IAM Technical Analyst

Ansty, Warwickshire
3 months ago
Applications closed

Related Jobs

View all jobs

Cost Benefit Analyst - IAM

IAM Security Consultant - PERM - London, UK

IAM Engineer

Senior Network Engineer

Senior Security Engineer

OT SOC Engineer

Cadent Gas Ltd

Secure our digital future through identity excellence As an IAM Technical Analyst, you will be reporting into the Identity & Access Management team and working closely with internal IT teams and external partners supporting delivery of Cadent’s IAM roadmap into an ITIL disciplined environment, delivering IT services in a multisource model to an enterprise of 7000+ employees and external workers in a regulated utility.

The IAM team aim to enhance the user experience for colleagues by simplifying, improving, and automating access to systems & data for our digital identities including Privileged Access Management (PAM). We work with internal and external partners to improve provisioning and revocation of access to resources, ensuring access is authenticated and limited, based upon principle of least privilege. Accountable for the ongoing development and deployment of automated access management processes and integrations focussed on Cadent’s non-SAP platforms and systems (Microsoft Active Directory, Entra ID and MS 365). We aim to enhance governance to improve management of digital identities including privileged access, protecting Cadent’s network to meet regulatory obligations (NCSC CAF), aligned to strategy and best practice.

Why you'll love this role: This is a hands-on technical role, where you will be working with industry standard tools where your skills and expertise will involve:

Technical delivery – Implement, support and optimization of IAM and PAM services across the enterprise including SSO enablement of new SaaS applications and technical input and support to other projects and programmes.
Technical assurance – ensuring Change Management process is adhered to and technically validated to protect live service.
Security & Compliance – Ensure alignment with NCSC CAF and regulatory obligations, development, management and adherence to IAM Standard Operating Procedures (SOPs), support for internal and external IAM security audits.
Automation & Integration – Drive improvements in provisioning, revocation, and access governance.
Collaborative culture – Collaborate across IT, business, and vendor teams to deliver secure solutions.
Continuous Improvement – Champion innovation and efficiency in identity management including maintenance plans and roadmaps to maintain the health of services. What you'll bring:
Education & Certifications – Degree in IT or Cybersecurity, ITIL Foundation, and ideally CIAM, CISSP or CISM.
Extensive hands-on experience in IT; specifically, Microsoft Active Directory (AD), Entra ID and MS 365, with a good knowledge of system technologies, monitoring tools, processes, and incident handling in a 24x7x365 support environment.
Experience of configuring, implementing, developing, and supporting complex solutions. Evidence of vendor/ stakeholder management qualities.
Technical curiosity, ensuring continuous skills refresh, with cutting edge and new to market technologies explored, understood, and assessed.
Experience and understanding with different delivery methods and tools including Waterfall, Agile, SCRUM, Prince2, KANBAN and JIRA.
Experience of building relationships and working with a variety of stakeholders, supported by interpersonal and communication skills at all levels, with the ability to translate complex IT issues into business related vocabulary.
Experience and understanding of ITIL framework and ITSM tools, specifically ServiceNow.
Experience working in a regulated utility industry desired.
Experience and understanding of UK Data Privacy legislation.  

Technical knowledge or qualifications highly desirable in the following areas:

Identity and Access Management, specifically Microsoft Active Directory (AD), Entra ID and MS 365 including Entra Connect, app registrations, certificate and password management for user and machine authentication.
Deep knowledge of SAML, OAuth, OpenID Connect, SCIM, MFA and federation protocols.
HR Provisioning, specifically SAP SuccessFactors to AD / Entra ID).
Experience with Microsoft Entra ID Conditional Access, Defender for Identity, and Entra Permissions Management including PIM.
Strong understanding of Cyber security principles including zero-trust, privileged access management (PAM), Just-In-Time (JIT) access, Role Based Access Control and adaptive authentication.
Privileged Access Management, specifically CyberArk suite.
Experience of integrating applications with IGA solutions using a variety of APIs and protocols such as Web service protocols REST/SOAP, LDAP, csv.
Hands-on experience with identity automation; PowerShell scripting / MS Graph API, and other API-based integrations.
Data Lifecycle management tools such as Microsoft Defender & Microsoft Purview.
NCSC Cyber Assessment Framework (CAF).
DevOps and cloud security best practices in AWS/Azure environments

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.