Connect to your Industry Cyber Risk & Security. Everybody's talking about it. Every major corporation is concerned by it. The Government is investing £1.9 billion in tackling it. We're shaping strategies and transforming technology to minimise it and we need you to join us. You'll build strong relationships within a Cyber practice with over 200 extremely talented individuals. Our team brings together people who graduated in everything from Philosophy to Law, Maths and Computer Science. Join them and you will operate at the cutting edge, enjoying the kind of professional development that will set your potential free. At Deloitte, the Cyber Identity team help our clients assess, design, and implement Identity solutions to support digital change and reduce the risk of high impact cyber-attacks. Quite simply, the Identity team help ensure our client's business can expand and adapt to the changing digital and regulatory needs in a secure and complaint manner. Connect to your career at Deloitte Deloitte drives progress. Using our vast range of expertise, we help our clients' become leaders wherever they choose to compete. To do this, we invest in outstanding people. We build teams of future thinkers, with diverse talents and backgrounds, and empower them all to reach for and achieve more. What brings us all together at Deloitte? It's how we approach the thousands of decisions we make every day. How we behave, our beliefs and our attitudes. In other words: our values. Whatever we do, wherever we are in the world, we lead the way, serve with integrity, take care of each other, foster inclusion, and collaborate for measurable impact. These five shared values lead every decision we make and action we take, guiding us to deliver impact how and where it matters most. Connect to your opportunity You will have a passion and curiosity, for cyber and technology, comfortable with operating in a fastpaced environment where you will define and lead the implementation of various identity solutions that enable our clients explore new business opportunities, while reducing the risk of these changes. As an IAM technical specialist/lead, you will be responsible for: Engagement Delivery: Leading large and complex IAM engagements, you will be well versed in the Identity lifecycle and concepts as well as alignment of requirements to security frameworks like NIST. Supporting clients to define and develop their identity projects and programmes, from current state review through to CIAM strategies, roadmap development, and execution of activities to mobilise projects and programmes. Project and programme delivery, covering solution requirements definition, solution architecture, high and low-level design development, solution build / configuration / deployment / integration, supported by testing and hand-over to business as usual operational teams. Form part of digital transformation and enterprise recovery engagements delivering IAM solutions and remediation activity. Deliver broader cyber engagements where needed (across related disciplines like architecture, data security and application security) Market Development: Distilling complex technical matters into simple narratives to drive and lead conversations with senior client stakeholders. Ongoing client engagement / relationship management - building and maintaining client relationships in support of account targeting. Opportunity pursuit - engaging with clients to capture problem statements / solution requirements, developing client propositions / solutions, defining detailed delivery timelines, resource requirements and cost estimates, and supporting client pitch activity. Working with FS sector leadership to shape and refine both existing and new IAM market propositions / offerings. Connect to your skills and professional experience Whilst a bachelor's degree (or equivalent) in Computer Science or Engineering is desirable, we are more interested in your real-world professional experience and your ability to turn this into impactful client outcomes. Technical Skills: The skills we want you to ultimately have will cover: Broad enterprise identity experience across Enterprise and Customer Authentication, with demonstrable ability to build identity strategies which integrate into client enterprise architectures and beyond. Experience working in a digital transformation environment supporting the definition of Identity architecture leveraging cloud native and/or other IAM solutions. Advanced, practical experience of a variety of CIAM solutions such as ForgeRock, Ping, Microsoft Azure B2C, Okta, and Auth0 or equivalent. Advanced, practical experience of cloud hosting services including, Amazon Web Services, Microsoft Azure, Google Cloud Platform. Hands-on experience of Microsoft Active Directory/Azure AD Domain Services, Federation Services, Certificate Services, DNS and DHCP or equivalent. Hands-on experience of implementation of OAuth, OIDC and JWTs. Understanding of decentralised identity, verifiable credentials, microservices and Trust over IP architecture stack. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and presentations. Consulting Skills: Project management - Experience with waterfall and agile type methodologies, often working within client specified frameworks. Delivery team management: Managing teams across a mix of locations, cultures, and experience levels. Client stakeholder management - Strong communication and relationship skills to manage a variety of client stakeholders from CISO to Developer. In addition to the above the following are desirable: Consulting or equivalent background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, ECCouncil etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.). Role based access control (RBAC) design. Practical experience with Linux operating systems. Experience with Modern Authentication concepts e.g. Self-Service Identity, Bring your own Identity, SCIM, SAML, WS-Federation, OAuth, Open ID Connect or equivalent. Ability to hold Security Clearance. Connect to your business - Technology and Transformation Distinctive thinking, deep expertise, innovation and collaborative working. That's what connects us. That's what makes us Deloitte. If you want to help solve some of the biggest tech and transformational challenges around, join us. Together, we'll make an impact that matters. Cyber The modern world is more complex than ever before, and we are navigating an ever-changing landscape. We help clients to operate with resilience and grow with confidence to secure success and minimise risk. Personal independence Regulation and controls are standard practice in our industry and Deloitte is no exception. These controls provide important legal protection for both you and the firm. We are subject to a number of audit regulations, one of which requires that certain colleagues abide by specific personal independence constraints (e.g., in relation to any financial interests and employment relationships). This can mean that you and your "Immediate Family Members" are not permitted to hold certain financial interests (shares, funds, bonds etc.) with audit clients of the firm, and also prohibitions on certain employment relationships (e.g., you are not permitted to hold a secondary employment role with SEC audit clients of the firm whilst being employed by the firm). The recruitment team will provide further detail as you progress through the recruitment process or you can contact the Independence team upon request. Connect with your colleagues "Join Deloitte and you'll be guiding major clients to their best technology and process decisions. You'll work at the cutting edge, with some of the finest minds in this field, and be able to take your career in any direction." - Deloitte employee "At Deloitte, is collaboration that sets us apart. Our scale and structure mean you can draw on all kinds of expertise from across our entire global business and behave as a true business partner for your clients." - Deloitte employee Our hybrid working policy You'll be based in London with hybrid working. At Deloitte we understand the importance of balancing your career alongside your home life. That's why we'll support you to work flexibly through our hybrid working policy. Depending on the requirements of your role, you'll have the opportunity to work in your local office, virtual collaboration spaces, client sites and remotely. You'll get the chance to meet face to face when needed, while you collaborate and learn from colleagues, share your experiences, and build the relationships that will fuel your career and prioritise your wellbeing. Please check with your recruiter for the specific working requirements that may apply for your role. Connect to your return to work opportunity Are you looking to return to the workplace after an extended career break? For this role we can offer coaching and support designed for returners to refresh your knowledge and skills . click apply for full job details
Mar 07, 2026
Full time
Connect to your Industry Cyber Risk & Security. Everybody's talking about it. Every major corporation is concerned by it. The Government is investing £1.9 billion in tackling it. We're shaping strategies and transforming technology to minimise it and we need you to join us. You'll build strong relationships within a Cyber practice with over 200 extremely talented individuals. Our team brings together people who graduated in everything from Philosophy to Law, Maths and Computer Science. Join them and you will operate at the cutting edge, enjoying the kind of professional development that will set your potential free. At Deloitte, the Cyber Identity team help our clients assess, design, and implement Identity solutions to support digital change and reduce the risk of high impact cyber-attacks. Quite simply, the Identity team help ensure our client's business can expand and adapt to the changing digital and regulatory needs in a secure and complaint manner. Connect to your career at Deloitte Deloitte drives progress. Using our vast range of expertise, we help our clients' become leaders wherever they choose to compete. To do this, we invest in outstanding people. We build teams of future thinkers, with diverse talents and backgrounds, and empower them all to reach for and achieve more. What brings us all together at Deloitte? It's how we approach the thousands of decisions we make every day. How we behave, our beliefs and our attitudes. In other words: our values. Whatever we do, wherever we are in the world, we lead the way, serve with integrity, take care of each other, foster inclusion, and collaborate for measurable impact. These five shared values lead every decision we make and action we take, guiding us to deliver impact how and where it matters most. Connect to your opportunity You will have a passion and curiosity, for cyber and technology, comfortable with operating in a fastpaced environment where you will define and lead the implementation of various identity solutions that enable our clients explore new business opportunities, while reducing the