IdentityandAccessManagement Senior Manager page is loaded IdentityandAccessManagement Senior Manager Apply locations Cambridge, United Kingdom London Cannon Street Time type: Full time Posted on: Posted 8 Days Ago Time left to apply: End … left to apply) Job requisition id: R010049 AVEVA is creating software trusted by over 90% of leading industrial companies. Position: IdentityandAccessManagement Senior Manager Location: Cambridge UK Employment type: Full-time regular Benefits: Competitive package with an attractive bonus incentive plan, regionally … R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user accessMore ❯
Central London. This is a senior role where you will be responsible for overseeing cyber security operations, with a particular focus on privileged accessmanagement, identityaccess governance, and incident response across my client’s banking arm and securities business under a … dual-hat arrangement. Role Responsibilities: Lead and oversee Privileged AccessManagement (CyberArk) andIdentityAccessManagement (RSA IGL) operations. Define and implement cyber security policies and governance frameworks in line with regulatory requirements (ISO 27001, NIST, FFIEC). Drive access … and implement remediation plans. Essential Skills and Experience: Experience in cyber security operations, identityaccessmanagement, and privileged access management. Deep knowledge of CyberArk, and other IAM/PAM solutions. Strong understanding of security governance frameworks (ISO 27001, NIST, FFIEC, FCA regulations More ❯
so that we're able to interact and collaborate in person. About the Role As an IAM Engineer you will be designing and implementing identity solutions across a variety of … SaaS and bespoke identity tooling. You will enable and continuously improve the automation of processes within the wider identityandaccessmanagement team and act as a liaison to the wider business, providing SME knowledge on identityandaccess … including authentication protocols, Identity Lifecycle Management, Privileged AccessManagement, Role Based Access Control andIdentity Governance Experience with automation and developer tooling (CI/CD) Experience with Infrastructure as Code (IaC) using tools such as Terraform Experience of More ❯
Are you ready to lead from the front and drive innovation in the Identity & AccessManagement (IAM) space? We're looking for a seasoned CyberArk Architect who has CDE-CPC ideally or experience with privilege Cloud, someone who can lead with vision, execute with … in: Identity Governance Privileged AccessManagement (PAM) AccessManagement Customer IdentityandAccessManagement (CIAM) Building and maintaining strong, collaborative relationships within the team Communicating clearly and confidently - both written and verbal - to deliver More ❯
London, England, United Kingdom Hybrid / WFH Options
McGregor Boyall
IdentityAccess Operations Management - SailPoint IIQ - Java Beanshell & Java (Expert level) - SQL Contract, 6 months initially ** Hybrid working 2 days office London Global financial services client is looking for an Identity & AccessManagement specialist with hands-on SailPoint More ❯
and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities andaccess permissions. Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure … Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication andAccess Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem-solving … the configuration of tools is secure and compliant with DCC Security standards. Automates and manages the creation, updating, and removal of user accounts andaccess rights across various systems and applications. Establishes and enforces policies and procedures for user access, ensuring appropriate levels of accessMore ❯
design, develop, and maintain core authentication and authorisation services. Your work will enhance the security and usability of identity governance workflows andaccessmanagement for Palantirians and our customers globally. Your approach will emphasise secure-by-design principles, embedding security considerations into every phase … You will also play a key role in mentoring teammates and leading projects, driving both individual and team growth. Core Responsibilities Architect and design new identityand security services with a focus on scalability and resiliency Develop scalable services for workforce, customer and workload authentication and authorisation Build … Azure and Google Cloud Platform (GCP) Design and build REST APIs that enable zero-touch, end-to-end automation of IdentityandAccessManagement resources Research and drive the implementation of secure authentication protocols (like passwordless auth) by collaborating with Security Engineers What We More ❯
City, UT, and London, UK). Who you are We're looking for a Senior Product Manager to drive innovation in our Practice Management team, building the essential tools that help medical practices operate seamlessly as businesses. You'll own and develop critical SaaS services like authentication and … control and authentication, balancing security, usability, and flexibility for different customer segments. Stay ahead of industry trends in identityandaccessmanagement (IAM), role-based access control (RBAC), and security best practices. Requirements Gathering and Prioritization Gather feedback from customers … e.g., GDPR, HIPAA, SOC 2). Collaborate with UX/UI designers and product marketing to create intuitive experiences for managing users, groups, andaccess rights. Product Execution and Delivery Define and maintain clear user stories, acceptance criteria, and technical requirements. Work with engineering teams in Agile sprints More ❯
in designing, implementing and managing advanced security solutions. With expertise in SOC engineering tools and one of either Cloud Security, IdentityandAccessManagement (IAM) or Threat Modelling, this role focuses on enhancing the security posture of organisations. The consultant will lead strategic security … robust cloud security architectures across multi-cloud platforms (AWS, Azure, Google Cloud). Design and deploy IAM solutions to ensure robust authentication, authorisation andaccess controls. Lead threat modelling exercises to identify, assess and mitigate risks in systems and applications. Lead the design, implementation and optimisation of SIEM … Cyber Security, with a significant portion in a leadership role. A background in SOC engineering tools combined with expertise in either cloud security, Identity & AccessManagement or threat modelling. Proficiency in cloud platforms and services (AWS, Azure, GCP) with deep knowledge of native security More ❯
