Identity Lead

Dublin
3 days ago
Create job alert

Identity Lead - OUTSIDE IR35

About the Role
The Senior Identity Security Engineer within the Cyber Engineering & Architecture function, will be responsible for the lifecycle, performance, and strategic direction of the organisation's identity security and identity and access management (IAM) platforms and services, including Privileged Access, to ensure digital identities (employees, contractors, machines) are properly managed, secured, and governed and access to company systems are appropriate protected. This role will have ownership of identity security policies, standards, architectures and technologies to deliver identity services, including oversight of the management and operations of Identity platforms and critical infrastructure (Active Directory & MS Entra).
Context
Reporting to the Head of Cyber Engineering & Architecture, this role will develop and manage centralised identity controls and services for the organisation, delivering a simple, frictionless and self-service end user experience, while enabling robust controls that protect company digital identities. Automation in identity management will be key, standardising IAM processes, reducing human error and accesses needed for manual activities in AD / Entra, limiting exposure to identity compromises. This role will be a key contributor and collaborator with the overall IT & Cyber teams, to ensure identity controls are part of an integrated strategy, protecting our applications and data, and enabling effective incident detection and response.
Initial Success Factors
*
Build Identity security zero trust reference architecture and standards for fundamental compliance, defensive, preventive and responsive controls
*
Deliver automation improvements for joiners/movers/leavers and access governance workflows, reducing manual tasks, misconfigurations and admin accesses by support staff
*
Establish baseline of the current identity security posture, identifying opportunities for quick wins addressing critical risks, control or process gaps.
*
Implement initial identity security posture improvements e.g. AD & Entra configuration hardening, privileged access hygiene, high risk non-compliance metrics
Principal Accountabilities
*
Own identity security policies, standards and architecture patterns across AD, Entra, PAM, and IAM/IGA services.
*
Lead program of continuous improvements of identity security controls, PAM and IAM lifecycle processes, enabling self-service and scalable services through automation
*
Own security posture management for Active Directory and Entra configurations and infrastructure, treating identity as a critical enterprise asset.
*
Lead design and governance of identity lifecycle management processes and controls for employees, contractors, third parties and non‑human identities.
*
Own privileged access management requirements and secure patterns as part of identity services (privileged access lifecycle, role design, access reviews).
*
Lead the engineering and governance of IAM workflows via SailPoint (access requests, provisioning/deprovisioning, certifications/access reviews, RBAC/role models).
*
Provide SME support during incidents relating to identity compromise, privileged access misuse or access control failures, and drive root‑cause remediation.
*
Ensure alignment with compliance requirements & regulations
Additional Accountabilities / Responsibilities
*
Stay informed of threats facing the organization to proactively drive ongoing improvements in our overall identity risk posture
*
Partner with technology teams to embed secure-by-design identity patterns into applications and platforms (authentication, authorisation, SSO patterns).
*
Collaborate with Cyber Defence to ensure identity telemetry and signals support detection and response use cases.
*
Maintain identity security blueprints, standards and documentation to support consistent implementation and audit readiness.
*
Provide direction and oversight to third party providers that are supporting and operating identity services and platforms
*
Collaborate with IT and support teams, to continually identify opportunities to automate identity or access related tasks, removing the needs for privileged access into AD
Qualifications, Competencies and Experience
Essential Qualifications / Experience
*
Minimum of 12 years' industry experience with at least 8 years in identity hands-on roles.
*
Proven technical experience with Active Directory and Entra (Azure AD) in enterprise environments and maintaining secure configuration and posture of same.
*
Hands‑on experience designing, implementing and governing identity lifecycle and access lifecycle processes using an IGA platform
*
Experience designing & implementing privileged access management controls and processes
*
Experience implementing zero trust patterns and controls
*
Relevant certifications e.g., Microsoft identity/security, CISSP/CISM/CIAM/CRISC
Essential Competencies / Skills
*
Strong understanding of IAM principles including least privilege, RBAC, access reviews/certifications, segregation of duties concepts and lifecycle governance.
*
Ability to define secure identity architecture patterns and translate them into practical standards and blueprints.
*
Strong automation mindset with scripting/workflow capability (e.g., PowerShell or equivalent) to reduce manual processes and improve control reliability.
*
Strong stakeholder management skills across HR, IT, application and security teams.
*
Engineering experience with Identity Protection, IAM, and governance e.g. SailPoint, CyberArk, BeyondTrust, MS Defender for Identity, Crowdstrike Identity, SilverFort
Desirable Criteria
*
Experience with identity threat detection concepts and integration with SOC monitoring.
*
Experience with non‑human identity governance patterns and modern authentication protocols

Related Jobs

View all jobs

Group Head of Identity Security & Trust - Strategy, Cyber

IAM Tech Lead

Identity & Access Management Engineer

Cloud Security Lead

Head of Digital Identity

Senior Cybersecurity Analyst - Identity Governance

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.