risk of these changes. As an IAM technical specialist/lead, you will be responsible for: Engagement Delivery: Leading large and complex IAM engagements, you will be well versed in the Identity lifecycle and concepts as well as alignment of requirements to security frameworks like NIST. Supporting clients to define and develop their identity projects and programmes, from current state review through to CIAM strategies, roadmap development, and execution of activities to mobilise projects and programmes. Project and programme delivery, covering solution requirements definition, solution architecture, high and low-level design development, solution build / configuration / deployment / integration, supported by testing and hand-over to business as usual operational teams. Form part of digital transformation and enterprise recovery engagements delivering IAM solutions and remediation activity. Deliver broader cyber engagements where needed (across related disciplines like architecture, data security and application security) Market Development: Distilling complex technical matters into simple narratives to drive and lead conversations with senior client stakeholders. Ongoing client engagement / relationship management - building and maintaining client relationships in support of account targeting. Opportunity pursuit - engaging with clients to capture problem statements / solution requirements, developing client propositions / solutions, defining detailed delivery timelines, resource requirements and cost estimates, and supporting client pitch activity. Working with FS sector leadership to shape and refine both existing and new IAM market propositions / offerings. Connect to your skills and professional experience Whilst a bachelor's degree (or equivalent) in Computer Science or Engineering is desirable, we are more interested in your real-world professional experience and your ability to turn this into impactful client outcomes. Technical Skills: The skills we want you to ultimately have will cover: Broad enterprise identity experience across Enterprise and Customer Authentication, with demonstrable ability to build identity strategies which integrate into client enterprise architectures and beyond. Experience working in a digital transformation environment supporting the definition of Identity architecture leveraging cloud native and/or other IAM solutions. Advanced, practical experience of a variety of CIAM solutions such as ForgeRock, Ping, Microsoft Azure B2C, Okta, and Auth0 or equivalent. Advanced, practical experience of cloud hosting services including, Amazon Web Services, Microsoft Azure, Google Cloud Platform. Hands-on experience of Microsoft Active Directory/Azure AD Domain Services, Federation Services, Certificate Services, DNS and DHCP or equivalent. Hands-on experience of implementation of OAuth, OIDC and JWTs. Understanding of decentralised identity, verifiable credentials, microservices and Trust over IP architecture stack. Detail oriented and strong problem-solving skills. Excellent oral and written communication skills including concisely communicating status and creating customer reports and presentations. Consulting Skills: Project management - Experience with waterfall and agile type methodologies, often working within client specified frameworks. Delivery team management: Managing teams across a mix of locations, cultures, and experience levels. Client stakeholder management - Strong communication and relationship skills to manage a variety of client stakeholders from CISO to Developer. In addition to the above the following are desirable: Consulting or equivalent background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, ECCouncil etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.). Role based access control (RBAC) design. Practical experience with Linux operating systems. Experience with Modern Authentication concepts e.g. Self-Service Identity, Bring your own Identity, SCIM, SAML, WS-Federation, OAuth, Open ID Connect or equivalent. Ability to hold Security Clearance. Connect to your business - Technology and Transformation Distinctive thinking, deep expertise, innovation and collaborative working. That's what connects us. That's what makes us Deloitte. If you want to help solve some of the biggest tech and transformational challenges around, join us. Together, we'll make an impact that matters. Cyber The modern world is more complex than ever before, and we are navigating an ever-changing landscape. We help clients to operate with resilience and grow with confidence to secure success and minimise risk. Personal independence Regulation and controls are standard practice in our industry and Deloitte is no exception. These controls provide important legal protection for both you and the firm. We are subject to a number of audit regulations, one of which requires that certain colleagues abide by specific personal independence constraints (e.g., in relation to any financial interests and employment relationships). This can mean that you and your "Immediate Family Members" are not permitted to hold certain financial interests (shares, funds, bonds etc.) with audit clients of the firm, and also prohibitions on certain employment relationships (e.g., you are not permitted to hold a secondary employment role with SEC audit clients of the firm whilst being employed by the firm). The recruitment team will provide further detail as you progress through the recruitment process or you can contact the Independence team upon request. Connect with your colleagues "Join Deloitte and you'll be guiding major clients to their best technology and process decisions. You'll work at the cutting edge, with some of the finest minds in this field, and be able to take your career in any direction." - Deloitte employee "At Deloitte, is collaboration that sets us apart. Our scale and structure mean you can draw on all kinds of expertise from across our entire global business and behave as a true business partner for your clients." - Deloitte employee Our hybrid working policy You'll be based in London with hybrid working. At Deloitte we understand the importance of balancing your career alongside your home life. That's why we'll support you to work flexibly through our hybrid working policy. Depending on the requirements of your role, you'll have the opportunity to work in your local office, virtual collaboration spaces, client sites and remotely. You'll get the chance to meet face to face when needed, while you collaborate and learn from colleagues, share your experiences, and build the relationships that will fuel your career and prioritise your wellbeing. Please check with your recruiter for the specific working requirements that may apply for your role. Connect to your return to work opportunity Are you looking to return to the workplace after an extended career break? For this role we can offer coaching and support designed for returners to refresh your knowledge and skills . click apply for full job details
The Role We are transforming our Information Security program from a compliance-based checklist to a dynamic, risk-based operation. We are looking for a Senior Policy Administrator to lead the modernization of our governance framework.This is not a clerical role. You will not just be formatting Word documents. You will be a strategic partner to our Security Architecture and Engineering teams, translating complex technical controls (Cloud Security, Identity, Zero Trust) into clear, enforceable standards. You will serve as the bridge between "What the Framework says" (NIST/TPN) and "What the Architecture does." Key Responsibilities 1. Governance Framework Architecture Build the Engine: Design and maintain the comprehensive hierarchy of Information Security documents ( Policy o Standard o Procedure o Guideline ). Ensure the framework is scalable, searchable, and mapped to the NIST CSF 2.0 and ISO 27001 controls. Lifecycle Management: Move beyond "annual reviews." Implement a continuous review cycle triggered by architectural changes or emerging threats, ensuring our standards never drift from reality. 2. Security Architecture Collaboration (Critical) Technical Translation: Work side-by-side with Principal Security Architects to extract technical specifications (e.g., encryption algorithms, IAM protocols, cloud hardening baselines) and codify them into formal Security Standards . Reality Checks: Challenge the status quo. If a proposed policy cannot be technically enforced by the Architecture team, you are responsible for flagging the gap and negotiating a realistic control or a formal risk exception. Baseline Management: Assist Engineering in defining and documenting "Golden Image" and secure configuration baselines (CIS Benchmarks) that underpin the broader policy statements. 3. LogicGate & Tooling Administration Platform Architect: Serve as the primary architect for our LogicGate Risk Cloud Policy Module. You will design the metadata schema, automated workflows, and approval routing logic. Automated Assurance: Configure the tool to link Policies directly to Risks and Controls . When a Standard is updated, the tool should automatically flag related Risks for re-evaluation. 4. Compliance & TPN Alignment TPN "Gold Shield": Ensure all policies meet the strict physical and digital security requirements of the Trusted Partner Network (TPN) . You will be the authority on whether a policy change jeopardizes our "Gold Shield" status. Audit Defense: Maintain a "state of readiness" where policies are tagged with evidence requirements, allowing for rapid export during client or regulatory audits. Qualifications Required Experience: Experience: 5-8+ years in Information Security, GRC, or Technical Writing in a highly regulated technical environment. Frameworks: Expert-level knowledge of NIST CSF 2.0 , ISO 27001 , and NIST 800-53 . Familiarity with TPN (MPA) or SOC 2 is highly preferred. Technical Fluency: You do not need to be a coder, but you must understand core security concepts (e.g., SAML Container Security , Network Segmentation ) well enough to debate standards with Engineers. Skills & Competencies: LogicGate / GRC Tools: Proven experience configuring and managing enterprise GRC platforms (LogicGate, ServiceNow, Archer, OneTrust). Strategic Autonomy: Ability to manage the entire document lifecycle without micromanagement. You can sit in an Architecture Review Board meeting and identify policy impacts in real-time. Communication: Exceptional written communication skills with the ability to strip away "legalese" and write policies that developers can actually read and follow. Nice-to-Have: Certifications: CISA , CRISC , CISM , or CISSP . Experience in the Video Game, Media, or Software Development industries. Why This Role? You will be the "Legislator" of our security state. Instead of chasing signatures, you will be defining the rules of the road for a global creative organization. If you are tired of "paper compliance" and want to build a governance framework that actually improves security posture, this is the role for you.
