Identity and Access Management Engineer

Cannock
4 days ago
Applications closed

Related Jobs

View all jobs

Security Engineer - Hardware, Firmware, Virtualization, Secure Hardware And Foundational Techno[...] (London)

Cloud Security Engineer

Cloud Security Engineer

M365 Security Design Engineer

GCP Security Architect - Hybrid

Senior Cyber Security Engineer

Company:

Finning International Inc.

Number of Openings:

1

Worker Type:

Permanent

Position Overview:

Join our global team as an Identity and Access Management Engineer, specializing in SailPoint, Delinea, and EntraID. Drive IAM operations, enhance services, mentor team members, and collaborate across departments.

Job Description:

Key Responsibilities

Operations: Manage IAM operations, user provisioning, access control, and system health.

Ensure effective delivery of IAM operations, including handling tickets, maintaining hygiene, and service management

Troubleshoot and resolve IAM-related issues

Account lifecycle operations/auditing

Projects: Lead and support IAM projects, integrate systems with cloud services, and drive continuous improvement

Lead and participate in projects to promote continuous improvement and evolve IAM practices

Integrate IAM systems with cloud services and third-party platforms (e.g., Okta, Duo), including the development and management of identity APIs and connectors.

Collaborate with IT and security teams to implement and maintain access policies and controls

Documentation: Maintain IAM documentation, conduct access reviews, and provide training

Create and maintain comprehensive documentation for IAM processes and procedures

Provide training and support to team members and stakeholders on IAM best practices

Monitor and share emerging industry technologies and compliance trends, standards, and requirements

Identify, measure, and report service performance and health to stakeholders

Knowledge, Skills and Experience:

Bachelor's degree in computer science, IT, or equivalent experience

Relevant experience in senior IAM roles with industry standard IAM governance, solutions, and frameworks

Expertise in SailPoint and/or Delinea and/or EntraID

Understanding and implementation of IAM concepts and practices in large enterprises

IAM-related certifications are encouraged (e.g., SailPoint, Microsoft (SC300, SC5008) Delinea, etc.)

Excellent time management and analytical skills

Able to present to management and stakeholders

Team player and independent self-starter

What we offer:
In addition to a competitive salary, bonus, 25 days holiday, life insurance, and up to 7% pension, you will benefit from:

A comprehensive benefits package

A supportive and collaborative work environment

Opportunities for professional growth and development

At Finning, we prioritize creating a diverse and inclusive environment. We are proud to be an equal opportunity employer, and we actively encourage all individuals to express themselves and achieve their full potential. As a company, we continuously strive to enhance our outreach to individuals of all backgrounds and identities. We do not discriminate against applicants based on gender identity, race, national and ethnic origin, religion, age, sexual orientation, marital and family status, and/or mental or physical disabilities. Furthermore, Finning is committed to collaborating with and providing reasonable accommodations /adjustments to individuals with disabilities. If you require an adjustment/accommodation at any point during the recruitment process, please inform your recruiter. Finning is a forces-friendly employer having signed the Armed Forces Covenant, and pledges to treat those who serve or have served in the armed forces, and their families fairly

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.