Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
We are looking for an IDAM Analyst to play a crucial role in building and operating a new centralised IdentityandAccessManagement (IDAM) solution. While architects and engineers will handle the technical aspects, this role requires a strong technical understanding of IDAMand … based access control (RBAC) , and privileged accessmanagement (PAM) . Ensure authentication methods such as SSO, MFA, andidentity federation are properly integrated and managed. Work with architects and engineers to support the implementation, optimisation, and operation of the IDAM platform. Define … including identity governance, access control, and security policies . Experience with IAM frameworks such as RBAC, SSO, MFA, PAM, andidentity lifecycle management . Ability to act as the ‘customer’ for an IDAM solution , influencing technical teams and ensuring the platform meets More ❯
JOB TITLE: Head of Identity & AccessManagement Operations LOCATION(S): This position is based in Edinburgh, Leeds, Manchester, Bristol or London, and will involve periodic travel between these locations. HOURS: Full-time WORKING PATTERN: Our work style is hybrid, which involves spending at least … days per week currently, or 40% of our time, at our office location. About this opportunity As the Head of IdentityandAccessManagement Operations, you'll have overall ownership for the identityandaccessmanagement (IAM) strategy … million customers. We're growing with purpose. Join us on our journey and you will too! What you'll need IAM Operations Management: Leading improvements in IAM processes and delivery using new methodologies, techniques, and tools. Shaping the direction for cross-functional teams to deliver secure IAM solutions. More ❯
JOB TITLE: Head of Identity & AccessManagement Operations LOCATION(S): This position is based in Edinburgh, Leeds, Manchester, Bristol or London, and will involve periodic travel between these locations. HOURS: Full-time WORKING PATTERN: Our work style is hybrid, which involves spending at least … days per week currently, or 40% of our time, at our office location. About this opportunity As the Head of IdentityandAccessManagement Operations, you’ll have overall ownership for the identityandaccessmanagement (IAM) strategy … million customers. We’re growing with purpose. Join us on our journey and you will too! What you’ll need IAM Operations Management: Leading improvements in IAM processes and delivery using new methodologies, techniques, and tools. Shaping the direction for cross-functional teams to deliver secure IAM solutions. More ❯
Senior IAM Engineer to a growing security team for our client. You will be responsible for designing, implementing, and managing IdentityandAccessManagement (IAM) solutions, with a strong focus on Privileged AccessManagement (PAM) , Zero Trust Architecture , and the … on experience with Conditional Access, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) . Knowledge of authentication andidentity protocols such as SAML, OAuth, OpenID Connect . Experience with Active Directory (AD), Group Policy, andIdentity Federation . Strong scripting … implementation. Understanding of compliance frameworks (ISO 27001, NIST, GDPR, etc.). Desirable Qualifications Microsoft certifications such as SC-300 (Microsoft IdentityandAccess Administrator) or AZ-500 (Microsoft Security Technologies) . Experience with Cloud Security and Zero Trust Architecture . Familiarity with Identity Governance More ❯
identities and service accounts Assist in reporting on all aspects of the OKTA environments for security and audit requirements Support the implementation of strategic IDAM objectives in conjunction with the IDAM Architects Provide technical 2nd Line support to a wide user base Provide support to application integrations into the OKTA … authentication and authorisation Set Up Org2org and SCIM Configuration In OKTA Manage designated technical team members Maintain CMDB & Service Catalogue & technical documentation relating to IDAM configuration items Participate in the IDAM Change Management process What you'll need: Certified to OKTA Administrator level or equivalent in another Identity product. A good understanding of IDAM solutions, in particular: OKTA, Azure AD, Active Directory, G-Suite, AWS An understanding of SSO implementations including SAML/OpenID integrations Technical experience in IDAM support & implementations Experience with conditional access controls on accessmanagement solutions More ❯
security policies and initiatives. Threat Detection & Response: Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM): Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing … Security: Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics: Collaborate with security teams to analyse and respond to security incidents, conducting … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance: Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, andMore ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
security policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & AccessManagement (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing … Security : Implement security measures and controls for EUC environments, including endpoint security, access controls, and device management. Incident Response & Forensics : Collaborate with security teams to analyse and respond to security incidents, conducting … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, andMore ❯
an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls. Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting … regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed. Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports … the creation of clear and effective security artefacts. Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes. Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions. Communication: Clearly convey security concepts to both technical and non-technical audiences. Direction More ❯
and maintaining Infrastructure as Code (IaC) solutions to automate provisioning and configuration management Implementing security best practices, including identityandaccessmanagement (IAM), encryption, and compliance Working with development and application teams to improve culture and practices Maintaining documentation for infrastructure, processes … tools such as Terraform, ARM Templates, Ansible, or Kubernetes Possess experience with hybrid cloud and multi-cloud environments And have: Progressive computer systems managementand support experience, preferably in a multi-site enterprise-scale environment Experience with Microsoft Azure cloud services and solutions Experience in cloud infrastructure engineering More ❯
technical background in Cyber-Security and Networking. Knowledge of SIEM, SOAR, or Managed Security Services is advantageous, particularly in areas like DDoS protection, WAF, IDAM, EDR, MDM, or Vulnerability Management. Multi-vendor knowledge, e.g. Fortinet, Palo Alto, CrowdStrike. Please apply now for immediate consideration More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Nomios UK&I Limited
Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). We are also interested to hear from candidates with operational expertise in these areas More ❯
Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). They're big on expertise, not hierarchy, so you'll be trusted with more More ❯
Zscaler, CrowdStrike. We would also love to receive applications from people with skills solutioning SIEM, SOAR, or Managed Security Services (experience in DDoS, WAF, IDAM, EDR, MDM or Vulnerability Management is a plus). They're big on expertise, not hierarchy, so you'll be trusted with more More ❯