Mar 05, 2026
Full time
The Role We are transforming our Information Security program from a compliance-based checklist to a dynamic, risk-based operation. We are looking for a Senior Policy Administrator to lead the modernization of our governance framework.This is not a clerical role. You will not just be formatting Word documents. You will be a strategic partner to our Security Architecture and Engineering teams, translating complex technical controls (Cloud Security, Identity, Zero Trust) into clear, enforceable standards. You will serve as the bridge between "What the Framework says" (NIST/TPN) and "What the Architecture does." Key Responsibilities 1. Governance Framework Architecture Build the Engine: Design and maintain the comprehensive hierarchy of Information Security documents ( Policy o Standard o Procedure o Guideline ). Ensure the framework is scalable, searchable, and mapped to the NIST CSF 2.0 and ISO 27001 controls. Lifecycle Management: Move beyond "annual reviews." Implement a continuous review cycle triggered by architectural changes or emerging threats, ensuring our standards never drift from reality. 2. Security Architecture Collaboration (Critical) Technical Translation: Work side-by-side with Principal Security Architects to extract technical specifications (e.g., encryption algorithms, IAM protocols, cloud hardening baselines) and codify them into formal Security Standards . Reality Checks: Challenge the status quo. If a proposed policy cannot be technically enforced by the Architecture team, you are responsible for flagging the gap and negotiating a realistic control or a formal risk exception. Baseline Management: Assist Engineering in defining and documenting "Golden Image" and secure configuration baselines (CIS Benchmarks) that underpin the broader policy statements. 3. LogicGate & Tooling Administration Platform Architect: Serve as the primary architect for our LogicGate Risk Cloud Policy Module. You will design the metadata schema, automated workflows, and approval routing logic. Automated Assurance: Configure the tool to link Policies directly to Risks and Controls . When a Standard is updated, the tool should automatically flag related Risks for re-evaluation. 4. Compliance & TPN Alignment TPN "Gold Shield": Ensure all policies meet the strict physical and digital security requirements of the Trusted Partner Network (TPN) . You will be the authority on whether a policy change jeopardizes our "Gold Shield" status. Audit Defense: Maintain a "state of readiness" where policies are tagged with evidence requirements, allowing for rapid export during client or regulatory audits. Qualifications Required Experience: Experience: 5-8+ years in Information Security, GRC, or Technical Writing in a highly regulated technical environment. Frameworks: Expert-level knowledge of NIST CSF 2.0 , ISO 27001 , and NIST 800-53 . Familiarity with TPN (MPA) or SOC 2 is highly preferred. Technical Fluency: You do not need to be a coder, but you must understand core security concepts (e.g., SAML Container Security , Network Segmentation ) well enough to debate standards with Engineers. Skills & Competencies: LogicGate / GRC Tools: Proven experience configuring and managing enterprise GRC platforms (LogicGate, ServiceNow, Archer, OneTrust). Strategic Autonomy: Ability to manage the entire document lifecycle without micromanagement. You can sit in an Architecture Review Board meeting and identify policy impacts in real-time. Communication: Exceptional written communication skills with the ability to strip away "legalese" and write policies that developers can actually read and follow. Nice-to-Have: Certifications: CISA , CRISC , CISM , or CISSP . Experience in the Video Game, Media, or Software Development industries. Why This Role? You will be the "Legislator" of our security state. Instead of chasing signatures, you will be defining the rules of the road for a global creative organization. If you are tired of "paper compliance" and want to build a governance framework that actually improves security posture, this is the role for you.
Define the global AI & Intelligent Automation strategy, fully aligned with enterprise digital transformation and innovation goals. Establish governance frameworks for AI ethics, model transparency, and Responsible AI, ensuring adherence to regulatory and risk requirements (e.g., NIST AI RMF, EU AI Act). Serve as the senior executive sponsor for AI architecture, operating model design, and enterprise adoption roadmap. Enterprise AI & GenAI Ecosystem (not exhaustive or limiting) Oversee the design and deployment of enterprise grade AI solutions using Python, .NET, and cloud native MLOps pipelines. Direct teams working with advanced frameworks such as PyTorch, TensorFlow, Hugging Face, ONNX Runtime, and LangChain, along with orchestration tools including Semantic Kernel, LangGraph, and CrewAI. Drive responsible integration of Large Language Models (LLMs) from OpenAI, Anthropic, Google Gemini, and Mistral, including deployment through Azure OpenAI Service or Vertex AI. Implement RAG architectures and manage vector databases (Pinecone, Weaviate, FAISS, Milvus) to power enterprise knowledge intelligence platforms. Lead the evolution of the enterprise data landscape using modern platforms such as Databricks, Snowflake, Azure Synapse, and BigQuery. Oversee data engineering with Apache Airflow, dbt, and Prefect, ensuring performance, governance, and alignment with enterprise metadata standards (Collibra, Alation, Microsoft Purview). Drive adoption of Delta Lake, Iceberg, and Hudi to support scalable data lakehouse architectures. Ensure high quality, compliant, and reliable data foundations for ML and analytics workloads. Cloud, Infrastructure & MLOps Champion multi cloud architecture across Azure, AWS, and GCP. Ensure resilient, secure, and cost efficient deployments using Docker, Kubernetes (AKS/EKS/GKE), and Terraform/Bicep. Lead enterprise MLOps capabilities using Azure ML, SageMaker, Vertex AI, MLflow, and Kubeflow, integrated with CI/CD (GitHub Actions, Azure DevOps, Jenkins, Argo CD). Oversee observability and monitoring using Prometheus, Grafana, ELK/EFK, and OpenTelemetry. Enterprise Integration with .NET Ecosystems Guide the integration of AI/ML pipelines into enterprise scale .NET Core applications and service oriented architectures. Modernize legacy systems through microservices, REST/gRPC APIs, and event driven architectures (Azure Service Bus, Kafka). Implement secure DevSecOps practices-SonarQube, Checkmarx, Vault, Azure API Management-in line with enterprise compliance standards. Drive end to end intelligent automation initiatives using Power Automate, Blue Prism, and Automation Anywhere. Integrate cognitive services (Azure Cognitive Services, AWS Comprehend, Form Recognizer, Speech/Translation APIs) to enhance workflow intelligence. Lead enterprise process mining using Celonis, Power BI Process Mining, and ProcessGold. Oversee integration of analytics and AI capabilities to deliver measurable business impact. Advance analytics maturity using Power BI, Looker, and Azure Analysis Services. Promote predictive and optimisation modelling using PyCaret, Prophet, and Optuna to strengthen data driven decision making. Security, Compliance & Responsible AI Ensure alignment with enterprise security frameworks (SOC2, ISO27001, NIST). Oversee identity and access management via Azure AD, OAuth2, OpenID Connect, and enterprise IAM systems. Champion ethical AI practices, including bias detection, explainability, and responsible use frameworks such as the Azure Responsible AI Dashboard. Build and lead high performing global teams across data science, engineering, and automation. Foster a culture of innovation, continuous learning, and responsible experimentation. Engage with the broader AI ecosystem-including academia, hyperscalers, and startups-to identify emerging technologies and partnership opportunities. Preferred Background Proven experience integrating Python based AI with enterprise .NET ecosystems. Deep expertise across multi cloud environments, data governance, and enterprise grade DevSecOps. Demonstrated success delivering large scale transformation programs with measurable ROI. Strong executive presence with exceptional communication and stakeholder management skills.
