National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Identity & Access Management Engineer

Butley Town
4 days ago
Create job alert

We’re the UK’s largest mutual life, pensions and investment company, offering protection, long-term savings and asset management products and services.

Job Title: Identity & Access Management Engineer – IGA

Contract Type: Permanent

Location: Alderley Edge

Working style: Hybrid 50% home/office based

Closing date: 24th July 2025

We’re expanding our security and resilience team within the CISO office. Over the last few years, we’ve been on a continuous improvement journey and are looking to expand the team. These new roles will allow us to fully enact our threat-led security program, drive further improvements across cyber and support our organisational goal of building a secure and resilient mutual. With a security team over 50 already, these new roles will enhance our capabilities as the threat landscape continues to evolve.

We are seeking a highly skilled and experienced Identity and Access Management Engineer to join our IAM team at Royal London, with a core skillset in Identity Governance Administration (IGA) solutions. As an IAM Engineer, you will play a crucial role in ensuring the confidentiality, integrity, and availability of our organisation's digital assets by managing user access and privileges.

In this role, you will collaborate with cross-functional teams to design and implement secure access control systems. You will participate in the development and enforcement of security policies and procedures, as well as conducting regular security assessments and audits. Additionally, you will be responsible for troubleshooting and resolving identity and access-related issues.

The ideal candidate will have a strong background in IAM, possess excellent problem-solving skills, and be a proactive and self-driven individual with a keen attention to detail. We are looking for someone who is able to effectively communicate complex technical concepts to non-technical stakeholders and can work well in a fast-paced and team-oriented environment.

About the role

Design, implement, and manage Identity Governance Administraton solutions.
Assessing requirements for IGA solutions to meet stakeholders needs.
Design technical cybersecurity controls and define standards and best practices in the application of IGA principles and best practices for the public cloud, across the enterprise, and in secure application design.
Collaborate with stakeholders to develop and enforce security policies and procedures.
Provides regular reports to leadership regarding security, capacity, usage, and licensing of IGA solutions.
Provide support for production IGA infrastructure systems and processes.
Expertise in SailPoint IDN: Proficiency in configuring, customizing, and administering SailPoint IdentityNow.
Identity Governance Knowledge: Understanding of identity governance principles such as user provisioning, access management, RBAC, and SoD.
Integration Skills: Ability to integrate SailPoint IDN with HR systems, Active Directory, and other identity sources.
Customization Abilities: Experience in customizing SailPoint IDN for specific business needs, including workflows, connectors, and integration with other systems.
Investigate and resolve access-related incidents and issues.
Monitor and analyse access logs and reports for suspicious activities.  

About you

As a member of the IAM Team, you will be responsible for ensuring security principles are met through access certifications, application onboarding, identity lifecycle management, and governing Joiner, Mover, Leaver processes.
Combined IT and security work experience with a broad range of exposure to Identity and Access Management functions and experience designing and deploying IGA solutions at the enterprise level.
Demonstrated successful implementation of security control frameworks and standards such as ISO 27001, COBIT, ITIL, NIST.
Certification in Information Security relevant areas such as CISSP, SANS and/or equivalent business experience in a matrix Organisation.
High level of personal integrity with the ability to professionally handle highly sensitive and confidential situations.
Ability to easily defuse critical situations and manage escalations appropriately.
Can establish solid relationships with vendors in support of initiatives; ability to negotiate and manage outside vendors against deliverables.
Has knowledge of information security principles and practices.
Excellent track record communicating, managing complex projects and influencing others, in a diversified and international matrix organisation. Adept at proposing, implementing, and managing change while prepared to question the “Status Quo”.  

About Royal London

We’re the UK’s largest mutual life, pensions and investment company, offering protection, long-term savings and asset management products and services.   

Our   

Inclusion, diversity and belonging 

We’re an employer. We celebrate and value different backgrounds and cultures across Royal London. Our diverse people and perspectives give us a range of skills which are recognised and respected – whatever their background

Related Jobs

View all jobs

Identity & Access Management Engineer

Identity and Access Management Security Engineer (IAM)

Infrastructure and Security Engineer

Cybersecurity (Infrastructure) Engineer

Cybersecurity (Infrastructure) Engineer

Senior Software Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.