RM
work closely with our clients to understand their challenges, lead project teams and deliver innovative solutions across a full spectrum of cyber risk management and governance activities. Our aim is to become trusted advisors to our clients as we help them to navigate dynamic and evolving security risks. … transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management S-RM Consultants are organised and dynamic project managers and team leaders. You will: Lead complex projects independently Manage client engagement, communication and project … the full range of S-RM’s people and expertise Manage junior colleagues and oversee their career development where appropriate Client Engagement, Account Management and Business Development Our consultants are at the heart of our business development activities. You will: Engage with clients to understand their cyber security more »
Posted:

Cloud Engineer

United Kingdom
Hybrid / WFH Options
NP Group
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. more »
Posted:

Engineer

United Kingdom
Hybrid / WFH Options
NP Group
MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. Providing DevSecOps pipeline maintenance support for the automation works Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. Understanding of HTTPS inspection, including Termination and … Certificate management, grounded in robust web security practices. Experience in rate limiting techniques and their integration into security configurations Experience of version control and update mechanisms for WAF solutions Competency in identifying and documenting platform and organizational logging options, with a focus on security implications and cloud environments. more »
Posted:

Security Engineer

United Kingdom
Hybrid / WFH Options
Cititec Talent
WAF tuning and configuration, coupled with a strong foundation in web security principles and practices. DevSecOps pipeline maintenance support for the automation works with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. of HTTPS inspection, including Termination and Certificate … management, grounded in robust web security practices. custom WAF rules and features, addressing gaps and enhancing overall security measures. to design and implement bespoke WAF processes and documentation, underpinned by a thorough understanding of web application security. They are also accepting candidates who have experience with Web Application more »
Posted:
Identity Access Management
10th Percentile
£40,250
25th Percentile
£54,814
Median
£72,500
75th Percentile
£90,000
90th Percentile
£105,000