Mar 03, 2026
Full time
Define the global AI & Intelligent Automation strategy, fully aligned with enterprise digital transformation and innovation goals. Establish governance frameworks for AI ethics, model transparency, and Responsible AI, ensuring adherence to regulatory and risk requirements (e.g., NIST AI RMF, EU AI Act). Serve as the senior executive sponsor for AI architecture, operating model design, and enterprise adoption roadmap. Enterprise AI & GenAI Ecosystem (not exhaustive or limiting) Oversee the design and deployment of enterprise grade AI solutions using Python, .NET, and cloud native MLOps pipelines. Direct teams working with advanced frameworks such as PyTorch, TensorFlow, Hugging Face, ONNX Runtime, and LangChain, along with orchestration tools including Semantic Kernel, LangGraph, and CrewAI. Drive responsible integration of Large Language Models (LLMs) from OpenAI, Anthropic, Google Gemini, and Mistral, including deployment through Azure OpenAI Service or Vertex AI. Implement RAG architectures and manage vector databases (Pinecone, Weaviate, FAISS, Milvus) to power enterprise knowledge intelligence platforms. Lead the evolution of the enterprise data landscape using modern platforms such as Databricks, Snowflake, Azure Synapse, and BigQuery. Oversee data engineering with Apache Airflow, dbt, and Prefect, ensuring performance, governance, and alignment with enterprise metadata standards (Collibra, Alation, Microsoft Purview). Drive adoption of Delta Lake, Iceberg, and Hudi to support scalable data lakehouse architectures. Ensure high quality, compliant, and reliable data foundations for ML and analytics workloads. Cloud, Infrastructure & MLOps Champion multi cloud architecture across Azure, AWS, and GCP. Ensure resilient, secure, and cost efficient deployments using Docker, Kubernetes (AKS/EKS/GKE), and Terraform/Bicep. Lead enterprise MLOps capabilities using Azure ML, SageMaker, Vertex AI, MLflow, and Kubeflow, integrated with CI/CD (GitHub Actions, Azure DevOps, Jenkins, Argo CD). Oversee observability and monitoring using Prometheus, Grafana, ELK/EFK, and OpenTelemetry. Enterprise Integration with .NET Ecosystems Guide the integration of AI/ML pipelines into enterprise scale .NET Core applications and service oriented architectures. Modernize legacy systems through microservices, REST/gRPC APIs, and event driven architectures (Azure Service Bus, Kafka). Implement secure DevSecOps practices-SonarQube, Checkmarx, Vault, Azure API Management-in line with enterprise compliance standards. Drive end to end intelligent automation initiatives using Power Automate, Blue Prism, and Automation Anywhere. Integrate cognitive services (Azure Cognitive Services, AWS Comprehend, Form Recognizer, Speech/Translation APIs) to enhance workflow intelligence. Lead enterprise process mining using Celonis, Power BI Process Mining, and ProcessGold. Oversee integration of analytics and AI capabilities to deliver measurable business impact. Advance analytics maturity using Power BI, Looker, and Azure Analysis Services. Promote predictive and optimisation modelling using PyCaret, Prophet, and Optuna to strengthen data driven decision making. Security, Compliance & Responsible AI Ensure alignment with enterprise security frameworks (SOC2, ISO27001, NIST). Oversee identity and access management via Azure AD, OAuth2, OpenID Connect, and enterprise IAM systems. Champion ethical AI practices, including bias detection, explainability, and responsible use frameworks such as the Azure Responsible AI Dashboard. Build and lead high performing global teams across data science, engineering, and automation. Foster a culture of innovation, continuous learning, and responsible experimentation. Engage with the broader AI ecosystem-including academia, hyperscalers, and startups-to identify emerging technologies and partnership opportunities. Preferred Background Proven experience integrating Python based AI with enterprise .NET ecosystems. Deep expertise across multi cloud environments, data governance, and enterprise grade DevSecOps. Demonstrated success delivering large scale transformation programs with measurable ROI. Strong executive presence with exceptional communication and stakeholder management skills.
Deerfoot Recruitment Solutions Limited
City, London
Identity & Access Management Engineer London (Hybrid) - 3 Days Onsite Per Week up to 80,000 + Benefits + Bonus Banking Sector Are you ready to safeguard one of the world's largest financial institutions? We're looking for a talented IAM Engineer to enforce security policies across banking and securities operations for a global leader. This is your chance to own critical access controls, mature privileged access systems, and make a real impact on enterprise security. What you'll do: Provide engineering support for RSA IGL Identity Access Management application Create and mature access reviews, implement privileged access controls Investigate/resolve incidents, manage operational queries (passwords, access issues) Maintain knowledge base/SOPs, contribute to process improvements and knowledge transfer Some Active Directory management and least privilege access enforcement What you need: Practical RSA IGL (or similar IAM) experience SQL/PSQL, Oracle, REST/SOAP web services, JAVA/JSP, HTML/CSS/JS basics Linux/Windows servers, SQL/Oracle databases Excellent attention to detail, communication skills, PowerShell scripting Incident management experience, Microsoft Office proficiency Desirable: ISO27001/NIST knowledge, Splunk/ServiceNow/SailPoint, 24/7 shift flexibility Location: London with hybrid working model (3 days in the office per week) If you've held any of these roles or used these technologies/skills, this role could be a great fit: Identity Access Management Engineer, IAM Engineer, RSA IGL Engineer, Cyber Security Engineer, Privileged Access Management Specialist, Identity Governance, SailPoint, Splunk, ServiceNow, ISO27001, NIST, financial services security. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate 1 to The Born Free Foundation. We are a Climate Action Workforce in partnership with Ecologi. If this role isn't right for you, explore our referral reward program with payouts at interview and placement milestones. Visit our website for details. Deerfoot Recruitment Solutions Ltd is acting as an Employment Agency in relation to this vacancy.
