SC AWS IAM/PingID Specialist - CGEMJP00285455

Experis
Cheltenham
1 week ago
Applications closed

Related Jobs

View all jobs

Security Architect - IDAM

Cloud Security Engineer

Oracle Fusion Applications Security Consultant

Oracle Fusion Applications Security Consultant

Senior Security Consultant (Architect)

Cloud Security Architect

Role Title:AWS IAM/PingID Specialist

Duration:contract to run until 16/06/2025

Location:Remote

Rate:up to £581.53 p/d Umbrella inside IR35

Clearance required:Active Security Clearance is essential

Key Skills/ requirements

  • Has designed, architecture and deployed the Ping One and AWS Identity and integrated the 2.
  • Familiar to SAML and OAUTH / OIDC
  • Competent in the logical configuration of Ping One and AWS Identity cloud services.
  • Technical Proficiency in IAM Tools: Expertise in using and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities and access permissions.
  • Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure and compliant access management.
  • Scripting and Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems.
  • Authentication and Access Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC)
  • Problem-Solving and Analytical Abilities: Strong problem-solving skills to diagnose and resolve access issues, analyze security incidents, and perform regular audits and risk assessments of IAM systems.
  • Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and compliant with DCC Security standards.
  • Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications.
  • Establishes and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities.
  • Implements and manages multi-factor authentication (MFA), single sign-on (SSO), and other authentication methods to secure user access.
  • Ensures compliance with regulatory requirements (e.g., GDPR, HIPAA) by conducting regular audits and maintaining detailed records of access activities.
  • Develops and enforces security policies and best practices for identity and access management, reducing the risk of unauthorized access and data breaches.
  • Defines and manages roles and permissions to streamline access control and ensure users have the minimum necessary access to perform their duties.
  • Integrates IAM solutions with other IT systems, such as HR databases, cloud services, and enterprise applications, to streamline identity management processes.
  • Provides training and support to SOC Analyst users on IAM policies, procedures, and tools to ensure effective and secure use of identity management systems.

All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in the first instance. We thank you for your interest and the time taken to apply!


JBRP1_UKTJ

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.