Active Directory / IAM Security Consultant

Solihull
18 hours ago
Create job alert

Active Directory / IAM Security Consultant

Rate - £550p/d Outside IR35

Duration: 3 months(with potential extension)
Location: Hybrid / UK-based (on-site as required)

Overview

Our client  is undertaking a major security improvement initiative across its hybrid identity estate, spanning on‑premises Active Directory and cloud identity platforms. We are seeking an experienced Active Directory / Identity Security Contractor to design and deliver a comprehensive least privilege programme, reducing cyber risk and aligning the organisation with modern security best practice.

This engagement is outcome-focused, not advisory. You will have autonomy over how the work is delivered, with responsibility for achieving tangible, auditable improvements to privileged access across the environment.

Key Responsibilities

You will be accountable for the end-to-end delivery of a least privilege programme, including:

Discovery & Current State Analysis

Assess on‑premises Active Directory forests, domains, trusts, and OU structures
Review Entra ID (Azure AD) and integrated SaaS identity platforms
Analyse GPOs, Conditional Access policies, RBAC models, and delegation structures
Identify excessive privilege, legacy configurations, and inherited risk
Review privileged, service, and shared accounts
Assess joiner / mover / leaver processes as they relate to access control
Least Privilege Strategy & Target Architecture

Define a pragmatic least privilege strategy and design principles
Design an administrative tiering model
Redesign role and group structures aligned to business functions
Eliminate or redesign standing privileged access
Introduce just‑in‑time / just‑enough access where feasible
Align on‑prem and cloud privilege models
Ensure designs support operational delivery and business continuity
Implementation & Delivery

Remediate excessive privilege and high‑risk configurations
Redesign and implement groups, roles, and delegation models
Refactor or migrate legacy administrative accounts
Implement least privilege controls across on‑prem and cloud platforms
Deliver changes incrementally to minimise operational risk
Validate that business‑critical access requirements continue to be met
Documentation & Knowledge Transfer

Produce audit‑ready documentation covering:

Target state architecture
Design decisions and assumptions
Operational runbooks and support guidance
Ongoing governance and review processes

Deliver structured knowledge‑transfer sessions to internal teams
 Required Experience & Skills

Deep hands‑on expertise with Active Directory (on‑prem) in complex enterprise environments
Strong experience with Entra ID / Azure AD and hybrid identity models
Proven delivery of least privilege or privileged access reduction initiatives
Strong understanding of:

Administrative tiering models
Delegation and RBAC design
Privileged, service, and shared account management

Experience remediating legacy or over‑privileged environments
Ability to work autonomously and deliver against agreed outcomes
Strong documentation and stakeholder communication skills
Nice to Have

Experience with PAM / PIM tooling (e.g. Microsoft PIM or equivalent)
Background in security assurance, audit, or regulatory environments
Experience delivering identity transformation in large distributed organisations
What We’re Looking For

This role is ideal for a senior identity engineer or architect who enjoys hands‑on delivery, not just design. You should be comfortable making and implementing change in live environments, balancing security improvement with operational reality

Related Jobs

View all jobs

IAM Analyst

IAM Tech Lead

IAM Engineer

Senior Security Engineer

Senior Network Engineer

CGEMJP00327121 Infrastructure Architect - Silverfort SME

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.