Feb 27, 2026
Full time
Identity & Access Management Engineer London (Hybrid) - 3 Days Onsite Per Week up to 80,000 + Benefits + Bonus Banking Sector Are you ready to safeguard one of the world's largest financial institutions? We're looking for a talented IAM Engineer to enforce security policies across banking and securities operations for a global leader. This is your chance to own critical access controls, mature privileged access systems, and make a real impact on enterprise security. What you'll do: Provide engineering support for RSA IGL Identity Access Management application Create and mature access reviews, implement privileged access controls Investigate/resolve incidents, manage operational queries (passwords, access issues) Maintain knowledge base/SOPs, contribute to process improvements and knowledge transfer Some Active Directory management and least privilege access enforcement What you need: Practical RSA IGL (or similar IAM) experience SQL/PSQL, Oracle, REST/SOAP web services, JAVA/JSP, HTML/CSS/JS basics Linux/Windows servers, SQL/Oracle databases Excellent attention to detail, communication skills, PowerShell scripting Incident management experience, Microsoft Office proficiency Desirable: ISO27001/NIST knowledge, Splunk/ServiceNow/SailPoint, 24/7 shift flexibility Location: London with hybrid working model (3 days in the office per week) If you've held any of these roles or used these technologies/skills, this role could be a great fit: Identity Access Management Engineer, IAM Engineer, RSA IGL Engineer, Cyber Security Engineer, Privileged Access Management Specialist, Identity Governance, SailPoint, Splunk, ServiceNow, ISO27001, NIST, financial services security. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate 1 to The Born Free Foundation. We are a Climate Action Workforce in partnership with Ecologi. If this role isn't right for you, explore our referral reward program with payouts at interview and placement milestones. Visit our website for details. Deerfoot Recruitment Solutions Ltd is acting as an Employment Agency in relation to this vacancy.
Cyber Security Engineer Up to 58,000 plus excellent pension and holiday entitlement Hybrid - 2 days on site - Manchester About the Role I'm working with a Manchester-based public sector organisation who are seeking a cyber security engineer to work alongside security architects and project teams on exciting projects, implementations and designs. This role comes with excellent training and progression opportunities, and is therefore a great opportunity for someone looking to take their security engineering skillset into the projects, design and architecture space. The ideal candidate will have an understanding of architecture and secure by design principles, and will have experience implementing security controls and integrating security engineering best practices and into agile and DevOps processes. Key Responsibilities Working alongside security architects and project teams to assess designs, uncover potential risks, and integrate security best practice Taking responsibility for deploying security controls across projects and operational environments Configuring assets across a multi-cloud environment Converting architectural designs into practical actions and processes Integrating security into agile and DevSecOps processes Ensuring projects and designs are secure by design, and being actively involved in creating and implementing the controls to ensure this is the case Monitor emerging trends and technologies, evaluating their potential for future adoption within the security strategy. Apply foundational security principles to new technologies and unconventional scenarios while enabling organisational objectives. What We're Looking For SIEM/SOAR: Proficiency in SIEM concepts, data source integration, and creating SOAR runbooks. Security Stack : Hands-on with EDR, XDR, WAF, and email security solutions. Preferred Vendors: Experience with Crowdstrike, Palo Alto, and the Microsoft Defender suite is highly beneficial. Emerging Tech: Awareness of AI security risks and familiarity with DevSecOps practices. Infrastructure & System Security: Proficient in identifying and mitigating vulnerabilities within system hardware, software, and infrastructure components. Identity & Access Management (IAM): Practical expertise in PIM, PAM, RBAC, concepts and their real-world application. Network & Data Security: Proficiency in firewalls, encryption (data at rest and in transit), and how to defend against malware across enterprise services. Security Architecture & Design: Ability to translate high-level architectural designs into practical, low-level technical solutions while ensuring they are "secure by design". Cloud & Endpoint Security: Developing expertise in cloud technologies and securing diverse platforms including Windows, Linux, and macOS. M365: Experience in improving Secure Score and recommending securing products like SharePoint Online. Assurance: Experience in assuring deployments met security design. Package Up to 58,000 per annum 29 days annual leave excluding bank holidays 21% pension Career development opportunities and access to accredited qualifications Additional benefits available What to do now If you're interested in this opportunity, click apply and send an up-to-date copy of your CV. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
Feb 27, 2026
Full time
Cyber Security Engineer Up to 58,000 plus excellent pension and holiday entitlement Hybrid - 2 days on site - Manchester About the Role I'm working with a Manchester-based public sector organisation who are seeking a cyber security engineer to work alongside security architects and project teams on exciting projects, implementations and designs. This role comes with excellent training and progression opportunities, and is therefore a great opportunity for someone looking to take their security engineering skillset into the projects, design and architecture space. The ideal candidate will have an understanding of architecture and secure by design principles, and will have experience implementing security controls and integrating security engineering best practices and into agile and DevOps processes. Key Responsibilities Working alongside security architects and project teams to assess designs, uncover potential risks, and integrate security best practice Taking responsibility for deploying security controls across projects and operational environments Configuring assets across a multi-cloud environment Converting architectural designs into practical actions and processes Integrating security into agile and DevSecOps processes Ensuring projects and designs are secure by design, and being actively involved in creating and implementing the controls to ensure this is the case Monitor emerging trends and technologies, evaluating their potential for future adoption within the security strategy. Apply foundational security principles to new technologies and unconventional scenarios while enabling organisational objectives. What We're Looking For SIEM/SOAR: Proficiency in SIEM concepts, data source integration, and creating SOAR runbooks. Security Stack : Hands-on with EDR, XDR, WAF, and email security solutions. Preferred Vendors: Experience with Crowdstrike, Palo Alto, and the Microsoft Defender suite is highly beneficial. Emerging Tech: Awareness of AI security risks and familiarity with DevSecOps practices. Infrastructure & System Security: Proficient in identifying and mitigating vulnerabilities within system hardware, software, and infrastructure components. Identity & Access Management (IAM): Practical expertise in PIM, PAM, RBAC, concepts and their real-world application. Network & Data Security: Proficiency in firewalls, encryption (data at rest and in transit), and how to defend against malware across enterprise services. Security Architecture & Design: Ability to translate high-level architectural designs into practical, low-level technical solutions while ensuring they are "secure by design". Cloud & Endpoint Security: Developing expertise in cloud technologies and securing diverse platforms including Windows, Linux, and macOS. M365: Experience in improving Secure Score and recommending securing products like SharePoint Online. Assurance: Experience in assuring deployments met security design. Package Up to 58,000 per annum 29 days annual leave excluding bank holidays 21% pension Career development opportunities and access to accredited qualifications Additional benefits available What to do now If you're interested in this opportunity, click apply and send an up-to-date copy of your CV. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at (url removed)
