Senior Manager – IdentityandAccessManagement (IAM) Edinburgh - On-site 3 days per week Salary up to £110,000 + Car allowance 10-20% Performance-Based Join a prestigious consulting firm as a Senior Manager in IdentityandAccessManagement … escalation point for complex IAM solutions. Ideal for a solution architect or a seasoned IAM specialist, this role emphasizes leadership aptitude over prior management experience, allowing you to grow as a leader while driving IAM strategy. With client-facing exposure, you’ll collaborate closely with various clients across … today to join a high-impact team where your expertise and leadership potential will be recognized and rewarded. Senior Manager – IdentityandAccessManagement (IAM) Edinburgh - On-site 3 days per week Salary up to £110,000 + Car allowance 10-20% Performance-Based more »
Westminster, London, Westminster Abbey, United Kingdom Hybrid / WFH Options
Parliamentary Digital Services
The Opportunity Parliamentary Digital Services are seeking a highly skilled and experienced Principal Engineer: Digital Identity to join our team within the Platforms Directorate. As the Principal Engineer for Digital Identity, you will play a critical role in the design, implementation, and maintenance of core infrastructure … platforms. You will provide expert technical guidance and leadership to ensure secure, highly available, reliable, and performant digital identity platforms, enabling both Houses of Parliament to meet their strategic and business objectives. You will have - You are a technical subject matter expert with hands-on operational experience and … Solution such as Windows Direct Accessand/or Always On VPN. Zero Trust Architecture concepts for IdentityandAccess Management. PowerShell scripting would be desirable. - You set the technical direction, developing strategy, and supporting roadmaps which strive for continuous improvement of digital more »
Life on the team The Senior Specialist will be a key contributor to the IdentityandAccessManagement strategy within Computacenter, driving and delivering the authentication solutions required to provide access capabilities to all Computacenter employees, their partners and customers, and supporting … 3rd parties, into Computacenter systems. What you’ll do Delivering the solutions design of the operational service, including: • Delivering an Identity Lifecycle service to the business covering internal, external, guest and partner accounts. • Consulting on the identity security controls, including Conditional Access Policies, Multi … Good presentation and moderation skills; professional and convincing manner of appearance and expression; clear, targeted communication (verbal and written). • Good organisational and time management skills • Competent user of ServiceNow • Member of a professional body (CIISec, BCS, etc) • Hold DV Clearance or able to obtain Do you have more »
Additional Corporate Benefits Package Role: The Security Engineer reports to the Director of Information Security Operations and works closely with the Information Security Management team to implement and maintain our security controls and tools. Work with other departments to improve our security. Key Responsibilities: Develop and deploy tools … measures to protect against threats and attacks. Monitor and manage responses to security incidents with DLP security. Manage standard, third party and authorized identityaccess Implement, manage and enhance HSM key management infrastructure. External vulnerability patching, internal vulnerability patching, web application scanning and compliance … and manage IT s ystems of Azure, Defender (ATP), M365 and Windows. Experience with IdentityAccessandManagement (IDAM) solutions. CyberArk and ID ENTRAKnowledge of tools for restricted/remote accessand TS ENTRA portal, DUO SSO and MFAGood knowledge of network more »
Identity Engineer – Senior Consultant/Manager Location – UK Salary - £60,000-£85,000 (depending on experience and location) Clearance – DV preferably, Active SC minimum The Opportunity: Are you ready to play a pivotal role in some of the most ambitious programs aimed at safeguarding the nation? We are … aligns with your skillset and the needs of Defence and Security clients. Your responsibilities may include: • Designing, implementing, and maintaining IdentityandAccessManagement (IAM) solutions. • Developing and enforcing IAM policies and procedures. • Participating in access control, identitymanagement, and IAM-related audits and compliance activities. • Monitoring and analysing accessmanagement systems, investigating and resolving issues. • Supporting the creation of IAM documentation, training, and awareness programs. • Collaborating with cross-functional teams to ensure seamless IAM implementation and operations. • Staying informed about emerging security more »
Sign-On (SSO) capabilities. 💡 Key Highlights : Rate : £600/day (Inside IR35). Duration : Long-term contract. Domain : Enterprise-level IdentityandAccessManagement (IAM) solutions. Tech Stack : Microsoft technologies, notably Active Directory , Azure AD (Entra) , LDAP, authentication protocols, and SSO solutions. 🌟 The Role … As the Solution Architect , you will: Work closely with the Enterprise Architecture (EA) team to design and implement a unified staff identity solution. Leverage your expertise in the Microsoft stack to streamline identitymanagementand authentication processes. Design scalable solutions that integrate with Active … Azure AD , and Entra while addressing authentication challenges. 🎯 Your Profile : Proven experience as a Solution Architect , ideally with exposure to IdentityandAccessManagement (IAM). Deep knowledge of Active Directory , Azure AD (Entra) , LDAP , and modern authentication protocols. Strong understanding of Single Sign more »
