Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Identity and Access Management (IAM) SME

Infosys Consulting - Europe
London
7 months ago
Applications closed

Related Jobs

View all jobs

Enterprise Identity Architect - IAM Architect

Senior Security Engineer - CIAM XDP

Solutions Architect (IAM)

Data Analyst

Business Development Manager - Microsoft Cloud & AI

Identity Engineer - SSEGJP00003119

Identity and Access Management (IAM) SME – Principal – London

You want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients' most important challenges? We are growing and are looking for people to join our team. You'll be part of an entrepreneurial, high-growth environment of 300.000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?

About your role

We are seeking an experienced Identity and Access Management (IAM) SME to join our dynamic consultancy team. The successful candidate will have over 5 years of experience in IAM, with a strong technical background and a deep understanding of identity management solutions and best practices. This individual will be responsible for designing, implementing, and managing IAM solutions across various industries, ensuring secure and efficient access to systems and data.

The IAM SME will also be expected to provide expert advice on IAM strategies, mentor junior team members, and ensure that IAM solutions align with business goals and regulatory requirements.

As an IAM SME, you will be at the forefront of securing the identities and access of our clients, shaping the future of IAM, and working alongside some of the brightest minds in the industry. This is a highly technical role, ideal for a passionate IAM professional looking to have a tangible impact on real-world security challenges.

Key Responsibilities:

  • Collaborate with senior stakeholders and technical teams to identify and address IAM requirements across multiple sectors.
  • Design and implement robust IAM solutions, ensuring systems are secure, scalable, and compliant with regulatory frameworks.
  • Develop and maintain the strategic vision and technical roadmap for IAM, ensuring alignment with evolving technologies, business needs, and industry best practices.
  • Serve as the technical authority on all IAM decisions, providing guidance and escalation support for lower-level IAM specialists.
  • Implement and manage identity governance and administration (IGA) solutions, including user provisioning, role-based access control (RBAC), and access certification.
  • Proactively assess and mitigate risks related to identity and access management by applying risk-based methodologies and providing expert advice on the trade-offs between security, cost, and performance.
  • Ensure the integration of IAM considerations into the broader enterprise architecture, influencing organizational policies, technology selection, and development methodologies.
  • Drive the adoption of Secure by Design principles, ensuring that IAM is an integral part of the system development lifecycle from inception through deployment.
  • Perform access reviews, identity lifecycle management, and security testing across IAM solutions, guiding teams on best practices for secure design and development.
  • Engage with industry bodies and regulatory frameworks to ensure alignment with security standards such as ISO/IEC 27001, NIST, and GDPR.
  • Conduct technical reviews of third-party IAM solutions and vendor offerings, ensuring that external products meet internal security standards.
  • Act as a subject matter expert (SME) in IAM technologies, advising on advanced areas such as multi-factor authentication (MFA), single sign-on (SSO), and privileged access management (PAM).
  • Monitor and analyse emerging IAM threats, vulnerabilities, and risks, ensuring that IAM solutions evolve to counter new attack vectors and threats.

Requirements

  • Have a broad business skill set including stakeholder management, problem-solving, and resilience
  • Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences
  • Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel

Essential Skills and Experience:

  • Deep expertise in IAM, with hands-on experience in designing and implementing IAM solutions, including cloud environments (AWS, Azure, or GCP).
  • Proficient in securing identities, managing access controls, and protecting data, with a solid understanding of modern cryptography, PKI, and IAM best practices.
  •  Comprehensive knowledge of emerging IAM technologies and trends, including Zero Trust architectures, DevSecOps, and microservices.
  • Extensive experience in identity governance, access management, and advanced threat mitigation techniques.
  • Expert-level understanding of IAM frameworks and regulations (e.g., ISO/IEC 27001/27002, NIST, NIS2, GDPR, PCI-DSS).
  • Proven experience managing IAM projects, balancing security objectives with business and operational needs.
  • Strong leadership skills, with experience leading and mentoring technical teams across diverse IAM disciplines.
  • Experience with IAM automation and orchestration tools, including the integration of IAM tools in CI/CD pipelines (DevSecOps).
  • Excellent understanding of cloud IAM architecture, particularly for securing hybrid and multi-cloud environments, and cloud-native applications.
  • Strong knowledge of IAM incident management and response strategies, with experience supporting SOC teams in investigating IAM-related security breaches and coordinating responses.