About the Role: The Red Team TechOps Engineer will join a non-billable R&D team dedicated to supporting Red Team activities in client networks that simulate known threat actors. This Red Team helps CrowdStrike customers identify and reduce gaps in their ability to deter malicious activity. We're looking for an engineer that will enable the success of the Red Team by maintaining, managing, and supporting development of our technology stack. Although this position is primarily remote, there may be times where infrastructure support for our team may require in-person support at our Reading UK office (less than 10%). What You'll Do: Serve as a primary infrastructure point of contact for the EMEA and META regions. Provide reactive infrastructure support when issues arise to allow Red Team operators to maintain productivity on their engagements. Proactively review our infrastructure looking for gaps and improvements. Maintain and administer Windows and Linux systems. Ensure our systems are compliant with IT and security policies. Ensure users adhere to our guidelines, standards, and policies. Participate in team discussions for system improvements and assist with planning future upgrades. Build IaC projects that tie into a larger ecosystem. Document infrastructure projects as our technologies evolve. Share responsibilities on administration and development. What You'll Need: A proven track record empowering operational teams and maintaining production systems. Experience with Windows and Linux system administration. Experience developing scripts and projects in Python and Bash. Confidence operating and navigating a Unix-based machine through the command line interface. Experience administering Cloud services (AWS, Azure, GCP). Experience using AWS services like CloudTrail, EC2, S3, and IAM. Experience creating, reading, and updating AWS IAM policies. Experience using Git. Working knowledge of networking protocols, authentication methods, and privileges. Familiarity of security standards and architecture including systems hardening, role based access control. Familiarity with encryption and proper handling of sensitive data / secrets. Familiarity with IdP management and integrating/federating authentication with custom services/apps (SAML, OIDC, etc.). Working knowledge of Linux/Mac file systems, daemons, and shell environments is a plus. Practical experience deploying C2 infrastructure and redirectors is a plus. Security community participation (conference speaker or tool contributor) is a plus. Familiarity with the following is a plus: Ansible, Docker, Jenkins, LogScale, Terraform. An open mind and enthusiasm to learn the parts of our technology stack that are new to you. Bonus Points: Strong problem solving and critical thinking skills. Excellent oral and written communications skills in English. 3+ years of relevant system administration experience (some skills will be learned on the job). Ability to maintain discretion related to sensitive work (both internally and externally). Ability to be receptive to peer review and conform to project-specific conventions. Ability to explain topics you are familiar with at different abstraction levels. Ability to manage infrastructure projects from conception to ongoing maintenance. Ability to handle high pressure situations in a productive and professional manner. Ability to simultaneously consider multiple (sometimes opposing) perspectives. Ability to apply best practices (but flexible to bend conventions when appropriate). Ability to form conclusions driven by data and evidence, in addition to intuition. Interest in knowing something about everything, and everything about something. Interest in developing solutions with a systems-level thinking approach. Interest in integrating knowledge from various non-cybersecurity domains is a plus. Interdisciplinary educational background (outside of cybersecurity) is a plus. Passion to understand and develop solutions requiring diverse skills. You are not required to be an expert in every skill, but should maintain an interest in how they are connected. Location : Hybrid (90% Remote / 10% Reading UK) Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
Feb 26, 2026
Full time
About the Role: The Red Team TechOps Engineer will join a non-billable R&D team dedicated to supporting Red Team activities in client networks that simulate known threat actors. This Red Team helps CrowdStrike customers identify and reduce gaps in their ability to deter malicious activity. We're looking for an engineer that will enable the success of the Red Team by maintaining, managing, and supporting development of our technology stack. Although this position is primarily remote, there may be times where infrastructure support for our team may require in-person support at our Reading UK office (less than 10%). What You'll Do: Serve as a primary infrastructure point of contact for the EMEA and META regions. Provide reactive infrastructure support when issues arise to allow Red Team operators to maintain productivity on their engagements. Proactively review our infrastructure looking for gaps and improvements. Maintain and administer Windows and Linux systems. Ensure our systems are compliant with IT and security policies. Ensure users adhere to our guidelines, standards, and policies. Participate in team discussions for system improvements and assist with planning future upgrades. Build IaC projects that tie into a larger ecosystem. Document infrastructure projects as our technologies evolve. Share responsibilities on administration and development. What You'll Need: A proven track record empowering operational teams and maintaining production systems. Experience with Windows and Linux system administration. Experience developing scripts and projects in Python and Bash. Confidence operating and navigating a Unix-based machine through the command line interface. Experience administering Cloud services (AWS, Azure, GCP). Experience using AWS services like CloudTrail, EC2, S3, and IAM. Experience creating, reading, and updating AWS IAM policies. Experience using Git. Working knowledge of networking protocols, authentication methods, and privileges. Familiarity of security standards and architecture including systems hardening, role based access control. Familiarity with encryption and proper handling of sensitive data / secrets. Familiarity with IdP management and integrating/federating authentication with custom services/apps (SAML, OIDC, etc.). Working knowledge of Linux/Mac file systems, daemons, and shell environments is a plus. Practical experience deploying C2 infrastructure and redirectors is a plus. Security community participation (conference speaker or tool contributor) is a plus. Familiarity with the following is a plus: Ansible, Docker, Jenkins, LogScale, Terraform. An open mind and enthusiasm to learn the parts of our technology stack that are new to you. Bonus Points: Strong problem solving and critical thinking skills. Excellent oral and written communications skills in English. 3+ years of relevant system administration experience (some skills will be learned on the job). Ability to maintain discretion related to sensitive work (both internally and externally). Ability to be receptive to peer review and conform to project-specific conventions. Ability to explain topics you are familiar with at different abstraction levels. Ability to manage infrastructure projects from conception to ongoing maintenance. Ability to handle high pressure situations in a productive and professional manner. Ability to simultaneously consider multiple (sometimes opposing) perspectives. Ability to apply best practices (but flexible to bend conventions when appropriate). Ability to form conclusions driven by data and evidence, in addition to intuition. Interest in knowing something about everything, and everything about something. Interest in developing solutions with a systems-level thinking approach. Interest in integrating knowledge from various non-cybersecurity domains is a plus. Interdisciplinary educational background (outside of cybersecurity) is a plus. Passion to understand and develop solutions requiring diverse skills. You are not required to be an expert in every skill, but should maintain an interest in how they are connected. Location : Hybrid (90% Remote / 10% Reading UK) Benefits of Working at CrowdStrike: Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified across the globeCrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs on valid job requirements.If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.
