Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

IAM / PAM Specialist

Clifton Hampden
4 days ago
Create job alert

UKAEA's mission is to lead the delivery of sustainable fusion energy and maximise scientific and economic impact. The Computing Division underpins this mission by delivering secure, scalable, and innovative digital solutions across scientific computing, modelling, simulation, software engineering, business systems, data acquisition, and core IT services.

Within the Computing Division, the Enterprise Infrastructure Solutions unit is responsible for the design, delivery, and management of centrally supported IT infrastructure and applications. This includes enterprise compute platforms, data networks, UNIX/Linux/Windows environments, cloud services, data centres, commercial software solutions, and end-user support across all UKAEA sites.

The IAM / PAM Specialist will play a pivotal role in designing and delivering UKAEA's greenfield Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions, while contributing to the development of the Security Information and Event Management (SIEM) and Security Operations Centre (SOC) capabilities.

You will lead the IAM/PAM workstreams and provide specialist input into SIEM/SOC implementation, ensuring all solutions align with secure-by-design principles, NIST and ISO 27001 frameworks, and UKAEA's cyber security objectives.

This is a hands-on and leadership-focused role that combines technical delivery, strategic oversight, and mentoring of junior members of the cyber team. You will also provide technical oversight where Managed Service Providers (MSPs) are engaged, ensuring solution quality, integration, and compliance with UKAEA standards.

Accountabilities:

· Lead the end-to-end design and delivery of IAM and PAM services as part of a greenfield cyber security programme.

· Collaborate with architects and SOC leads to integrate IAM/PAM telemetry into SIEM tooling for enhanced visibility and detection.

· Provide technical oversight and assurance when engaging Managed Service Providers (MSPs) or third-party vendors.

· Support the development and implementation of SIEM/SOC capabilities, assisting in log source onboarding, alert tuning, and incident response improvements.

· Mentor and train junior team members, building internal capability in identity and access management.

· Define and maintain IAM and PAM architecture artefacts, roadmaps, and design standards aligned with enterprise governance.

· Monitor and manage security configurations across Active Directory, Microsoft 365, Azure, and business SaaS platforms (e.g., SharePoint, Teams, Exchange Online, OneDrive).

· Support secure deployment and access controls in cloud-hosted and hybrid business systems.

· Administer and optimise IAM policies, Conditional Access, MFA, and privilege escalation controls.

· Review access permissions for business-critical applications and enforce role-based access control (RBAC).

· Participate in application onboarding and provide security consultation on app integrations and APIs.

· Assist in the response and investigation of security alerts and incidents related to cloud environments.

· Collaborate with enterprise architects, infrastructure engineers, and support teams to embed secure-by-design principles across services.

· Maintain up-to-date documentation of cloud security controls, procedures, and exception registers.

· Stay informed of emerging threats in cloud ecosystems and recommend appropriate mitigation strategies.

Budget Responsibility:

None

Specific Qualifications/Experience:

· Essential

o Demonstrable experience in greenfield IAM/PAM implementations, preferably using Entra ID, CyberArk, BeyondTrust, or similar platforms.

o Proven ability to lead technical delivery while mentoring junior engineers or analysts.

o Experience providing technical oversight for MSPs or third-party security service providers.

o Demonstrable hands-on experience with Microsoft Entra ID (Azure AD), Conditional Access, and Identity Protection.

o Understanding of modern authentication protocols (OAuth2.0, SAML, OpenID Connect).

o Familiarity with SaaS security, user lifecycle management, and enterprise access models.

o Working knowledge of security and compliance frameworks such as CAF, ISO 27001, NIST CSF, and GDPR.

o Analytical and investigative skills with the ability to identify risk patterns and remediation actions.

o Knowledge of Privileged Identity Management (PIM), Just-In-Time (JIT) access, or PAM solutions.

o Strong documentation and communication skills to support audits and security reviews.

o Ability to obtain SC-level national security clearance

· Desirable

o At least a HND in Information Security, Computer Science, or a related STEM field, or equivalent experience. Degree Preferred

o Understanding of SIEM/SOC integration and the relationship between IAM telemetry and security monitoring.

o Familiarity with ITSM workflows and change control procedures.

o Experience conducting security risk assessments for third-party SaaS solutions.

o Experience supporting greenfield security architecture or SOC build programmes.

o Familiarity with tools such as Microsoft Sentinel, Splunk, or Elastic SIEM.

Additional Duties:

May be requested to represent the Group in meetings , act as an SME in Projects and may hold internal appointments.

May also provide technical oversight to managed service providers and contribute to team capability development through coaching and mentoring.

Rullion celebrates and supports diversity and is committed to ensuring equal opportunities for both employees and applicants

Related Jobs

View all jobs

Identity & Access Management Specialist (IAM)

Solutions Architect - IAM (We have office locations in Cambridge, Leeds and London)

SailPoint ISC Specialist

IAM Administrator

Product Owner - IAM / MFS / BFR

Sailpoint Engineer, IAM, Identity

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.

Why the UK Could Be the World’s Next Cyber Security Jobs Hub

Cyber security has become one of the defining challenges of the digital age. From protecting personal data and financial transactions to defending national infrastructure and corporate systems, the demand for strong cyber defences has never been higher. As businesses, governments, and individuals depend more heavily on digital services, the scale and sophistication of cyber threats have risen dramatically. Ransomware attacks, data breaches, state-sponsored cyber operations, and insider threats are now everyday risks. In response, organisations worldwide are investing heavily in cyber security talent. The United Kingdom is uniquely positioned to become a global cyber security jobs hub. With its strong tech sector, world-class universities, advanced defence capabilities, and established financial markets, the UK already has the foundations. The question is whether it can scale up, attract, and retain the right talent to meet global demand. This article explores why the UK is poised to become the world’s next cyber security jobs hub, the opportunities available, the challenges ahead, and what needs to happen for this vision to be realised.