Identity and Access Management Consultant
Role details
Job location
Tech stack
Job description
Join our dynamic team as an Identity and Access Management Consultant, where you will play a pivotal role in transforming the security landscape for our diverse clientele. You will lead multi-stream cyber-security uplift programmes across various customer environments, ensuring the delivery of innovative and high-quality identity, access, and resilience improvements. This is an exciting opportunity to collaborate with talented technical teams and influential stakeholders to create secure-by-design outcomes that protect vital digital assets., Lead Innovative Deployments: Spearhead the deployment of cutting-edge solutions such as Privileged Identity Management (PIM) and Conditional Access updates to enhance security posture.
- Champion Adoption: Drive the adoption of tools like Microsoft Authenticator and facilitate seamless Single Sign-On integration for a streamlined user experience.
- Shape Security Strategies: Oversee the onboarding of Defender for Identity and design Zero-Trust technology frameworks that safeguard our clients' environments.
- Enhance Operational Resilience: Reduce data footprints and integrate with our Security Operations Center (SOC) to bolster incident readiness.
- Govern with Excellence: Ensure robust governance practices, clear documentation, and effective communication throughout every customer workstream.
- Focus on Continuous Improvement: Lead initiatives that drive measurable progress in security maturity and operational resilience, paving the way for a smooth transition into Business As Usual (BAU) support.
Requirements
Do you have experience in SSO?, * Cyber-Security Expertise: A strong understanding of cyber-security principles, identity governance, and privileged access is essential to excel in this role.
- Microsoft Security Acumen: Familiarity with technologies such as PIM, Conditional Access, Defender for Identity, Authenticator, and Defender for Cloud Apps.
- Project Delivery Excellence: Proven ability to manage multiple workstreams effectively in a fast-paced environment.
- Integration Insight: Ability to navigate technology integrations and dependencies, ensuring seamless design and onboarding outputs.
- Compliance Knowledge: Understanding how security and privacy compliance requirements (CIS, ISO27001, NIST CSF, GDPR, NIS, etc.) inform security design.
- Exceptional Communication Skills: Strong stakeholder engagement and problem-solving abilities, complemented by clear delivery documentation.
- Proven Track Record: Experience delivering impactful cyber-security or technology-risk programmes that enhance client security.
- Customer-Focused Delivery: A history of managing customer-facing projects in technical or security-focused environments.
- Structured Project Management: Proficient in producing comprehensive project artefacts (RAID logs, plans, reports, acceptance documents).
Professional Qualifications (Essential / Desirable)
- Essential: Microsoft security certifications (e.g., SC 300, SC 200, SC 100 or AZ 500).
- Desirable: Recognized cyber security certifications such as CISSP, CISM, CISMP or SSCP; additional specialist certifications (e.g., CCSP, CCSK) depending on solution depth required.
Benefits & conditions
The budgeted salary for this role is between £60,000 - £65,000