for designing, implementing, and managing Identity and AccessManagement (IAM) solutions, with a strong focus on PrivilegedAccessManagement (PAM) , Zero Trust Architecture , and the Microsoft ecosystem , including Entra ID (formerly Azure AD), Azure, and related security technologies . This is an exciting opportunity to … posture by ensuring the right individuals have appropriate access to critical resources. Key Responsibilities Lead the design, deployment, and maintenance of IAM and PAM solutions, ensuring security best practices are met. Develop and enforce IAM policies, standards, and procedures. Manage Microsoft Entra ID , Azure AD , and other Microsoft security … tools to enhance identity security. Implement PrivilegedAccessManagement (PAM) solutions to protect critical assets. Design and implement Zero Trust Architecture (ZTA) principles to enhance security controls. Work closely with IT and security teams to integrate IAM solutions with enterprise applications and cloud services. Key Skills & Experience More ❯
Identity and AccessManagement (IAM) SME Identity and AccessManagement (IAM) SME - Principal - London You want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients' most important challenges? We are growing and are looking for people to join … pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready? About your role We are seeking an experienced Identity and AccessManagement (IAM) SME to join our dynamic consultancy team. The successful candidate will have over 5 years of experience in IAM, with a … in IAM technologies, advising on advanced areas such as multi-factor authentication (MFA), single sign-on (SSO), and privilegedaccessmanagement (PAM). Monitor and analyse emerging IAM threats, vulnerabilities, and risks, ensuring that IAM solutions evolve to counter new attack vectors and threats. Requirements: Have a More ❯
Managing Consultant - IAM/PAM Managing Consultant - IAM/PAM Location: Global role - UK based - Manchester, London Or Cheltenham Role Purpose: NCC Group are investing in expanding our digital identity service line, to grow and expand capabilities, offerings and propositions. This new global practice will focus on three key core … competencies - Identity, Governance and Administration (IGA), PrivilegedAccessManagement (PAM), AccessManagement (AM) and Customer Identity (CIAM). The opportunity is for an IAM technical consultant with hands-on technical experience, performing as an engineer/developer to support large-scale IAM deployments, supporting the … service line leader. Summary: This is a fantastic new opportunity to join our Global IAM team. The ideal candidate will have previous IAM/PAM engineering and development experience and exposure gained from delivering complex IAM engagements, ideally across a broad client base. In addition to your technical skills, you More ❯
financial strength and importantly ensure our people feel the benefits of our joint capabilities. We are currently recruiting for a Head of Identity and AccessManagement to join our established and experienced Chief Information Security Office team here at RSA on a hybrid basis. Your Role: As Head … of Identity and AccessManagement, you will be a key member of the CISO Leadership within RSA. You will be … accountable and responsible for all Information Security matters relating to Identity and AccessManagement (IAM), including PrivilegedAccessManagement (PAM). Your role will be responsible for setting the strategic direction and vision for Identity and Access Management. You will manage organisation-wide User More ❯
delivery of value. We are seeking a skilled and detail-oriented Business Analyst with a strong technology background and previous experience in Role-Based Access Control (RBAC), Identity and AccessManagement (IAM) and Data Loss Prevention (DLP) implementations. The successful candidate will work closely with stakeholders across … experience within the following tasks: Collaborate with stakeholders to elicit, document and validate business and technical requirements related RBAC (Role Based Access Controls), PAM (PrivilegedAccessManagement), and DLP (Data Loss Prevention) initiatives. Define and document business processes to ensure effective implementation of accessmanagement … Develop training materials and conduct sessions on implemented Azure security and access control solutions. About you You will have a strong understanding of PAM and DLP concepts, solutions, and tools specifically in Azure environments including the following: Microsoft Entra ID (Azure AD) Azure Privileged Identity Management (PIM More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
date: 23/04/2025 As a Security & Identity Product Manager, you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM), Active Directory (AD) management, and supplier relationships. This role plays a key … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you'll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA), and PrivilegedAccessManagement (PAM). Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
