Cyber Security IdAM Specialist
Listed on 2026-01-31
-
IT/Tech
Cybersecurity
This is a hybrid role based in our Bath head office, you'll be responsible for the design, implementation, and management of Identity and Access Management (IdAM) systems and processes to enhance the organisation's IdAM posture across on-premises, cloud, and hybrid environments.
What you'll do
As the technical specialist in this role, you'll be responsible for overseeing IdAM systems to ensure robust access control, regulatory compliance, and secure authentication practices.
The exciting role involves collaboration with IT, Security, and Governance teams to embed IdAM best practices into the organisation's infrastructure, addressing the diverse needs of on-premises, cloud, and hybrid environments.
Your main responsibilities will include:
- investigating and responding to identity-related security incidents, including unauthorized access and compromised accounts. Also, aid in analysing security events, incidents, and threats, by identifying root causes and developing effective countermeasures
- collaborating with the Security Coordination Centre (SCC) and Managed Security Service Provider (MSSP)
- keeping abreast of innovations in IdAM, including advancements in Zero Trust architecture, authentication protocols, and identity analytics
- where necessary, act as a ‘service manager' for a designated technology area
- monitoring logs for anomalies and analyzing access trends to configure identity analytics platforms to detect unusual patterns. Develop use cases and mechanisms within SIEM tooling, enabling proactive identification and remediation of threats
- providing timely updates and recommendations to senior management and stakeholders, enabling informed decision-making and proactive risk mitigation
- collaborating with Governance, Infrastructure, and Development teams to integrate secure-by-design principles into projects, processes, and existing technologies
- ensure new deployments and applications adhere to security standards and IdAM best practices
- continuously test the development and maintenance of secure build standards and profiles for both on-premise and cloud systems, while also guiding the secure configuration and management of various security tools, sensors, and architectures
- optimising and securing configurations for PAM systems and platforms such as Entra , Entra PIM, and third-party IdAM platforms
- performing regular maintenance and updates to IdAM tools and other tooling, including regular access and permission reviews
- proactively identifying areas for improvement by addressing IdAM-related security gaps, implementing risk-based conditional access, transitioning to Zero Trust models, and hardening configurations for systems such as Active Directory, Kerberos, and NTLM
- developing and maintaining detailed documentation, including security policies, procedures, playbooks, and incident reports
- supporting and mentoring colleagues in techniques, processes, and technical skills
- providing considered advice and guidance where security transgressions are detected, employing tact, care, and consideration.
What you'll need
- Knowledge of and skills with core tooling such as PAM, EPM, SIEM, EDR, and NDR platforms.
- Ability to mentor and support junior security team members and apprentices in offensive security techniques, processes, and best practices.
- Experience working on projects to deliver new or improving security solutions, with direct experience working on a range of security systems.
- Ability to use, manage, and maintain various cyber security products.
- Strong understanding of important security concepts and security best practices.
- Strong experience analysing events, incidents, and threats in cloud infrastructure.
- Strong experience analysing events, incidents, and threats in on-premise infrastructure.
- Hugely enthusiastic about security. Always keen to promote security awareness and always looking for areas where security may be improved.
- Strong written communication skills, with experience of documenting policies, procedures, security requirements, and reporting for consumption at all levels up to, and including, senior management.
- Strong verbal communication, with the ability to clearly explain security requirements and…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: