IAM Specialist

Gaydon
3 weeks ago
Create job alert

Position: IAM Specialist
Job Type: Permanent
Location: Leamington Spa/Gaydon, UK
Salary: £60,000

About the Role
As an IAM Specialist, you will be accountable for the development and ongoing management of IAM policies and procedures. Your role will involve identifying and mitigating IAM-related risks throughout the business, ensuring that all risks are assessed and addressed proactively. You will deliver comprehensive identity and access management services as part of the IAM Specialist team.

Key Responsibilities:

  • Provide expert consultancy on IAM best practices (technical, governance, and process) to various teams and stakeholders.
  • Take full responsibility for the creation and maintenance of IAM policies and procedures, ensuring they cover all aspects of identity and access management.
  • Deliver IAM services through the selected software and service partners.
  • Continuously enhance the IAM processes to drive business efficiency.
  • Provide detailed data analytics to track and report key IAM metrics, using this data and audit procedures to ensure least privilege access and prevent toxic access.
  • Identify IAM-related risks and take proactive steps to assess, mitigate, and resolve these risks across the business.
  • Engage with and communicate IAM policies and procedures effectively to stakeholders across the organization.
  • Act as the escalation point for any IAM-related alerts or issues, raised either by other departments or monitoring systems.
  • Stay current with trends in information security, proposing proactive mitigations as necessary.

    Your Profile

    Essential skills/knowledge/experience:
  • Extensive experience as a subject matter expert in Identity and Access Management, with deep technical knowledge in Microsoft environments (Windows OS, Active Directory), Linux-based systems (desktop and server), and core infrastructure (networking, databases).
  • Strong understanding of IAM governance principles and industry best practices.
  • Experience managing information security risks related to identity.
  • Familiarity with SAML/OAUTH protocols.
  • Proven track record of working cross-functionally and managing relationships with external agencies.
  • Sound understanding of IT compliance standards, particularly in design and implementation.
  • Experience managing senior stakeholder relationships.
  • Strong IT skills, with the ability to analyze data for reporting and follow detailed work instructions.
  • Relevant degree or equivalent experience is preferred.

    Desirable skills/knowledge/experience:
  • Knowledge of IAM in a DevOps environment, including API management platforms, containerization, and cloud platforms (Google Cloud, Azure, AWS).
  • Familiarity with information security auditing techniques.
  • Experience managing information security in operational technology environments (e.g., PLCs, embedded systems in industrial machinery).
  • Experience in managing information security within a manufacturing organization.
  • Understanding of business areas such as suppliers and retailers, and how their systems interact.

    If this could be the ideal role for you, please apply with an up-to-date CV to be considered.

    In Technology Group Ltd is acting as an Employment Agency in relation to this vacancy

Related Jobs

View all jobs

IAM Specialist

Identity & Access Specialist

IAM Migration Specialist

AWS IAM / PingID Specialist - SC Cleared

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.