As a Security & Identity Product Manager , you will be responsible for overseeing and evolving our security and identity management solutions, focusing primarily on Identity and AccessManagement (IDAM) , Active Directory (AD) management, and supplier relationships. This role plays a key part in ensuring that our systems … secure, compliant, scalable, and provide exceptional user experiences. You will work closely with cross-functional teams to deliver continuous improvements in security and identity management while driving innovation and process optimisation. What you’ll be doing as a Security & Identity Product Manager Active Directory Management Lead the management … Continuous Improvement Drive the adoption of new security features such as passwordless authentication, multi-factor authentication (MFA) , and PrivilegedAccessManagement (PAM) . Identify process optimisation opportunities to improve efficiency and user experience. Ensure alignment with Zero Trust security principles and industry standards. Regularly review strategies to More ❯
Overview Enterprise security starts and ends with Identity. At One Identity, we are focused on delivering the best identity management solutions for our customers. With simplicity, flexibility, and robustness as our guiding principles, we aim to help our customers work smarter not harder. As we work to expand and … enhance our SaaS solutions, we are looking for an experience PM with a strong SaaS background. Ideally, someone who experience in Identity and AccessManagement ideally in SaaS but related experience will be considered. As product manager, you are the consummate team player, adept at managing relationships, collaborating … coordinate product schedules with your design and engineering teammates. At One Identity, we are looking for an exceptional individual with experience delivering B2B Identity Management solutions as SaaS in a modular, highly-scalable, highly-available, and highly-resilient architecture. Responsibilities Act as the “messenger of the market” from the More ❯
Identity AccessManagement (IAM) Manager, London Client: LT Harper - Cyber Security Recruitment Location: London, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 8 Posted: 18.04.2025 Expiry Date: 02.06.2025 Job Description: Identity AccessManagement (IAM) Manager Hybrid – various locations A global professional services … firm is looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing consultancy. This person will be involved in large-scale IAM transformations and strategy creation and implementation. This is an ideal opportunity for those who want to take on complex IAM projects and … Experience with both delivery and business development activities. Strong broad knowledge across IAM domains with an expertise area such as enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles. Experience leading small teams and mentoring is helpful. If this More ❯
4HANA Public Cloud Professional Services Edition. The ideal candidate will be responsible for designing, building, and implementing roles, PrivilegedAccessManagement (PAM) solutions, and Identity and AccessManagement (IAM) strategies to ensure a secure, compliant environment within a complex cross-platform ecosystem. The Role: Security … Design and Architecture Governance, Risk, and Compliance PrivilegedAccessManagement SAP Business Technology Platform (BTP) Integration Security Operations and Continuous Improvement Candidates MUST have the following skills/experience to be considered for this role: 5+ years of experience in … SAP security architecture with a focus on roles and authorizations, including S/4HANA Public Cloud. Proven experience in designing and implementing IAM and PAM solutions for SAP and integrated Non-SAP systems. In-depth understanding of SAP GRC and its transformation to SAP IAG in S/4HANA Public More ❯
delivery. Clients will be across multiple different industries, providing a real variety in project work. The suitable candidate will hold EITHER CDE Certification within Privileged Cloud or the Guardian Cert. key responsibilities are as follows: Providing subject matter expertise in Identity and AccessManagement (IAM), specifically in … CyberArk Leading transformations in areas such as identity governance, privilegedaccessmanagement, accessmanagement and customer identity accessmanagement Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback More ❯
