Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

IAM Technical Analyst

Ansty, Warwickshire
3 days ago
Create job alert

Cadent Gas Ltd

Secure our digital future through identity excellence As an IAM Technical Analyst, you will be reporting into the Identity & Access Management team and working closely with internal IT teams and external partners supporting delivery of Cadent’s IAM roadmap into an ITIL disciplined environment, delivering IT services in a multisource model to an enterprise of 7000+ employees and external workers in a regulated utility.

The IAM team aim to enhance the user experience for colleagues by simplifying, improving, and automating access to systems & data for our digital identities including Privileged Access Management (PAM). We work with internal and external partners to improve provisioning and revocation of access to resources, ensuring access is authenticated and limited, based upon principle of least privilege. Accountable for the ongoing development and deployment of automated access management processes and integrations focussed on Cadent’s non-SAP platforms and systems (Microsoft Active Directory, Entra ID and MS 365). We aim to enhance governance to improve management of digital identities including privileged access, protecting Cadent’s network to meet regulatory obligations (NCSC CAF), aligned to strategy and best practice.

Why you'll love this role: This is a hands-on technical role, where you will be working with industry standard tools where your skills and expertise will involve:

Technical delivery – Implement, support and optimization of IAM and PAM services across the enterprise including SSO enablement of new SaaS applications and technical input and support to other projects and programmes.
Technical assurance – ensuring Change Management process is adhered to and technically validated to protect live service.
Security & Compliance – Ensure alignment with NCSC CAF and regulatory obligations, development, management and adherence to IAM Standard Operating Procedures (SOPs), support for internal and external IAM security audits.
Automation & Integration – Drive improvements in provisioning, revocation, and access governance.
Collaborative culture – Collaborate across IT, business, and vendor teams to deliver secure solutions.
Continuous Improvement – Champion innovation and efficiency in identity management including maintenance plans and roadmaps to maintain the health of services. What you'll bring:
Education & Certifications – Degree in IT or Cybersecurity, ITIL Foundation, and ideally CIAM, CISSP or CISM.
Extensive hands-on experience in IT; specifically, Microsoft Active Directory (AD), Entra ID and MS 365, with a good knowledge of system technologies, monitoring tools, processes, and incident handling in a 24x7x365 support environment.
Experience of configuring, implementing, developing, and supporting complex solutions. Evidence of vendor/ stakeholder management qualities.
Technical curiosity, ensuring continuous skills refresh, with cutting edge and new to market technologies explored, understood, and assessed.
Experience and understanding with different delivery methods and tools including Waterfall, Agile, SCRUM, Prince2, KANBAN and JIRA.
Experience of building relationships and working with a variety of stakeholders, supported by interpersonal and communication skills at all levels, with the ability to translate complex IT issues into business related vocabulary.
Experience and understanding of ITIL framework and ITSM tools, specifically ServiceNow.
Experience working in a regulated utility industry desired.
Experience and understanding of UK Data Privacy legislation.  

Technical knowledge or qualifications highly desirable in the following areas:

Identity and Access Management, specifically Microsoft Active Directory (AD), Entra ID and MS 365 including Entra Connect, app registrations, certificate and password management for user and machine authentication.
Deep knowledge of SAML, OAuth, OpenID Connect, SCIM, MFA and federation protocols.
HR Provisioning, specifically SAP SuccessFactors to AD / Entra ID).
Experience with Microsoft Entra ID Conditional Access, Defender for Identity, and Entra Permissions Management including PIM.
Strong understanding of Cyber security principles including zero-trust, privileged access management (PAM), Just-In-Time (JIT) access, Role Based Access Control and adaptive authentication.
Privileged Access Management, specifically CyberArk suite.
Experience of integrating applications with IGA solutions using a variety of APIs and protocols such as Web service protocols REST/SOAP, LDAP, csv.
Hands-on experience with identity automation; PowerShell scripting / MS Graph API, and other API-based integrations.
Data Lifecycle management tools such as Microsoft Defender & Microsoft Purview.
NCSC Cyber Assessment Framework (CAF).
DevOps and cloud security best practices in AWS/Azure environments

Related Jobs

View all jobs

Microsoft Sentinel Engineer

Asset Manager

Net Developer

AWS .Net Developer

Security Architect

Principal AWS Architect

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Hiring Trends 2026: What to Watch Out For (For Job Seekers & Recruiters)

As we move into 2026, the cyber security jobs market in the UK is changing fast. Attackers are scaling up with automation & AI, cloud estates are more complex, & regulators are tightening expectations around resilience & data protection. At the same time, budgets are under pressure & some organisations are consolidating their tech teams. Despite all this, demand for cyber security skills remains strong. Skilled defenders, engineers & leaders are still hard to find, & the stakes are only getting higher. Whether you are a cyber security job seeker planning your next move, or a recruiter building security teams, understanding the key cyber security hiring trends for 2026 will help you make better decisions. This guide mirrors the structure of the AI, biotech, blockchain & cloud articles & is written with SEO in mind for both job seekers & recruiters searching for terms like “cyber security hiring trends 2026”, “cyber security recruitment UK”, “cyber security jobs in the UK” & “SOC analyst roles 2026”.

Cyber Security Recruitment Trends 2025 (UK): What Job Seekers Must Know About Today’s Hiring Process

Summary: UK cyber security hiring has shifted from title‑led CV screens to capability‑driven assessments that emphasise incident readiness, cloud & identity security, detection engineering, governance/risk/compliance (GRC), measurable MTTR/coverage gains & secure‑by‑default engineering. This guide explains what’s changed, what to expect in interviews, & how to prepare—especially for SOC analysts, detection engineers, blue/purple teamers, penetration testers, cloud security engineers, DFIR, AppSec, GRC & security architecture. Who this is for: SOC & detection engineers, security operations leads, DFIR analysts, penetration testers/red teamers, purple teamers, AppSec/DevSecOps engineers, security architects, cloud security engineers, identity/IAM engineers, vulnerability managers, GRC/compliance specialists, product security & security programme managers targeting roles in the UK.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.