Identity Security Analyst | Southampton, UK

Quilter
Southampton
4 weeks ago
Applications closed

Related Jobs

View all jobs

Insider Threat Analyst | S2 | CISO

Third Party Risk Manager

Identity & Access Management Analyst

Security Operations Analyst

Cyber Security Engineer

Senior SOC Analyst

About the Business

Quilter plc is a leading provider of financial advice, investments and wealth management, committed to being the UK's best wealth manager for clients and their advisers. Quilter oversees £119.4 billion in customer investments (as at end December 2024). It has an adviser and customer offering spanning financial advice, investment platforms, multi-asset investment solutions, and discretionary fund management. The business is comprised of two segments: Affluent and High Net Worth.

Affluent encompasses the financial planning business, Quilter Financial Planning, the Quilter Investment Platform and Quilter Investors, the multi-asset investment solutions business.

High Net Worth includes the discretionary fund management business, Quilter Cheviot, together with Quilter Cheviot Financial Planning.

At Quilter we never stand still. Our foundations are rooted in our extraordinary expertise, which is trusted by hundreds of thousands of customers, but we have great ambitions to stay one step ahead and make an even greater difference to the people and communities we serve.

Our business is transforming, continually modernising, and becoming even more customer centric. So, if you want to be bold in the pursuit of your ambitions, bring new ideas, and challenge and evolve what we do, it's the perfect time to join us!

About the Role

Level: Level 3

Department:Technology: Information Security

Location: Southampton or London

Contract type: Permanent

The Security Architecture team at Quilter provide standards, guidance and expert challenge in support of Quilter across strategic Programmes and Projects, corporate actions, new supplier onboarding and ad-hoc requests. Our goal is to enable the business to deliver solutions that are Secure by Design in an efficient and predictable way through a consistent, modern control base and through timely and appropriate design and implementation guidance.

The role will work with a small team of Security Architects who work collaboratively with the broader Technology Architecture community in support of Quilter's initiatives. The role will also work closely with colleagues across Infrastructure team, Security Operations team and broader Information Security function to continuously improve tools and processes in this space.

The Identity Security Analyst will own Identity Security at Quilter, supporting Security and Enterprise Architects as appropriate, and working with stakeholders across the business and technology to ensure Identity Security controls are well designed and effectively delivered.

The role would suit an experienced Security, End User or Infrastructure Analyst looking for a step into Security Architecture.

Key Responsibilities:

  • Act as the technical Identity Security lead at Quilter, supporting the Security Architects
  • Define, maintain and own the technical standards in relation to Identity across Enterprise and Customer Authentication, Authorisation, Access Management, Identity Management and Adaptive Trust / Zero Trust concepts.
  • Define appropriate, but proportionate, metrics to effectively measure our identity risk and work with our Governance, Risk and Controls team to ensure they are reported coherently.
  • Provide input and approval for processes that have been designed by our operational teams to achieve our Identity Security standards.
  • Work with the Information Security and Wider Technology Leadership teams, in particular our Digital Technology team, to drive the roadmap for Identity Security tooling and controls
  • Support Security Architects with Identity Security related items across projects and initiatives
  • Act as a point of escalation for Identity Security issues
  • Act as a trusted advisor to the Head of Information Security and the CIO on Identity Security related matters
  • Maintain strong understanding of identity related risks and ensure any risks to Quilter's environment are robustly assessed
  • Be responsible for assuring delivery of key BAU identity and access related processes, to ensure they align to expected standards

About You

  • Exceptional understanding of the risks associated with poor identity security management and typical patterns used to resolve / mitigate these risks is essential
  • Experience working with Identity Provider (IdP) tooling such as Microsoft Entra ID / Active Directory is essential
  • Broad understanding and/or experience of working with concepts and capabilities such as Identity Governance, Authorisation, Authentication, Privileged Access Management (PAM), Privileged Identity Management (PIM) and Cloud Infrastructure Entitlement Management (CIEM) is essential
  • Experience with implementing Zero Trust concepts, including Conditional Access or Adaptive Trust type controls is desirable
  • Understanding of machine identities and managing these as part of a cloud-first DevOps model, enabling secure and efficient development is desirable
  • Practical experience of cloud-native concepts such as Cloud Security Posture Management (CSPM) and SaaS Posture Management (SSPM) is desirable
  • Excellent attention to detail and ability to work comfortably with data in Microsoft Excel (essential) and Power BI (desirable)
  • Business outcome orientated with a desire to apply technology and security to enable delivery
  • Drive to continually develop skills, maintain expertise and relevance in a fast-changing technology and threat landscape
  • Holding, or willingness to study for, qualifications such as CISSP, CISM, Microsoft Security Certifications or similar is desirable
  • Collaborative style, ability to communicate effectively and work with Security, Technology and Business Stakeholders of all levels of seniority
  • Excellent written and verbal communication skills

Inclusion & Diversity

We value diversity and strive to promote inclusivity in all aspects of our culture. We believe in equal opportunities for all, ensuring that no applicant encounters less favourable treatment based on anything but their skills, qualifications, experience, and potential. We celebrate the unique contributions of a diverse workforce and create a respectful, nurturing environment where every colleague can thrive.

Values

Do the right thing:We act with integrity and are proudly committed to going above and beyond in service of our clients and the support we provide our communities.
Always curious:We continuously seek new ideas and knowledge so we're one step ahead of our clients' needs. We look for inspiration everywhere and encourage experimentation, recognising that this is how we create brilliant solutions for brighter futures.
Embrace challenge:We aim high to transform our potential into meaningful outcomes. With ambition as our driving force and a steadfast commitment to growth, we succeed for the good of every generation.
Stronger together:Combining our diverse talents, we accomplish more collectively than we ever could do alone. We speak openly, actively listen, and support each other, and constructively challenge and embrace new ideas. We seek empowerment and demonstrate ownership and trust, with the confidence to make impactful decisions.

Core Benefits

Holiday:182 hours (26 days)

Quilter Incentive Scheme:All employees are eligible to participate in incentive scheme, to incentivise business performance and their contribution.

Pension Scheme:A non-contributory company pension scheme that can be boosted through personal contributions.

Private Medical Insurance:Single cover as standard with options to increase cover to include your partner or children.

Life Assurance:4x your salary.

Income Protection:75% of salary, less state benefits, payable after 26 weeks of absence.

Healthcare Cash Plan:Jersey employees only

In addition to our core benefits, we offer a range of flexible benefits to UK employees that you can choose from and pay for conveniently via a salary deduction.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.