Identity Security Analyst | Southampton, UK

Quilter
Southampton
4 days ago
Create job alert

About the Business

Quilter plc is a leading provider of financial advice, investments and wealth management, committed to being the UK's best wealth manager for clients and their advisers. Quilter oversees £119.4 billion in customer investments (as at end December 2024). It has an adviser and customer offering spanning financial advice, investment platforms, multi-asset investment solutions, and discretionary fund management. The business is comprised of two segments: Affluent and High Net Worth.

Affluent encompasses the financial planning business, Quilter Financial Planning, the Quilter Investment Platform and Quilter Investors, the multi-asset investment solutions business.

High Net Worth includes the discretionary fund management business, Quilter Cheviot, together with Quilter Cheviot Financial Planning.

At Quilter we never stand still. Our foundations are rooted in our extraordinary expertise, which is trusted by hundreds of thousands of customers, but we have great ambitions to stay one step ahead and make an even greater difference to the people and communities we serve.

Our business is transforming, continually modernising, and becoming even more customer centric. So, if you want to be bold in the pursuit of your ambitions, bring new ideas, and challenge and evolve what we do, it's the perfect time to join us!

About the Role

Level: Level 3

Department:Technology: Information Security

Location: Southampton or London

Contract type: Permanent

The Security Architecture team at Quilter provide standards, guidance and expert challenge in support of Quilter across strategic Programmes and Projects, corporate actions, new supplier onboarding and ad-hoc requests. Our goal is to enable the business to deliver solutions that are Secure by Design in an efficient and predictable way through a consistent, modern control base and through timely and appropriate design and implementation guidance.

The role will work with a small team of Security Architects who work collaboratively with the broader Technology Architecture community in support of Quilter's initiatives. The role will also work closely with colleagues across Infrastructure team, Security Operations team and broader Information Security function to continuously improve tools and processes in this space.

The Identity Security Analyst will own Identity Security at Quilter, supporting Security and Enterprise Architects as appropriate, and working with stakeholders across the business and technology to ensure Identity Security controls are well designed and effectively delivered.

The role would suit an experienced Security, End User or Infrastructure Analyst looking for a step into Security Architecture.

Key Responsibilities:

  • Act as the technical Identity Security lead at Quilter, supporting the Security Architects
  • Define, maintain and own the technical standards in relation to Identity across Enterprise and Customer Authentication, Authorisation, Access Management, Identity Management and Adaptive Trust / Zero Trust concepts.
  • Define appropriate, but proportionate, metrics to effectively measure our identity risk and work with our Governance, Risk and Controls team to ensure they are reported coherently.
  • Provide input and approval for processes that have been designed by our operational teams to achieve our Identity Security standards.
  • Work with the Information Security and Wider Technology Leadership teams, in particular our Digital Technology team, to drive the roadmap for Identity Security tooling and controls
  • Support Security Architects with Identity Security related items across projects and initiatives
  • Act as a point of escalation for Identity Security issues
  • Act as a trusted advisor to the Head of Information Security and the CIO on Identity Security related matters
  • Maintain strong understanding of identity related risks and ensure any risks to Quilter's environment are robustly assessed
  • Be responsible for assuring delivery of key BAU identity and access related processes, to ensure they align to expected standards

About You

  • Exceptional understanding of the risks associated with poor identity security management and typical patterns used to resolve / mitigate these risks is essential
  • Experience working with Identity Provider (IdP) tooling such as Microsoft Entra ID / Active Directory is essential
  • Broad understanding and/or experience of working with concepts and capabilities such as Identity Governance, Authorisation, Authentication, Privileged Access Management (PAM), Privileged Identity Management (PIM) and Cloud Infrastructure Entitlement Management (CIEM) is essential
  • Experience with implementing Zero Trust concepts, including Conditional Access or Adaptive Trust type controls is desirable
  • Understanding of machine identities and managing these as part of a cloud-first DevOps model, enabling secure and efficient development is desirable
  • Practical experience of cloud-native concepts such as Cloud Security Posture Management (CSPM) and SaaS Posture Management (SSPM) is desirable
  • Excellent attention to detail and ability to work comfortably with data in Microsoft Excel (essential) and Power BI (desirable)
  • Business outcome orientated with a desire to apply technology and security to enable delivery
  • Drive to continually develop skills, maintain expertise and relevance in a fast-changing technology and threat landscape
  • Holding, or willingness to study for, qualifications such as CISSP, CISM, Microsoft Security Certifications or similar is desirable
  • Collaborative style, ability to communicate effectively and work with Security, Technology and Business Stakeholders of all levels of seniority
  • Excellent written and verbal communication skills

Inclusion & Diversity

We value diversity and strive to promote inclusivity in all aspects of our culture. We believe in equal opportunities for all, ensuring that no applicant encounters less favourable treatment based on anything but their skills, qualifications, experience, and potential. We celebrate the unique contributions of a diverse workforce and create a respectful, nurturing environment where every colleague can thrive.

Values

Do the right thing:We act with integrity and are proudly committed to going above and beyond in service of our clients and the support we provide our communities.
Always curious:We continuously seek new ideas and knowledge so we're one step ahead of our clients' needs. We look for inspiration everywhere and encourage experimentation, recognising that this is how we create brilliant solutions for brighter futures.
Embrace challenge:We aim high to transform our potential into meaningful outcomes. With ambition as our driving force and a steadfast commitment to growth, we succeed for the good of every generation.
Stronger together:Combining our diverse talents, we accomplish more collectively than we ever could do alone. We speak openly, actively listen, and support each other, and constructively challenge and embrace new ideas. We seek empowerment and demonstrate ownership and trust, with the confidence to make impactful decisions.

Core Benefits

Holiday:182 hours (26 days)

Quilter Incentive Scheme:All employees are eligible to participate in incentive scheme, to incentivise business performance and their contribution.

Pension Scheme:A non-contributory company pension scheme that can be boosted through personal contributions.

Private Medical Insurance:Single cover as standard with options to increase cover to include your partner or children.

Life Assurance:4x your salary.

Income Protection:75% of salary, less state benefits, payable after 26 weeks of absence.

Healthcare Cash Plan:Jersey employees only

In addition to our core benefits, we offer a range of flexible benefits to UK employees that you can choose from and pay for conveniently via a salary deduction.

#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Information Security Analyst | Bristol, UK

Lead Security Engineer - Chase UK | London, UK

Global Data Protection Officer | London, UK

IT Security Analyst

Cyber Security Analyst - Luton

Cyber Security Analyst

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.

UK Visa & Work Permits Explained: Your Essential Guide for International Cyber Security Talent

Cyber security is one of the fastest-growing fields in today’s digital age. As cyber threats proliferate—ranging from data breaches and ransomware attacks to sophisticated nation-state incursions—organisations worldwide are investing more than ever to protect their systems, networks, and customer data. The United Kingdom, in particular, is emerging as a hub for advanced cyber defence, AI-driven threat detection, and compliance consulting. For international cyber security professionals, the UK offers a wealth of career opportunities, spanning financial services, government contracts, tech start-ups, and global corporations. However, stepping into the UK’s cyber security job market requires a clear understanding of the country’s visa and work permit processes. If you are an international candidate with expertise in areas like intrusion detection, penetration testing, or security architecture, navigating these immigration pathways can be daunting. This article aims to demystify the visa process—highlighting key routes, eligibility criteria, and practical tips—to help you seamlessly transition into the British cyber security ecosystem.