from a single licence to large enterprises with thousands of users. This requires maintaining a software landscape that owns the identityandaccessmanagement, subscriptions & billing, conversion, retention optimisation and reconciliation with our financial systems. We support this infrastructure for current and future use … ensure that product decisions and planning are carried out in a scalable manner. The Senior Staff Engineer will challenge implementation, ensure execution alongside managementand establish a collaborative path with other tracks in the engineering organisation. Your Responsibilities Facilitate the overall architecture of our business systems across teams … your initiatives, impact, and creativity. 30 days of annual leave : we value your peace of mind. With 30 days off (excluding public holidays) andaccess to mental health resources, we make sure you're as strong mentally as you are professionally. Competitive benefits : just as our team spans More ❯
our systems and data. How will you make an impact? Security Tooling: Deploy, maintain, integrate, and perform initial configuration of security tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively. Incident Response: Lead incident response efforts … and respond to security events in real-time. Implement and maintain security tools and technologies to enhance our security posture. IdentityandAccessManagement: Manage user access controls, authentication mechanisms, andidentitymanagement systems to ensure appropriate levels … of accessand privilege. Have you got what it takes? At least 5 years of experience in information security, with a focus on hands-on security engineering and operations. In-depth knowledge of networking protocols, operating systems, and cloud technologies. Strong understanding of security principles, practices, and frameworks More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle." Experience: "5+ years experience in Hands-on ForgeRock developer experience with PingGateway, PingAM, PingIDM and PingDS working with Agile More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training modules. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on … managed objects. Scalability and performance optimisation of the ForgeRock OOTB and custom components. Partnering with security, product, engineering and compliance teams to embed identity-first principles to DevSecOps lifecycle.? PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training More ❯
PingIdentity ForgeRock stack (PingGateway, PingAM, PingIDM, PingDS), with certification or proof of completion of ForgeRock Deep-Dive 4xx training courses. IdentityandAccessManagement domain, tools, products, protocols, taxonomy, identitymanagement, authentication, authorization, identity federation, single sign on More ❯
priorities, and overseeing daily operations. Invest in the professional growth of team members by identifying training opportunities and skill-building activities. Budgeting and Resource Management: Manage the IT budget and allocate resources for various projects and operational needs. Evaluate costs and seek opportunities to optimise spending, including renegotiating … Service Level Agreements (SLAs) for IT support to maintain high service availability. Manage Okta IAM to ensure secure and efficient identityandaccess management. Security and Risk Management: Implement and manage security measures to protect IT systems and data, including establishing security policies and … monitoring for potential threats. Perform regular risk assessments and implement disaster recovery plans. Vendor and Stakeholder Management: Maintain relationships with technology vendors and service providers, negotiating contracts and reviewing performance. Collaborate with department heads and senior management, gathering feedback to align IT strategies with business needs. More ❯
Responsibilities: MFA Implementation using Microsoft Common (MS Entra ID) Microsoft Entra ID (formerly known as Azure AD) is a comprehensive identityandaccessmanagement solution. Implementing Multi-Factor Authentication (MFA) using Microsoft Entra ID involves several steps and considerations: Deployment Planning: Before starting the … deployment, it's essential to plan and ensure all prerequisites are met. This includes having a cloud-only identity environment or a hybrid identity scenario where user identities are synchronized between on-premises Active Directory and Microsoft Entra ID. Choosing Authentication Methods: Various methods can be … and voice call verification Configuration: Setting up MFA involves configuring policies and settings in the Microsoft Entra admin center. This includes creating Conditional Access policies to require MFA for specific users or groups and managing the authentication methods available in the tenant. User Experience: Ensuring a smooth user More ❯
as-Code (IaC) and automation Understanding of DevSecOps , CI/CD , and cloud-native design patterns Broad knowledge of cloud security, compliance, governance, andidentitymanagement Experience building scalable infrastructure solutions using services such as: Terraform/Deployment Manager/CloudFormation/Bicep Cloud networking, DNS … identityandaccessmanagement (IAM) GCP Landing Zones, cost optimisation strategies Background in developing and maintaining architectural standards and roadmaps Desirable: TOGAF certification and other relevant cloud certifications (Google Cloud Architect preferred, Azure, AWS) Public sector, healthcare or NHS-related project experience Familiarity with … clinical safety and risk management in digital health Participation in on-call operational support rotas This is a hands-on leadership role ideal for someone who thrives in complex environments and enjoys shaping future-ready cloud platforms. If you're passionate about automation, infrastructure design, and cloud excellence More ❯