Sign-On (SSO) capabilities. Key Highlights : Rate : £600/day (Inside IR35). Duration : Long-term contract. Domain : Enterprise-level IdentityandAccessManagement (IAM) solutions. Tech Stack : Microsoft technologies, particularly Active Directory , Azure AD (Entra) , LDAP, authentication protocols, and SSO solutions. The Role … As the Solution Architect , you will: Work closely with the Enterprise Architecture (EA) team to design and implement a unified staff identity solution. Leverage your expertise in the Microsoft stack to streamline identitymanagementand authentication processes. Design scalable solutions that integrate with Active … Azure AD , and Entra while addressing authentication challenges. Your Profile : Proven experience as a Solution Architect , ideally with exposure to IdentityandAccessManagement (IAM). Deep knowledge of Active Directory , Azure AD (Entra) , LDAP , and modern authentication protocols. Strong understanding of Single Sign more »
Identity Engineer An exciting opportunity has arisen for Identity Engineers at various levels to join a growing Technology & Transformation team, specialising in Cyber, Defence, and Security. Eligibility Requirements : All applicants must, at the minimum, be currently holding an Active SC Clearance within the Central Government/… national security. The position offers the chance to work on diverse, high-profile projects, collaborating with experts to deliver innovative IdentityandAccessManagement (IAM) solutions. Key responsibilities include : • Designing, implementing, and maintaining IAM solutions, including integration with other systems and applications. • Supporting the … development and enforcement of IAM policies and procedures. • Monitoring and analysing accessmanagement systems, resolving issues, and ensuring operational effectiveness. • Participating in IAM-related audits and compliance activities. • Documenting IAM processes and delivering training and awareness programmes. • Collaborating with cross-functional teams to deliver effective IAM more »
We are looking for an Identity & AccessManagement Administrator to join the Frontier team, based at Witham St Hughs on a permanent basis. We are open to hybrid options for this role, with the right candidate working 3 days from home and 2 days more »
identities and service accounts Assist in reporting on all aspects of the OKTA environments for security and audit requirements Support the implementation of strategic IDAM objectives in conjunction with the IDAM Architects Provide technical 2nd Line support to a wide user base Provide support to application integrations into the OKTA … authentication and authorisation Set Up Org2org and SCIM Configuration In OKTA Manage designated technical team members Maintain CMDB & Service Catalogue & technical documentation relating to IDAM configuration items Participate in the IDAM Change Management process What you'll need: Certified to OKTA Administrator level or equivalent in another Identity product. A good understanding of IDAM solutions, in particular: OKTA, Azure AD, Active Directory, G-Suite, AWS An understanding of SSO implementations including SAML/OpenID integrations Technical experience in IDAM support & implementations Experience with conditional access controls on accessmanagement solutions more »
innovative cybersecurity tools and platforms. Drive end-to-end cybersecurity projects, ensuring alignment with industry best practices. Provide expertise across key cybersecurity domains: Identity & AccessManagement, Security Operations, Risk Management, Threat Hunting, and Endpoint Security. Manage and optimise solutions like Azure Sentinel … security solutions like McAfee, Darktrace, Deepwatch, Duo/Ping, and malware reverse engineering tools. Expertise in data loss prevention, mobile security, and privileged accessmanagement … PAM). Demonstrated experience in cybersecurity frameworks and risk management. Proven ability to manage and deliver large-scale security projects. Exceptional communication and client management skills. If you’re a cybersecurity professional eager to tackle complex challenges for a global client base, apply today more »
to the end customer. Required Expertise The role requires subject matter expertise in planning and implementing Azure-based solutions. Azure Networking: Including private access to Azure services, network security (firewalls, VPN, SASE), and related components. Azure Enterprise Applications: Expertise in application delivery services and hybrid Active Directory (AD … and deploying Microsoft Active Directory, Azure Entra ID, ADFS, SAML, and associated authentication methods. Microsoft Security Practices: Including group policy design, machine hardening, andmanagement practices.Additional Knowledge Areas Enterprise Networking: Foundational understanding of core network design and infrastructure. Networking Principles: Including the use of 802.1x for network access control.Basic knowledge of Microsoft SQL architecture and integration with infrastructure technologies. IdentityandAccessManagement: Experience in designing identity, access, and privilege management for large-scale organizations. Familiarity with VMware, Hyper-V, and other virtualization platforms. more »
