SC AWS IAM/PingID Specialist - CGEMJP00285455

Experis
Chesterfield
5 days ago
Create job alert

Role Title:AWS IAM/PingID Specialist

Duration:contract to run until 16/06/2025

Location:Remote

Rate:up to £552 p/d Umbrella inside IR35

Clearance required:Active Security Clearance is essential

Key Skills/ requirements

  • Has designed, architecture and deployed the Ping One and AWS Identity and integrated the 2.
  • Familiar to SAML and OAUTH / OIDC
  • Competent in the logical configuration of Ping One and AWS Identity cloud services.
  • Technical Proficiency in IAM Tools: Expertise in using and configuring IAM tools such as Okta, Azure AD, Ping Identity, SailPoint, and AWS Identity to manage user identities and access permissions.
  • Security and Compliance Knowledge: Strong understanding of security principles, best practices, and regulatory compliance standards (e.g., GDPR, HIPAA, SOX) to ensure secure and compliant access management.
  • Scripting and Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems.
  • Authentication and Access Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC)
  • Problem-Solving and Analytical Abilities: Strong problem-solving skills to diagnose and resolve access issues, analyze security incidents, and perform regular audits and risk assessments of IAM systems.
  • Works with the Lead Security Architect to deploy PING ID and AWS Identity, ensuring the configuration of tools is secure and compliant with DCC Security standards.
  • Automates and manages the creation, updating, and removal of user accounts and access rights across various systems and applications.
  • Establishes and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities.
  • Implements and manages multi-factor authentication (MFA), single sign-on (SSO), and other authentication methods to secure user access.
  • Ensures compliance with regulatory requirements (e.g., GDPR, HIPAA) by conducting regular audits and maintaining detailed records of access activities.
  • Develops and enforces security policies and best practices for identity and access management, reducing the risk of unauthorized access and data breaches.
  • Defines and manages roles and permissions to streamline access control and ensure users have the minimum necessary access to perform their duties.
  • Integrates IAM solutions with other IT systems, such as HR databases, cloud services, and enterprise applications, to streamline identity management processes.
  • Provides training and support to SOC Analyst users on IAM policies, procedures, and tools to ensure effective and secure use of identity management systems.

All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in the first instance. We thank you for your interest and the time taken to apply!


JBRP1_UKTJ

Related Jobs

View all jobs

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

SC AWS IAM/PingID Specialist - CGEMJP00285455

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.

Common Pitfalls Cyber Security Job Seekers Face and How to Avoid Them

The cyber security industry in the UK and worldwide is experiencing rapid growth. With cyber attacks growing in sophistication and frequency, organisations are investing more resources than ever into defending their digital assets. From penetration testers and threat analysts to security architects and compliance officers, cyber security professionals are in high demand across a variety of sectors—including finance, healthcare, government, and retail. Yet, in spite of this high demand, the process of landing a cyber security role can be more challenging than many candidates anticipate. The stakes are high: prospective employers entrust cyber professionals with their most sensitive data, their compliance posture, and often their core business operations. Therefore, they’re looking for candidates who can demonstrate not just technical know-how, but also excellent communication, adaptability, and an awareness of the broader business context. In this article, we’ll explore the most common pitfalls that cyber security job seekers face, especially in the UK market, and how to avoid them. Whether you’re a recent graduate, a professional transitioning from a different field, or an experienced practitioner aiming for a senior role, these insights will help you stand out and secure the opportunities that fit your skill set and career goals.