key role in scaling and supporting global IT operations across EMEA. This is a hands-on role focused on infrastructure, identityandaccess, automation, and creating world-class internal systems. You’ll partner with product, security, and commercial teams while supporting a growing remote-first workforce … and London office. Key Responsibilities: Own identityandaccessmanagement systems, including configuration and ongoing support of Okta, SSO, and IAM policies Identify and implement automation across user lifecycle management, SaaS provisioning, and IT workflows Provide IT support coverage during EMEA hours … re Looking For: 3+ years in a support, systems engineer, or IT manager role at a software vendor Experience with identityandaccess tools such as Okta and SSO Strong knowledge of AWS environments Proficiency in macOS and MDM tools (e.g., Kandji, JAMF) Ability to write More ❯
infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk managementand mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain … s. Evaluate and implement CIS critical security controls where necessary. Provide input into cybersecurity strategic roadmap and annual budget. Adhere to applicable change management policy and procedure. Qualifications: Bachelor's degree required; advanced degree highly desirable. Candidates must possess significant analytical skills, which evolved from early academic training More ❯
West London, London, United Kingdom Hybrid / WFH Options
TCS
re seeking a talented Security Architect to lead Zero Trust Architecture initiatives for high-profile clients. If you're passionate about shaping secure, identity-centric networks, this role is your chance to make an impact while working in a flexible, collaborative environment. Your Mission as a Security Architect … the opportunity to collaborate in London up to two days a week. Key Responsibilities: Architect Zero Trust Systems: Build and implement cutting-edge, identity-driven security frameworks. Enhance Identity & AccessManagement (IAM): Deploy multi-factor authentication (MFA), least privilege access, and micro-segmentation. Fortify Network Security: Design network segmentation strategies and secure access using SASE and other advanced tools. Strengthen Cloud Security: Develop Zero Trust strategies for Azure and hybrid environments. Drive Risk Mitigation: Conduct risk More ❯
s Global Technology approaches Providing subject matter expertise and acting as incident lead in support of cyber security incidents Provide regular cadence of management reporting that identifies trends, priorities and opportunities for improvements which demonstrates a practice of continuous improvement and aligns to segment KPIs for the function … CISSP. Strong experience in technical cyber security role such as security analysis or engineering Excellent knowledge in key cyber security domains such as identityandaccessmanagement, risk management, network security and security operations Experience providing cyber subject-matter expertise for transformational … engaging and influencing stakeholders across departmental and organisational and global/segment stakeholders An excellent understanding of best practice within cyber security and risk management including standards such as ISO/IEC 27001, Cyber Essentials and NIST CSF Demonstrable creativity and a commitment to future-proofing processes andMore ❯
Senior Cyber Security Engineer – Investment Management 💰 £££ Competitive Day Rate | Contract with Perm Option 📍 Central London | Hybrid Working ✅ Senior-level Cyber Security Engineer ✅ Core security disciplines – infrastructure, cloud, identity, threat, risk ✅ Initial contract with an option to convert to permanent employment You'll be working for a … well-established investment management firm as a Senior Cyber Security Engineer , helping to shape and secure their growing tech environment. This is a hands-on, high-trust role where your broad security knowledge will directly impact infrastructure, cloud, data, and application integrity. The Role: Deliver security engineering across … network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & accessmanagement controls Lead on vulnerability remediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security engineering More ❯
being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging security … Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability … to rank and prioritize vulnerabilities and security recommendations appropriately within the context of the infrastructure and business processes. Experience maintaining identityandaccessmanagement systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Canada Life Group (UK) Ltd (The)
Experience of migrating on-premises infrastructure to the cloud and understanding the challenges involved Familiarity with cloud security best practices, identityandaccessmanagement (IAM), and encryption techniques Microsoft Azure certifications are a plus Observability Designing, implementing and day-to-day use of logging … ensuring high levels of security and scalability across all cloud environments. Enforce security best practices in AKS, including network policies, RBAC (Role-Based Access Control), and integration with Azure Active Directory Core Services Azure core services such as Azure Storage, including Blob, Azure VMs, Azure LB, Azure ASG … implement containerisation strategies using AKS and associated resources, employing tools such as Terraform and Azure Resource Manager (ARM) templates Develop the deployment, scaling, andmanagement of containerised applications in AKS, ensuring high availability and performance Administer and optimise Azure environments, including hands-on management of Azure More ❯
Kubernetes). Implement and maintain automated deployment pipelines, infrastructure as code (IaC), and configuration management tools (e.g., Terraform) to streamline provisioning andmanagement of cloud resources. Monitor, optimise, and troubleshoot cloud infrastructure performance, security, and costs, utilising monitoring tools and logging frameworks Implement and enforce cloud … security best practices, including identityandaccessmanagement (IAM), data encryption, network security, and compliance with industry regulations (e.g., GDPR, SEC, SOC2). What we look for Bachelor's degree or equivalent experience in Computer Science or related field Proven experience (3 years) as More ❯