to the end customer. Required Expertise The role requires subject matter expertise in planning and implementing Azure-based solutions. Azure Networking: Including private access to Azure services, network security (firewalls, VPN, SASE), and related components. Azure Enterprise Applications: Expertise in application delivery services and hybrid Active Directory (AD … and deploying Microsoft Active Directory, Azure Entra ID, ADFS, SAML, and associated authentication methods. Microsoft Security Practices: Including group policy design, machine hardening, andmanagement practices.Additional Knowledge Areas Enterprise Networking: Foundational understanding of core network design and infrastructure. Networking Principles: Including the use of 802.1x for network access control.Basic knowledge of Microsoft SQL architecture and integration with infrastructure technologies. IdentityandAccessManagement: Experience in designing identity, access, and privilege management for large-scale organizations. Familiarity with VMware, Hyper-V, and other virtualization platforms. more »
Sheffield, England, United Kingdom Hybrid / WFH Options
Coforge
following areas: Data centre hardware infrastructure (servers, networking, storage) Security technologies such as firewalls, proxy servers, WAF, IDS/IPS, network segmentation tools IdentityAccessManagement (e.g. Active Directory, LDAP, Privileged AccessManagement tools) Continuous Integration/Continuous Delivery (e.g. more »
company A well known Financial Services company based in London Your new role A Senior Business Analyst who will assess IdentityandAccessManagement (IAM) business and technical requirements for access to systems, applications, and networks. What you'll need to succeed … Extensive hands-on experience as a Business Analyst in IdentityandAccessManagement (IAM), encompassing requirements gathering in technical settings, robust process mapping abilities, adeptness in identifying use cases, and proficiency in presenting to stakeholders across various levels Strong documentation and verbal communication skills more »
Senior Active Directory/IDAM Architect - Windows AD - AD tools - IDAM - DV Clearance - Up to £700 a day (Inside IR35) - Reading - 6+ months Location: Reading Area Rate: Up to £700 per day (Inside IR35) Security Clearance: DV Clearance Required Role Overview: We are looking for a Senior Active Directory/… maintenance of design and support documentation, and ensure designs produced can pass review and governance. Essential skills: Extensive experience in IdentityandAccessManagement technologies. Experience in MS Windows Enterprise technologies and architectures, along with PowerShell scripting and automation of these technologies. Some experience … in relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance andmore »
Senior Sales Role for an IdentityandAccessManagement Solutions Provider Gartner Magic Quadrant Technology Business Highly sought-after senior sales role Our last 2 hires have been promoted Boast many FTSE wins in the last 12 months Seeking Sales DNA and happy to … Huge growth and development prospects Fun and energetic environment The Candidate- New Business Sales Track Record Sold Relevant Technology – SDWAN, Security, ID andAccessManagement, Network Management Technology, Manages Services Strong P60’s Used to working in a leading edge technology space Ability to more »
Havering, Greater London, Romford Town, United Kingdom
Nextra Recruitment Limited
are seeking a Ping Developer with expertise in ForgeRock and PingOne Identity Cloud to lead and deliver advanced identityandaccessmanagement solutions. The ideal candidate will have extensive experience in setting up and configuring Ping One Identity Cloud, a … and the ability to lead a team and drive high-quality project deliverables. Key Responsibilities: Lead the design, setup, and configuration of PingOne Identity Cloud solutions. Provide expertise in ForgeRock products including OpenAM, OpenDJ, OpenIDM , and OpenIG . Take ownership of deliverables while leading a team of IAM … contribute to project scoping and planning. Qualifications : 15+ years of overall IT experience with 10+ years of hands-on expertise in ForgeRock and PingOne Identity Cloud. Strong skills in setting up and configuring PingOne Identity Cloud solutions. Proficiency in ForgeRock tools: OpenAM, OpenDJ, OpenIDM, OpenIG . more »
This role will be hybrid working, 3 days from onsite and 2 days from home The role: The IdentityandAccessManagement (IAM) Specialist is a pivotal role responsible for managing Client IT access through authentication, authorization, identity provisioning, and … ensuring compliance with underpinning audited controls. The IAM Specialist will ensure secure and efficient management of digital identities and approved access rights within an organization. This includes overseeing the timely creation, maintenance, and deactivation of user accounts, assist with implementing access control policies, and … Client's IT's current service provision to propose solutions. * Support IAM Manager in all internal and external auditory activities, including User and Privileged access recertification programmes. * Support in delivering a robust IT Joiners, Movers and Leavers Process to facilitate the onboarding/offboarding of Client identities. * Manage more »
Rugby, Warwickshire, United Kingdom Hybrid / WFH Options
MRP Technology Ltd