At Holland & Barrett , Our shift to a fully cloud-native organisation has created a rich mix of internal, partner, and customer-facing systems. To secure this at scale, we're building a modern IAM capability from the ground up - and we're looking for a hands-on IAM Engineer to help bring it to life. This is a greenfield IAM engineering role with real technical ownership. You'll help design, implement, and run identity services that go far beyond basic access control - focusing on governance, automation, and least-privilege access, without slowing the business down. The Role As an IAM Engineer , you'll be a core technical contributor within our IAM function. You'll work hands-on with modern identity platforms, integrating applications, automating identity lifecycle processes, and strengthening controls across our entire digital estate - from workforce IAM to CIAM and privileged access. You'll collaborate closely with the IAM Manager, security teams, and application owners to make identity simple, secure, and scalable. What You'll Do Implement, configure, and operate our IAM platforms and tooling Integrate internal, partner, and customer-facing applications into central IAM Configure and manage MFA, PAM, and segregation of duties controls Automate identity lifecycle processes (joiner, mover, leaver, access reviews) Enforce least privilege through fine-grained access controls Troubleshoot complex identity and access issues Contribute to IAM architecture and technical roadmap Key requirements: Hands-on experience as an IAM Engineer or similar role Strong experience with platforms such as Okta, Azure AD, SailPoint, CyberArk Solid understanding of SAML, OAuth, and OpenID Connect (OIDC) Experience scripting and automating IAM processes (e.g. Python, PowerShell ) Exposure to both enterprise IAM and CIAM environments Strong problem-solving skills and a collaborative mindset Why Holland & Barrett? Build an IAM platform from scratch with real technical impact Work with modern identity tooling in a cloud-native environment A purpose-led business focused on health and wellbeing If you're a hands-on IAM engineer who enjoys building secure, scalable identity platforms, we'd love to hear from you. What we offer: What we offer: Health Cash Plan Life Assurance Incentive Scheme - Based on company & personal performance Virtual GP Private Medical care Holiday Purchase option Access to 'Wellhub' with gyms, studios and wellbeing apps Discounts & Savings 25% Colleague Discount with FREE Standard Delivery Exclusive Discounts from a wide range of partners £/€50 Annual Product Allowance to spend in store Learning & Development Access to a variety of learning opportunities, including Level 2-5 Apprenticeships, Workshops and our Digital Learning Library AND MORE! Holland and Barrett is an equal opportunity employer. We welcome diverse perspectives and are committed to creating an inclusive environment for all colleagues. We understand that when our colleagues are listened to, respected and valued for who they are, we build anorganisationwith belonging at its heart - making health and wellness a way of life for everyone. Holland & Barrett does not accept unsolicited resumes from search firms/recruiters. Please do not forward resumes to our job alias, employees, or any other company location. Holland & Barrett is not and will not be responsible for any fees if a candidate submitted by a search firm/recruiter unless otherwise agreed with respect to specific open position(s). Vacancy Alerts Create an alert subscription based on this vacancy
Feb 24, 2026
Full time
At Holland & Barrett , Our shift to a fully cloud-native organisation has created a rich mix of internal, partner, and customer-facing systems. To secure this at scale, we're building a modern IAM capability from the ground up - and we're looking for a hands-on IAM Engineer to help bring it to life. This is a greenfield IAM engineering role with real technical ownership. You'll help design, implement, and run identity services that go far beyond basic access control - focusing on governance, automation, and least-privilege access, without slowing the business down. The Role As an IAM Engineer , you'll be a core technical contributor within our IAM function. You'll work hands-on with modern identity platforms, integrating applications, automating identity lifecycle processes, and strengthening controls across our entire digital estate - from workforce IAM to CIAM and privileged access. You'll collaborate closely with the IAM Manager, security teams, and application owners to make identity simple, secure, and scalable. What You'll Do Implement, configure, and operate our IAM platforms and tooling Integrate internal, partner, and customer-facing applications into central IAM Configure and manage MFA, PAM, and segregation of duties controls Automate identity lifecycle processes (joiner, mover, leaver, access reviews) Enforce least privilege through fine-grained access controls Troubleshoot complex identity and access issues Contribute to IAM architecture and technical roadmap Key requirements: Hands-on experience as an IAM Engineer or similar role Strong experience with platforms such as Okta, Azure AD, SailPoint, CyberArk Solid understanding of SAML, OAuth, and OpenID Connect (OIDC) Experience scripting and automating IAM processes (e.g. Python, PowerShell ) Exposure to both enterprise IAM and CIAM environments Strong problem-solving skills and a collaborative mindset Why Holland & Barrett? Build an IAM platform from scratch with real technical impact Work with modern identity tooling in a cloud-native environment A purpose-led business focused on health and wellbeing If you're a hands-on IAM engineer who enjoys building secure, scalable identity platforms, we'd love to hear from you. What we offer: What we offer: Health Cash Plan Life Assurance Incentive Scheme - Based on company & personal performance Virtual GP Private Medical care Holiday Purchase option Access to 'Wellhub' with gyms, studios and wellbeing apps Discounts & Savings 25% Colleague Discount with FREE Standard Delivery Exclusive Discounts from a wide range of partners £/€50 Annual Product Allowance to spend in store Learning & Development Access to a variety of learning opportunities, including Level 2-5 Apprenticeships, Workshops and our Digital Learning Library AND MORE! Holland and Barrett is an equal opportunity employer. We welcome diverse perspectives and are committed to creating an inclusive environment for all colleagues. We understand that when our colleagues are listened to, respected and valued for who they are, we build anorganisationwith belonging at its heart - making health and wellness a way of life for everyone. Holland & Barrett does not accept unsolicited resumes from search firms/recruiters. Please do not forward resumes to our job alias, employees, or any other company location. Holland & Barrett is not and will not be responsible for any fees if a candidate submitted by a search firm/recruiter unless otherwise agreed with respect to specific open position(s). Vacancy Alerts Create an alert subscription based on this vacancy
Ernst & Young Advisory Services Sdn Bhd
Manchester, Lancashire
Senior Manager, Cyber Security, Identity , TC UKI Location: London Other locations: Primary Location Only Date: 13 Jan 2026 Requisition ID: At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Cyber security and its related challenges are a rapidly growing field.As such, the opportunities for careers in cyber security are also growing. Securing an organisation against cyber threats is a business priority to enable growth and successful digital transformation and we are at the heart of many of these conversations and projects. EY is rapidly expanding its cyber security consulting practice to further support these exiting opportunities At EY, we have large scale plans to expand our alreadymarket leading Cyber Security practice and anticipate continued growth throughout the next five years. We need excellent people to join us and be part of our exciting growth strategy. At EY,you'll have the chance to build a meaningful and fulfilling career, with global scale, support, inclusive culture and technology, to become the best version of you. The team you join - EY's UK & Ireland Cyber Practice - is part of a global cyber team of 5,000+ professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identity and access management, security architecture, data protection and privacy, and resilience services. We are part of a wider advisory organisation that collectively comprises a $4B, and growing, global consulting practice with 18,000 professionals. Join us and build an exceptional experience for yourself, and a better working world for all. Location - London, Manchester or Scotland The opportunity EY is seeking experienced team members who can review, design and deliver Cyber Identity and Access Management (IAM) services. You will take a key position in delivering EY's cyber security and IAM capabilities. You will also take a supporting role in building out EY's IAM cyber services, working with alliance partners and advising clients on current market trends. The role will see you providing specialist advice as part of large multi-discipline EY engagement teams working on the likes of cyber transformation and migration, leading specific security engagements advising on the adoption of secure architecture blueprints, secure software engineering practices, or optimising cyber defence operations. You will work with colleagues in the UK and globally to develop new and innovative IAM security solutions and specific industry propositions that solve client problems/issues and integrate with their overall IT delivery and support strategy. You will also have opportunities to work across multiple aspects of Cyber, Technology and business solutions. Responsibilities, Qualifications, Certifications - External Your key responsibilities Your responsibilities will include but are not limited to: Managing a portfolio of IAM engagements with our clients, responsible for day to day running of the engagements including meeting quality, time and budget targets Working with prospective clients to agree, scope and plan the delivery phase of engagements Contributing to developing the market for IAM across all sectors, identifying sales opportunities and working with senior practice and market leaders in the creation of proposals and marketing material Developing team members by sharing knowledge, mentoring and coaching them and leading by example Creating thought leadership and market materials