services. Ensure architectural consistency across workstreams and integrations. Define and design services supporting student and staff compute environments, including managed desktops, VDI, and remote access platforms. Drive the creation of automated, on-demand environments for key IT systems using infrastructure-as-code and DevOps tooling. Embed service design principles … maintainable, scalable, and user-focused compute solutions. Contribute to the delivery of secure and policy-compliant services including PrivilegedAccessManagement (PAM), data obfuscation, and environment provisioning. Stakeholder Engagement & Leadership: Act as a trusted advisor and architectural lead, engaging with IT stakeholders, academic leaders, service owners, and … e.g., Ansible, Puppet). CI/CD pipelines and release automation (e.g., GitHub Actions, Jenkins). Familiarity with PrivilegedAccessManagement (PAM) solutions such as CyberArk or BeyondTrust. Understanding of IT governance, architectural principles, and service design frameworks. Experience producing architecture artefacts and leading design reviews. Strong More ❯
PrivilegedAccessManagement solutions in the UK. The AE will combine good working knowledge of (IaaS & SaaS) Identity, Cloud Security or PAM technology with prospecting and sales skills. This person is ultimately responsible for the entire enterprise sales cycle within their territory and meeting or exceeding territory … Cloud Team, and Line of Business decision-makers Learn and maintain knowledge of Saviynt’s solutions, focused on Cloud Security, Cloud Access Governance & PAM Aggressively identify qualified sales opportunities across all assigned accounts/territory Develop and leverage all lead sources (personal and partner contacts, inbound leads, events, and … monthly and quarterly revenue objectives WHAT YOU BRING Must be located in the UK 5+ years experience in mid-enterprise Identity, Cloud Security, or PAM Sales preferred Possess a knowledge base of Cloud Identity Management, Cloud PrivilegedAccessManagement and/or Cloud Security Governance technology More ❯
controls. Maintain IT security governance frameworks (ISO 27001, NIST CSF, CIS Controls). Manage and maintain Security Policies and procedures. Third-Party Risk & Outsourcing Management: Design and implement third-party risk management programs to assess vendors, cloud providers, and outsourced services. Ensure compliance with DORA's outsourcing requirements …/external audits (ISO 27001, SOC 2) and regulatory examinations, focusing on third-party and outsourcing compliance. Remediate gaps in processes or documentation. Risk Management: Maintain the enterprise risk register , prioritizing risks tied to third-party dependencies, outsourcing, and ICT disruptions. Quantify risks using methodologies. Technical Compliance & Security: Advise … understanding on IAM (Identity and AccessManagement) strategies, including role-based access control (RBAC) and privilegedaccessmanagement (PAM). Conduct periodic user access reviews to ensure compliance with least privilege principles and regulatory requirements. Security awareness management experience. What we are More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
Identity AccessManagement (IAM) Manager Hybrid – various locations £70k – £75k A global professional services firm are looking for an Identity AccessManagement (IAM) professional who is experienced in client-facing/consultancy. This person will be involved in large-scale IAM transformations and strategy creation and … Experience with both delivery and business development activities Strong broad knowledge across IAM domains with an expertise area such as, enterprise identity, customer IAM, AccessManagement, or privilegedaccess management. Understanding of broader Information security principles Experience leading small teams and mentoring is helpful If this More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
across a variety of SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identity and accessmanagement team and act as a liaison to the wider business, providing SME knowledge on identity and accessmanagement solutions. No … of delivering a software project through the full software development lifecycle from design to deployment Understanding of identity concepts, including authentication protocols, Identity Lifecycle Management, PrivilegedAccessManagement, Role Based Access Control and Identity Governance Experience with automation and developer tooling (CI/CD) Experience … with Infrastructure as Code (IaC) using tools such as Terraform Experience of design and delivery related to an Identity Management System, e.g. Okta, Entra ID, Ping, etc. Interview process Interviewing is a two way process and we want you to have the time and opportunity to get to know More ❯
Cambridge, Cambridgeshire, UK Hybrid / WFH Options
AVEVA
AVEVA is creating software trusted by over 90% of leading industrial companies. Job Title: Identity and AccessManagement Senior Manager Location: Cambridge/London Employment Type: Permanent full time The job We are looking for an Identity and AccessManagement (IDAM) Senior Manager to oversee AVEVA … IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication, and the full user lifecycle, while overseeing identity governance and privilegedaccess management. Act as a subject-matter … expert on all IDAM disciplines, including identity lifecycle, governance, accessmanagement (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance More ❯
