Senior IAM Developer (One Identity)

Polbeth
4 weeks ago
Applications closed

Related Jobs

View all jobs

Senior dotnet developer

Senior IT Support Engineer / Security

Senior Network Engineer

Senior Security Engineer

Senior Infrastructure Architect

Head of Security Architecture

Location for this position is flexible, we are accepting candidates who are able to work Hybrid in either our Livingston, London Osterley or Brick Lane Office.

We believe in better. And we make it happen.

Better content. Better products. And better careers.

Working in Tech, Product or Data at Sky is about building the next and the new. From broadband to broadcast, streaming to mobile, SkyQ to Sky Glass, we never stand still. We optimise and innovate.

We turn big ideas into the products, content and services millions of people love.

And we do it all right here at Sky.

As a key member of the Enterprise Technology Identity and Access Management team, you will help set the direction of Sky's Identity and Access Management (IAM) roadmap and strategy as we expand the platform (One Identity) to different business areas within Sky Group. You will be an authentication and access management specialist who will be comfortable developing, implementing, and maintaining secure and efficient IAM systems for our internal stakeholders.

What You'll Do Design, develop, and implement IAM solutions using One Identity Manager.

Collaborate with other team members to ensure that IAM solutions meet business requirements, security standards, and regulatory compliance.

Develop custom scripts and processes to extend the functionality of One Identity Manager.

Configure and maintain connectors for identity sources such as Active Directory, LDAP, and HR systems.

Perform IAM solution testing, troubleshooting, and issue resolution.

Be responsible for the development lifecycle, testing and deployment of your code, ensuring change compliance is maintained throughout.

Proactively ensure that the platform remains in line with emerging technologies by ensuring upgrades are completed in a timely manner.

Provide technical guidance to clients and other team members on IAM best practices, solution design, and implementation.

Participate in the development and delivery of client training programs and technical documentation as required.

Have an identity first approach with a sound understanding of the concept of least privileged.

Conduct regular audits and assessments of the IAM stack identify and address any security gaps or vulnerabilities.

Work with auditors to and supply evidence as required.

Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.)

Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations.

Mentoring and support for other members of the Team.

What You'll Bring Solid understanding of Identity Governance and Administration platforms (preferably One Identity) with extensive demonstrable recent experience in the field.

Strong understanding of IAM concepts and protocols such as LDAP, SAML, OAuth, and OpenID Connect.

Expertise in cross platform scripting (TSQL, Powershell, bash etc...)

On premise and cloud directory services (LDAP, Azure AD, GSuite etc.)

Be a subject matter expert on both legacy and modern authentication protocols.

Have excellent security awareness including standards e.g., IS(phone number removed), NIST and CIS.

Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures.

Have a good understanding of Access Controls and Identity Lifecycle management.

Have excellent communication and organisational skills.

Team overview

Cyber Security

Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber-attacks is one of our top priorities. Our Cyber Security team helps the business grow while protecting our customers, colleagues and partners from increasingly sophisticated cyber threats. Our team includes Cyber Fusion Centre, Security Services, Risk and Compliance, Programme Delivery and Business Security, and we work across the UK, Italy and Germany. Join us and you'll get involved in tackling challenges and future threats in an ever-changing cyber landscape.

The rewards

There's one thing people can't stop talking about when it comes to #LifeAtSky: the perks. Here's a taster: Sky Q, for the TV you love all in one place

The magic of Sky Glass at an exclusive rate

A generous pension package

Private healthcare

Discounted mobile and broadband

A wide range of Sky VIP rewards and experiences

Inclusion & how you'll work

We are a Disability Confident Employer, and welcome and encourage applications from all candidates. We will look to ensure a fair and consistent experience for all, and will make reasonable adjustments to support you where appropriate. Please flag any adjustments you need to your recruiter as early as you can.

We've embraced hybrid working and split our time between unique office spaces and the convenience of working from home. You'll find out more about what hybrid working looks like for your role later on in the recruitment process.

Your office space

Livingston Watermark House, Scotland

Our lively campus is a free shuttle bus away from Livingston South train station and the town centre. Plus there's onsite parking available for cars, motorbikes and bicycles.

You'll be well fed at our subsidised canteen, and you can keep in shape at our onsite gym - or play a game of pool or table tennis.

Osterle y, London

Our Osterley Campus is a 10-minute walk from Syon Lane train station. Or you can hop on one of our free shuttle buses that run to and from Osterley, Gunnersbury, Ealing Broadway and South Ealing tube stations. There are also plenty of bike shelters and showers.

On campus, you'll find 13 subsidised restaurants, cafes, and a Waitrose. You can keep in shape at our subsidised gym, catch the latest shows and movies at our cinema, get your car washed, and even get pampered at our beauty salon.

Brick Lane, London

Brick Lane is in the heart of the East End of London. It's part of a vibrant and diverse community; close to street food, cafes and shops. The closest tube station is Aldgate East and Liverpool Street is about a 10 minute walk.

We'd love to hear from you

Inventive, forward-thinking minds come together to work in Tech, Product and Data at Sky. It's a place where you can explore what if, how far, and what next.

But better doesn't stop at what we do, it's how we do it, too. We embrace each other's differences. We support our community and contribute to a sustainable future for our business and the planet.

If you believe in better, we'll back you all the way.

Just so you know: if your application is successful, we'll ask you to complete a criminal record check. And depending on the role you have applied for and the nature of any convictions you may have, we might have to withdraw the offer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.