for selling and promoting EY Cyber and IAM Security offering Skills and attributes for success Be professional, quicklyestablishing personal credibility and demonstrating expertise Be a good communicator with the ability to contribute assuredly to IAM business and technical security discussions with peers Be a team player who is not only looking to enhance their own career but recognising the value of teamwork, facilitating and encouraging collaboration amongst team members, and is capable of motivating teams to maximise performance Take a practical approach to solving issues and gaining client agreement Be able to analyse complex problems and to deliver insightful, practical and sustainable solutions. Be confident and effective in recognising and managing potential issues during client assignments Structure and manage projects which meet client expectations and mitigate any risks or issues To qualify for theroleyou must have: Exposure across one or more of the following: Identity Governance, Access Management, Privileged Access Management, Consumer Identity, OT IAM Worked with one or more of the following IAM technologies: Saviynt, Clear Skye, SailPoint, CyberArk, Entra, OneIdentity, BeyondTrust, Okta, Ping, ForgeRock Project management experience on IAM solution deployments (waterfall and/or agile) IAM controls governance frameworks over processes, controls, organisation and infrastructure Ideally,you'll also have IAM business analysis experience IAM assessment, strategy and roadmap development experience Design experience for IAM solutions on client transformations Key sector experience in one or more of the following: Government & Public sector / Energy & Utilities / Retail and Consumer products / Life sciences / Telecoms, Media and Technology / Transport Experience managing and coaching others in the development and delivery of complex client solutions and/or proposition development What we look for Core consulting skills: Advanced data and evidence management, client management on remediation programmes, driving innovation and continuous improvement Technical skills: Strong technical insight, practical knowledge and specialist capability Market/Sector knowledge: Demonstrable market/sector expertise in your field Versatility: Proven ability to adapt and learn in an innovative environment Please note The successful candidate must undergo and pass checks in line with SC (Security Check) clearance standards after joining EY. These checks may include, but are not limited to, verification of identity, right to work in the UK, employment history, proof of address may be required and unspent criminal convictions. Candidates must be a UK national or have been a resident in the UK for a minimum of five years and ensure that they have not spent more than six months outside the UK. What we offer EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Continuous learning:You'll develop the mindset and skills to navigate whatever comes next. Success as defined by you:We'll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We'll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture:You'll be embraced for who you are and empowered to use your voice to help others find theirs. If you can demonstrate that you meet the criteria above, please contact us as soon as possible. The exceptional EY experience. It's yours to build. Apply now. TCCyberUKI2026 Cyber2026 EY Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. Select how often (in days) to receive an alert: EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
Feb 14, 2026
Full time
Senior Manager, Cyber Security, Identity , TC UKI Location: London Other locations: Primary Location Only Date: 13 Jan 2026 Requisition ID: At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Cyber security and its related challenges are a rapidly growing field.As such, the opportunities for careers in cyber security are also growing. Securing an organisation against cyber threats is a business priority to enable growth and successful digital transformation and we are at the heart of many of these conversations and projects. EY is rapidly expanding its cyber security consulting practice to further support these exiting opportunities At EY, we have large scale plans to expand our alreadymarket leading Cyber Security practice and anticipate continued growth throughout the next five years. We need excellent people to join us and be part of our exciting growth strategy. At EY,you'll have the chance to build a meaningful and fulfilling career, with global scale, support, inclusive culture and technology, to become the best version of you. The team you join - EY's UK & Ireland Cyber Practice - is part of a global cyber team of 5,000+ professionals focused on developing and delivering cutting edge security transformation programmes, cyber threat management, identity and access management, security architecture, data protection and privacy, and resilience services. We are part of a wider advisory organisation that collectively comprises a $4B, and growing, global consulting practice with 18,000 professionals. Join us and build an exceptional experience for yourself, and a better working world for all. Location - London, Manchester or Scotland The opportunity EY is seeking experienced team members who can review, design and deliver Cyber Identity and Access Management (IAM) services. You will take a key position in delivering EY's cyber security and IAM capabilities. You will also take a supporting role in building out EY's IAM cyber services, working with alliance partners and advising clients on current market trends. The role will see you providing specialist advice as part of large multi-discipline EY engagement teams working on the likes of cyber transformation and migration, leading specific security engagements advising on the adoption of secure architecture blueprints, secure software engineering practices, or optimising cyber defence operations. You will work with colleagues in the UK and globally to develop new and innovative IAM security solutions and specific industry propositions that solve client problems/issues and integrate with their overall IT delivery and support strategy. You will also have opportunities to work across multiple aspects of Cyber, Technology and business solutions. Responsibilities, Qualifications, Certifications - External Your key responsibilities Your responsibilities will include but are not limited to: Managing a portfolio of IAM engagements with our clients, responsible for day to day running of the engagements including meeting quality, time and budget targets Working with prospective clients to agree, scope and plan the delivery phase of engagements Contributing to developing the market for IAM across all sectors, identifying sales opportunities and working with senior practice and market leaders in the creation of proposals and marketing material Developing team members by sharing knowledge, mentoring and coaching them and leading by example Creating thought leadership and market materials for selling and promoting EY Cyber and IAM Security offering Skills and attributes for success Be professional, quicklyestablishing personal credibility and demonstrating expertise Be a good communicator with the ability to contribute assuredly to IAM business and technical security discussions with peers Be a team player who is not only looking to enhance their own career but recognising the value of teamwork, facilitating and encouraging collaboration amongst team members, and is capable of motivating teams to maximise performance Take a practical approach to solving issues and gaining client agreement Be able to analyse complex problems and to deliver insightful, practical and sustainable solutions. Be confident and effective in recognising and managing potential issues during client assignments Structure and manage projects which meet client expectations and mitigate any risks or issues To qualify for theroleyou must have: Exposure across one or more of the following: Identity Governance, Access Management, Privileged Access Management, Consumer Identity, OT IAM Worked with one or more of the following IAM technologies: Saviynt, Clear Skye, SailPoint, CyberArk, Entra, OneIdentity, BeyondTrust, Okta, Ping, ForgeRock Project management experience on IAM solution deployments (waterfall and/or agile) IAM controls governance frameworks over processes, controls, organisation and infrastructure Ideally,you'll also have IAM business analysis experience IAM assessment, strategy and roadmap development experience Design experience for IAM solutions on client transformations Key sector experience in one or more of the following: Government & Public sector / Energy & Utilities / Retail and Consumer products / Life sciences / Telecoms, Media and Technology / Transport Experience managing and coaching others in the development and delivery of complex client solutions and/or proposition development What we look for Core consulting skills: Advanced data and evidence management, client management on remediation programmes, driving innovation and continuous improvement Technical skills: Strong technical insight, practical knowledge and specialist capability Market/Sector knowledge: Demonstrable market/sector expertise in your field Versatility: Proven ability to adapt and learn in an innovative environment Please note The successful candidate must undergo and pass checks in line with SC (Security Check) clearance standards after joining EY. These checks may include, but are not limited to, verification of identity, right to work in the UK, employment history, proof of address may be required and unspent criminal convictions. Candidates must be a UK national or have been a resident in the UK for a minimum of five years and ensure that they have not spent more than six months outside the UK. What we offer EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Continuous learning:You'll develop the mindset and skills to navigate whatever comes next. Success as defined by you:We'll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We'll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture:You'll be embraced for who you are and empowered to use your voice to help others find theirs. If you can demonstrate that you meet the criteria above, please contact us as soon as possible. The exceptional EY experience. It's yours to build. Apply now. TCCyberUKI2026 Cyber2026 EY Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. Select how often (in days) to receive an alert: EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.