Head of Identity and Access Management Design

Bupa
Leeds
4 months ago
Applications closed

Related Jobs

View all jobs

Senior Microsoft Security Engineer (Buckinghamshire)

Housing Investment and Compliance Services Manager

Cloud Security Engineer

Head of IAM

Security Operations Manager

Information Security Analyst

Job Description:

Head of Identity and Access Management Design

Hybrid Working

London / Manchester / Staines

Permanent

Full time/part time

We consider all types of flexibility, including locations, hours and working patterns.

We make health happen

At Bupa, we’re passionate about technology. With colleagues, customers, patients and residents in mind you’ll have the opportunity to work on innovative projects and make a real impact on their lives.

Right from the start you’ll become part of our digital strategy, joining us on our journey and developing yourself along the way.

As Head of Identity and Access Management Design, you will be responsible for the strategic design, implementation, and evolution of Identity and Access Management (IAM) across the Bupa Global, India and UK (BGIUK) Market Unit..

How you’ll help us make health happen:

Develop and driving the strategic vision for IAM across Bupa, ensuring alignment with overall business and security objectives.

Own IAM design and technology, providing subject matter expertise on IAM strategy, policy, and governance to secure Bupa's Products, Platforms and Data.

Implement, operate, and deliver Cyber Products including Privileged Access Management (PAM) and Identity Governance and Administration (IGA).

Lead a team of IAM specialists and engineers to drive a continuous improvement of our IAM Cyber Products and services, to reduce risk, increase efficiency and improve control adoption,

Establish key performance and compliance metrics to ensure we are always meeting our business and regulatory requirements.

Act as a thought leader for IAM, staying ahead of industry trends, emerging threats, best practices, and incorporating them into Bupa's IAM strategy.

.

Key Skills / Qualifications needed for this role:

Professional certifications such as CISSP, CISM, CISA, or specific IAM certifications (e.g., Certified Identity and Access Manager (CIAM)).

Rounded experience in cybersecurity or identity management roles, including experience in a leadership position overseeing IAM design and implementation.

In-depth knowledge of IAM technologies and best practices, including IGA, PAM, MFA, SSO, identity federation, Entra ID, On Premises Active Directory (AD).

Significant and demonstrable experience of the design, implementation, and operation of IAM/PAM tools in Cloud environments, such as CyberArk, BeyondTrust, Delinea, Sailpoint, Saviynt, MS PIM etc.

Strong technical background in cloud-based identity solutions integrating IAM with cloud and hybrid environments.

Extensive experience with regulatory compliance frameworks and security standards (e.g., ISO 27001, NIST, GDPR).

Demonstrable track record of delivering complex IAM solutions in large-scale, such as across multi-national organisations.

Excellent problem-solving skills and the ability to communicate complex IAM concepts to both technical and non-technical stakeholders.

Proven experience in managing teams, leading through change, and fostering a high-performance culture.

.

Benefits

Our benefits are designed to make health happen for our people. Viva is our global wellbeing programme and includes all aspects of our health – from mental and physical, to financial, social and environmental wellbeing. We support flexible working and have a range of family friendly benefits.

Joining Bupa in this role you will receive the following benefits and more:

25 days holiday, increasing through length of service, with option to buy or sell

Bupa health insurance as a benefit in kind

An enhanced pension plan and life insurance

Inclusion in the annual Management Bonus Scheme

Onsite gyms or local discounts where no onsite gym available

Various other benefits and online discounts

Why Bupa?

We’re a health insurer and provider. With no shareholders, our customers are our focus. Our people are all driven by the same purpose – helping people live longer, healthier, happier lives and making a better world. We make health happen by being brave, caring and responsible in everything we do.

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.

Cyber Security Jobs at Newly Funded UK Start-ups: Q3 2025 Investment Tracker

Cyber security is no longer just a topic for tech-savvy professionals—it’s an essential pillar of every modern organisation. From protecting sensitive customer data to thwarting state-sponsored attacks, cyber security teams play a crucial role in safeguarding digital infrastructures across all sectors. In the UK, cyber security innovation is thriving, fuelled by a fertile mix of venture capital, government backing, and an ever-growing pool of talented specialists. Now, in the third quarter of 2025, we’ve seen a fresh influx of funding for cyber security start-ups that are poised to shape the industry’s future. This Q3 2025 Investment Tracker highlights newly funded UK-based cyber security start-ups, their core offerings, and—most importantly—the wide range of job opportunities they’re creating. Whether you’re a veteran security analyst, a pen tester, or a newcomer eager to explore the defensive side of tech, these start-ups are actively seeking professionals to help drive their next phase of growth. We’ll also guide you through the essential skills in demand, strategies to secure a role, and how to leverage CyberSecurityJobs.tech to fast-track your job search.