Permanent, Full-time - Hybrid Remote UK A large global organisation is seeking a Cyber Security Engineer to enhance the design, architecture, deployment, configuration andmanagement in security products and technologies within the organisation. This will be a permanent, Full time opportunity based in Rugby, United Kingdom. The position … be available for on-call anytime. Strong experience with minimum 8 years in multiple cybersecurity domains Mandatory experience in design, architecture, deployment, configuration andmanagement in security products and technologies listed below: - Proven experience in PAM tools, with focus on Endpoint Privilege Management (EAM) and PAM … management - Strong understanding of identityandaccessmanagement, security principles and privilege access controls - Implement and integrate EAM/PAM with different managementand authentication tools - Deploy and maintain accessand security policies via PAM - Coordinate more »
with team members and other departments across the organisation. The post holder will offer expert advice to develop and implement effective security risk management strategies, playing a crucial role in integrating pragmatic security controls into operational processes. Moreover, the individual will be tasked with developing, monitoring, maintaining, supporting … domains acquired through qualification or relevant industry experience. Experience of working with cyber security solutions. Specific experience of working with Security Information and Event Management (SIEM) solutions, vulnerability scanning solutions, threat protection solutions etc. Evidence of cyber security or other relevant work outside formal training or employment (voluntary … research, academia, social media etc). Desirable Leadership and team management experience. Experience of working in fields other than cyber security. Delivery of training to technical and non-technical employees. Report writing, procedure development and presentation delivery. Skills and Attributes Essential Excellent communication and interpersonal skills. Excellent problem more »
alignment roadmap for Corporate working closely with senior stakeholders, systems owners and 3 rd parties to deliver innovation. Lead day-to-day support andmanagement of the core business Applications Portfolio lifecycle including but not limited to Finance, Legal, Property, Pensions, Treasury, HR, Business Development, Payroll and our … applications service the wider businesses. Solve complex business problems with process and technology that cut across Corp group such as IdentityandAccess Management. Document and review IT standards, procedures and policies to ensure compliance with legal and regulatory requirements. Liaise with internal and external audit … progressive IT experience Experience of being in a practical solution planning and technical architecture design role is essential e.g. SaaS, IdentityandAccessManagement Good understanding of emerging and innovative technologies, how to shape, deliver and leverage those technologies Experience of architecture business capability more »
of us.” – Julie Sweet, Accenture CEO As a PAM Architect, you will: Architect and Design PAM Solutions : Develop and implement a robust Privileged AccessManagement (PAM) architecture tailored to the organization’s needs, including policies, processes, and tools for managing privileged accounts and access. Implementation : Lead … configuration of PAM solutions, such as CyberArk, BeyondTrust, or other relevant technologies, ensuring they are properly integrated with existing IT infrastructure. Risk Assessment andManagement : Conduct regular risk assessments related to privileged access, identifying potential security risks and vulnerabilities, and developing mitigation strategies. Governance and Compliance … GCP) and their specific PAM requirements. Set yourself apart: Deep understanding of PAM principles and best practices. Strong knowledge of identityandaccessmanagement (IAM), security frameworks, and regulatory requirements. Proficiency in scripting and automation (PowerShell, Python, etc.) for PAM tasks. Excellent problem-solving more »
for on-call anytime. Strong experience with min 8 years in multiple cybersecurity domains. Mandatory to have experience in design, architecture, deployment, configuration andmanagement in security products and technologies listed below: Proven experience in PAM tools, with focus or Arcon Endpoint Privilege Management (EAM) and … PAM management String understanding of identityandaccessmanagement, security principles and privilege access controls Implement and integrate Arcon EAM/PAM with different managementand authentication tools Deploy and maintain accessand security policies via … with proper RCA. Experience in GRC, compliance managementand audits. Knowledge of ITIL process in management incident, Change and problem management Provide/share and suggest all best practices across the domain Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps more »
for on-call anytime. Strong experience with min 8 years in multiple cybersecurity domains. Mandatory to have experience in design, architecture, deployment, configuration andmanagement in security products and technologies listed below: Proven experience in PAM tools, with focus or Arcon Endpoint Privilege Management (EAM) and … PAM management String understanding of identityandaccessmanagement, security principles and privilege access controls Implement and integrate Arcon EAM/PAM with different managementand authentication tools Deploy and maintain accessand security policies via … with proper RCA. Experience in GRC, compliance managementand audits. Knowledge of ITIL process in management incident, Change and problem management Provide/share and suggest all best practices across the domain Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps more »