on the whole product lifecycle from ideation to delivery and in line with the organisation's risk appetite and strategic direction. The Identity and AccessManagement (IAM) team look after a suite of security tooling - enhancing and developing them continually to fit the needs of the business. You … have hands-on engineering experience of Identity and Accessmanagement products including but not inclusive of PrivilegedAccessManagement (PAM), MFA, SSO and Password Manager. Must have a broad knowledge and understanding of IT concepts and architectures including Cloud, system administration and delivery of security … that will help your money go further such as season ticket loans, cycle to work scheme, health cash plans, pay advance (where you can access some of your pay before pay day) as well access to a great range of discounts from hundreds of other retailers. And if More ❯
on the whole product lifecycle from ideation to delivery and in line with the organisation’s risk appetite and strategic direction. The Identity and AccessManagement (IAM) team look after a suite of security tooling - enhancing and developing them continually to fit the needs of the business. You … have hands-on engineering experience of Identity and Accessmanagement products including but not inclusive of PrivilegedAccessManagement (PAM), MFA, SSO and Password Manager. Must have a broad knowledge and understanding of IT concepts and architectures including Cloud, system administration and delivery of security … that will help your money go further such as season ticket loans, cycle to work scheme, health cash plans, pay advance (where you can access some of your pay before pay day) as well access to a great range of discounts from hundreds of other retailers. And if More ❯
are managed efficiently in line with any SLA’s. Delivery of IT Security services including (but not limited to) - Security Operations, Threat and Vulnerability Management, PrivilegedAccessManagement, Identity and AccessManagement, Data Loss Prevention, Network Security and Penetration Testing. Act as lead SME … on IT and Cyber Security Improvement Projects. Play an active role in IT projects and operational processes (e.g., change management, exception management) to assess from an IT security standpoint IT projects, changes and exceptions. Manage IT Security Incidents including forensic investigations. Provide direction and guidance acting as an … and Audit activities. Deliver technical security reviews to ensure technologies follow information security standards, regulatory requirements and best practices. Support architectural review processes, risk management and the quantification of technology risks. Experience: Significant experience in similar security operations roles. Industry recognised technical certifications such as CISSP, TOGAF, CCSP, GCIH More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
to £51,000 We are looking for an IDAM Analyst to play a crucial role in building and operating a new centralised Identity and AccessManagement (IDAM) solution. While architects and engineers will handle the technical aspects, this role requires a strong technical understanding of IDAM and the … business needs. Oversee identity governance , including Joiners, Movers, Leavers (JML) processes , role-based access control (RBAC) , and privilegedaccessmanagement (PAM) . Ensure authentication methods such as SSO, MFA, and identity federation are properly integrated and managed. Work with architects and engineers to support the implementation … Strong technical knowledge of IDAM , including identity governance, access control, and security policies . Experience with IAM frameworks such as RBAC, SSO, MFA, PAM, and identity lifecycle management . Ability to act as the ‘customer’ for an IDAM solution , influencing technical teams and ensuring the platform meets business More ❯
Cyberark Get the most complete Identity Security and AccessManagement Solutions that enable secure access across any device, anywhere, at just the right time. About CyberArk CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privilegedaccessmanagement, CyberArk provides the … region. In this role, you will work closely with our existing customer base and establish and design new standard approaches for any type of access for every identity – human and non-human. You will modernize access approaches to fit the newest trends and best practices in the market … enterprise applications, security management, systems management, identity management, and/or policy management solutions is preferred, especially in the IAM, PAM and IGA space. An understanding of security concepts and the development of security roles within organizations that meet functional, technical, and regulatory requirements. Industry recognized More ❯