Qualifications:

  • Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) certification.
  • Additional certifications in IAM or cloud security (e.g., AWS Certified Security Specialty, Azure Security Engineer, Certified Identity and Access Manager (CIAM)).
  • Experience in pre-sales and bid writing for IAM engagements.
  • Experience leading IAM programs in complex environments, working with a variety of sectors such as Financial Services, Energy & Utilities, Consumer, Retail, and Logistics.
  • Expertise in IAM standards, policies, and regulatory requirements.

Personal Attributes:

  • A proactive problem-solver with a passion for IAM and a commitment to excellence.
  • Strong ability to communicate complex IAM concepts to both technical and non-technical stakeholders.
  • A mentor and leader who can inspire, motivate, and guide a team of IAM specialists.
  • Able to handle pressure in high-stakes situations, maintaining a focus on delivering secure and effective IAM solutions.
  • Customer-focused, with a proven ability to build relationships and trust across a wide range of stakeholders.
  • Flexible and adaptable, with the ability to thrive in fast-paced, dynamic environments

Given that this is just a short snapshot of the role we encourage you to apply even if you don't meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then pleaseapply now.

Benefits

About your team

At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.

About Infosys Consulting

Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology.  We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.

Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion,Equityand Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit ourcareers page.

Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.

We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you....Apply today!

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Why the UK Could Be the World’s Next Cyber Security Jobs Hub

Cyber security has become one of the defining challenges of the digital age. From protecting personal data and financial transactions to defending national infrastructure and corporate systems, the demand for strong cyber defences has never been higher. As businesses, governments, and individuals depend more heavily on digital services, the scale and sophistication of cyber threats have risen dramatically. Ransomware attacks, data breaches, state-sponsored cyber operations, and insider threats are now everyday risks. In response, organisations worldwide are investing heavily in cyber security talent. The United Kingdom is uniquely positioned to become a global cyber security jobs hub. With its strong tech sector, world-class universities, advanced defence capabilities, and established financial markets, the UK already has the foundations. The question is whether it can scale up, attract, and retain the right talent to meet global demand. This article explores why the UK is poised to become the world’s next cyber security jobs hub, the opportunities available, the challenges ahead, and what needs to happen for this vision to be realised.

The Best Free Tools & Platforms to Practise Cyber Security Skills 2025/26

Cyber security is one of the most in-demand career fields in the UK. From preventing data breaches to monitoring networks and defending against ransomware, the role of cyber professionals is critical across every industry. With organisations of all sizes facing increasing threats, demand for skilled professionals continues to rise. But employers don’t just want theory—they want proof that you can analyse systems, detect vulnerabilities, and respond to incidents. The good news is that you don’t need to pay thousands of pounds for training to build practical experience. A wide range of free tools and platforms allow you to practise cyber security skills safely, ethically, and at no cost. This article explores the best free resources available in 2025 to help you gain hands-on skills in ethical hacking, penetration testing, digital forensics, network monitoring, and incident response.

Top 10 Skills in Cyber sScurity According to LinkedIn & Indeed Job Postings

In today’s digital age, cyber security is no longer optional—it’s mission-critical. From financial institutions to healthcare providers, government departments to tech startups, every sector in the UK is under rising cyber threats. As a result, employers are constantly on the hunt for skilled professionals who can defend, detect, and respond effectively. But with cyber threats evolving at pace, what exactly are employers seeking? By analysing job postings on LinkedIn and Indeed, this article reveals the Top 10 cyber security skills UK organisations are demanding in 2025. Read on to discover how to present these skills effectively on your CV, in interviews, and through practical proof of experience.