enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile-specific use cases such as performance, caching, and offline access. • Own end-to-end technical More ❯
enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile-specific use cases such as performance, caching, and offline access. • Own end-to-end technical More ❯
enforce access control, rate limiting, and API lifecycle management. • Implement robust authentication and authorization workflows using IDAM platforms such as Ping Identity, Okta, or Auth0, with support for OAuth2, OIDC, and JWT. • Collaborate with mobile app teams to ensure backend services are optimized for mobile-specific use cases such as performance, caching, and offline access. • Own end-to-end technical More ❯
AD/Entra ID, CyberArk, Okta, SailPoint or similar platforms. Hands-on experience with provisioning, access controls, role-based access control (RBAC), and authentication protocols (e.g., SAML, OAuth, LDAP, OIDC, SCIM) Hands-on experience with coding and scripting automation experience (e.g., PowerShell, Python, or other etc.) Experience with cloud-based IAM solutions, including AWS, Azure, or equivalent platforms, with a More ❯
Cloud Operations Security & Network Engineer We immerse ourselves in the intricacies of finance digitization, subscription management, compliance, and revenue management which gives us the power to make a real impact. Once we understand how an organization works, we can implement More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Xcede
e.g., multiple domains, hybrid environments, B2B/B2C). In-depth understanding of Conditional Access, including policy design, implementation, and troubleshooting. Strong knowledge of MFA, SSO, OAuth, SAML, and OpenID Connect. Experience with Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Purview is a plus. Familiarity with PowerShell scripting for automation and reporting. For more information, please apply More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Xcede
e.g., multiple domains, hybrid environments, B2B/B2C). In-depth understanding of Conditional Access, including policy design, implementation, and troubleshooting. Strong knowledge of MFA, SSO, OAuth, SAML, and OpenID Connect. Experience with Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Purview is a plus. Familiarity with PowerShell scripting for automation and reporting. For more information, please apply More ❯
Slough, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
e.g., multiple domains, hybrid environments, B2B/B2C). In-depth understanding of Conditional Access, including policy design, implementation, and troubleshooting. Strong knowledge of MFA, SSO, OAuth, SAML, and OpenID Connect. Experience with Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Purview is a plus. Familiarity with PowerShell scripting for automation and reporting. For more information, please apply More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
e.g., multiple domains, hybrid environments, B2B/B2C). In-depth understanding of Conditional Access, including policy design, implementation, and troubleshooting. Strong knowledge of MFA, SSO, OAuth, SAML, and OpenID Connect. Experience with Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Purview is a plus. Familiarity with PowerShell scripting for automation and reporting. For more information, please apply More ❯
Ann Arbor, Michigan, United States Hybrid / WFH Options
CCM Consulting
related field (or equivalent experience). 5+ years of hands-on experience with IBM Security Verify (ISV, ISVA, ISVG) implementations. Strong knowledge of identity federation, SSO, MFA, LDAP, OAuth2, OpenIDConnect, and related protocols. Experience integrating IBM ISV with enterprise applications and directories (e.g., Active Directory, Azure AD, SAP, etc.). Proven ability to assess business needs and design More ❯
of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenIDConnect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience More ❯
of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenIDConnect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
undisclosed
of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenIDConnect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
of the IAM architecture. Requirements: Strong expertise in any IAM tool (e.g., IBM Security Identity Manager, Ping Identity, Microsoft Identity Manager). Experience with IAM protocols (LDAP, SAML, OAuth, OpenIDConnect, etc.). Hands-on experience with IAM administration and configuration, including user provisioning, role management, and access reviews. Proficiency in Java and related frameworks (Spring, Hibernate) with experience More ❯
in CSS, TypeScript and JavaScript. Test-Driven Development: Strong commitment to quality, utilizing TDD methodologies to ensure code reliability and maintainability. Security Practices: Knowledgeable in cybersecurity practices, including OAuth, OpenIDConnect, and secure coding practices. Advanced Database Knowledge: Proficient in SQL and data modelling. SOLID Principles: Proficient in applying SOLID principles for object-oriented programming, ensuring clean, maintainable, and More ❯
in Computer Science or related field; advanced degree preferred. 2+ years in a leadership role with strong software development experience. Expertise in SSO, consent management, and authentication protocols (OAuth, OpenIDConnect). Proficiency in Java and familiarity with other programming languages (Python, JavaScript, etc.). Experience with cloud platforms (preferably Azure) and database technologies. Strong leadership, communication, and problem More ❯
in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and efficient software delivery. Expertise in managing teams and More ❯
in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerability scanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and efficient software delivery. Expertise in managing teams and More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Hewlett Packard Enterprise Development LP
control, as well as common distribution nuances. • Technical experience with cloud security and permissions systems – IAM highly desirable. • Understanding of identity and access technologies – SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication. • Experience with networking and network security – Firewalls, IPSEC, SSL-VPN, Routing, NAT and client VPN. • Operational knowledge of networking protocols and services – OSI model, TCP/UDP, DNS More ❯
Burnley, England, United Kingdom Hybrid / WFH Options
HPE Aruba Networking
control, as well as common distribution nuances. Technical experience with cloud security and permissions systems – IAM highly desirable. Understanding of identity and access technologies – SSO, SAML Federated Identity, OAuth, OIDC, RBAC, Authentication. Experience with networking and network security – Firewalls, IPSEC, SSL-VPN, Routing, NAT and client VPN. Operational knowledge of networking protocols and services – OSI model, TCP/UDP, DNS More ❯
github, Jenkins, TeamCity, Sonar, XLDeploy, Docker, Kubernetes • Infra as code: Terraform, ansible, azure cloud • Datastores: PostGre, OCP • Observability: ELK, Grafana, OpenTelemetry • Batch: airflow (python) • Security & Compliance: TLS, OAuth2/OIDC, data masking, GDPR/MiFID controls • Project & Process: Scrum/Kanban, backlog grooming, metrics driven retrospectives Why join us People join for the impact they can have on us. They More ❯
needs and translate them into technical requirements. Work on integrating Google's identity solutions with various external identity providers (IdPs) and relying parties (RPs) using industry standards like SAML, OIDC, and OAuth. Build robust and scalable systems that can handle high volumes of authentication requests while ensuring security and performance. Implement strong security measures to protect user data and prevent … In-depth knowledge of GCP services, architecture, and best practices Proven experience in designing and building secure and scalable distributed systems. In-depth knowledge of identity management protocols (SAML, OIDC, OAuth) and their implementations. Experience with Google Identity and containerization technologies (., Docker, Kubernetes) is a plus. Strong understanding of security principles and best practices (., secure coding, threat modeling More ❯
Management systems and principles. Experience with modern Identity & Access Management systems, including Okta, Microsoft Entra, JumpCloud, PingIdentity. Experience administering and troubleshooting Single Sign-On (SSO) technologies such as OAuth, OIDC and SAML and Identity provisioning technologies such as SCIM. Understanding at a protocol level of Single Sign-On (SSO) and identity provisioning technologies such as OAuth, OIDC, SAML and SCIM More ❯
Management systems and principles. Experience with modern Identity & Access Management systems, including Okta, Microsoft Entra, JumpCloud, PingIdentity. Experience administering and troubleshooting Single Sign-On (SSO) technologies such as OAuth, OIDC and SAML and Identity provisioning technologies such as SCIM. Understanding at a protocol level of Single Sign-On (SSO) and identity provisioning technologies such as OAuth, OIDC, SAML and SCIM More ❯