Identity Lead

Dublin
2 weeks ago
Create job alert

Identity Lead - OUTSIDE IR35

About the Role
The Senior Identity Security Engineer within the Cyber Engineering & Architecture function, will be responsible for the lifecycle, performance, and strategic direction of the organisation's identity security and identity and access management (IAM) platforms and services, including Privileged Access, to ensure digital identities (employees, contractors, machines) are properly managed, secured, and governed and access to company systems are appropriate protected. This role will have ownership of identity security policies, standards, architectures and technologies to deliver identity services, including oversight of the management and operations of Identity platforms and critical infrastructure (Active Directory & MS Entra).
Context
Reporting to the Head of Cyber Engineering & Architecture, this role will develop and manage centralised identity controls and services for the organisation, delivering a simple, frictionless and self-service end user experience, while enabling robust controls that protect company digital identities. Automation in identity management will be key, standardising IAM processes, reducing human error and accesses needed for manual activities in AD / Entra, limiting exposure to identity compromises. This role will be a key contributor and collaborator with the overall IT & Cyber teams, to ensure identity controls are part of an integrated strategy, protecting our applications and data, and enabling effective incident detection and response.
Initial Success Factors
*
Build Identity security zero trust reference architecture and standards for fundamental compliance, defensive, preventive and responsive controls
*
Deliver automation improvements for joiners/movers/leavers and access governance workflows, reducing manual tasks, misconfigurations and admin accesses by support staff
*
Establish baseline of the current identity security posture, identifying opportunities for quick wins addressing critical risks, control or process gaps.
*
Implement initial identity security posture improvements e.g. AD & Entra configuration hardening, privileged access hygiene, high risk non-compliance metrics
Principal Accountabilities
*
Own identity security policies, standards and architecture patterns across AD, Entra, PAM, and IAM/IGA services.
*
Lead program of continuous improvements of identity security controls, PAM and IAM lifecycle processes, enabling self-service and scalable services through automation
*
Own security posture management for Active Directory and Entra configurations and infrastructure, treating identity as a critical enterprise asset.
*
Lead design and governance of identity lifecycle management processes and controls for employees, contractors, third parties and non‑human identities.
*
Own privileged access management requirements and secure patterns as part of identity services (privileged access lifecycle, role design, access reviews).
*
Lead the engineering and governance of IAM workflows via SailPoint (access requests, provisioning/deprovisioning, certifications/access reviews, RBAC/role models).
*
Provide SME support during incidents relating to identity compromise, privileged access misuse or access control failures, and drive root‑cause remediation.
*
Ensure alignment with compliance requirements & regulations
Additional Accountabilities / Responsibilities
*
Stay informed of threats facing the organization to proactively drive ongoing improvements in our overall identity risk posture
*
Partner with technology teams to embed secure-by-design identity patterns into applications and platforms (authentication, authorisation, SSO patterns).
*
Collaborate with Cyber Defence to ensure identity telemetry and signals support detection and response use cases.
*
Maintain identity security blueprints, standards and documentation to support consistent implementation and audit readiness.
*
Provide direction and oversight to third party providers that are supporting and operating identity services and platforms
*
Collaborate with IT and support teams, to continually identify opportunities to automate identity or access related tasks, removing the needs for privileged access into AD
Qualifications, Competencies and Experience
Essential Qualifications / Experience
*
Minimum of 12 years' industry experience with at least 8 years in identity hands-on roles.
*
Proven technical experience with Active Directory and Entra (Azure AD) in enterprise environments and maintaining secure configuration and posture of same.
*
Hands‑on experience designing, implementing and governing identity lifecycle and access lifecycle processes using an IGA platform
*
Experience designing & implementing privileged access management controls and processes
*
Experience implementing zero trust patterns and controls
*
Relevant certifications e.g., Microsoft identity/security, CISSP/CISM/CIAM/CRISC
Essential Competencies / Skills
*
Strong understanding of IAM principles including least privilege, RBAC, access reviews/certifications, segregation of duties concepts and lifecycle governance.
*
Ability to define secure identity architecture patterns and translate them into practical standards and blueprints.
*
Strong automation mindset with scripting/workflow capability (e.g., PowerShell or equivalent) to reduce manual processes and improve control reliability.
*
Strong stakeholder management skills across HR, IT, application and security teams.
*
Engineering experience with Identity Protection, IAM, and governance e.g. SailPoint, CyberArk, BeyondTrust, MS Defender for Identity, Crowdstrike Identity, SilverFort
Desirable Criteria
*
Experience with identity threat detection concepts and integration with SOC monitoring.
*
Experience with non‑human identity governance patterns and modern authentication protocols

Related Jobs

View all jobs

IAM Delivery Lead

Saviynt Architect - IAM

IAM Tech Lead

IAM Tech Lead

Cloud Security Lead

Group Head of Identity Security & Trust - Strategy, Cyber

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Penetration Tester Jobs in the UK: What Employers Actually Want in 2026

The demand for skilled professionals in cyber security has never been higher, and penetration testers sit at the very heart of this rapidly evolving industry. As organisations across the UK continue to digitise their operations, protect sensitive data, and defend against increasingly sophisticated threats, the need for ethical hackers has grown dramatically. If you are considering a career in this field—or looking to advance within it—it is essential to understand what employers are really looking for in 2026. This guide breaks down the current expectations, required skills, certifications, and practical experience that can help you stand out in a competitive job market.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.