At a Glance
- Tasks: Lead the IAM programme, ensuring secure user identity and access management.
- Company: Join a dynamic team in London focused on innovative cybersecurity solutions.
- Benefits: Enjoy flexible working options, competitive salary, and professional development opportunities.
- Why this job: Be at the forefront of cybersecurity, making a real impact on user security and access.
- Qualifications: 10+ years in IT/Security, with 5+ years in IAM management; relevant certifications preferred.
- Other info: Collaborate with cross-functional teams and manage outsourced teams in a virtual environment.
The predicted salary is between 72000 - 108000 £ per year.
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable for investigating incidents, recommending corrective actions, and training users on IAM standards and procedures.
What you will be doing:
- Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access.
- Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards.
- Identify gaps or potential improvements in the IAM landscape.
- Prepare responses to risk assessments and audits that identify and mitigate potential IAM risks.
- Participate in security IAM incident investigations and recommend corrective actions which include root cause and recommended actions.
- Prepare communication to users on IAM policies and procedures.
- Stay up to date on evolving threats, technologies, and solutions in the IAM space.
- Collaborate with other departments to ensure secure access to systems and data.
- Document IAM processes and procedures for reference and compliance purposes.
- Escalate and resolve IAM-related issues in a timely manner.
- Manage multi-factor authentication (MFA) systems to ensure they are functioning correctly and securely.
- Manage single sign-on (SSO) solutions to improve users experience and security.
- Monitor, maintain, and improve SSO systems to ensure they are functioning correctly and securely.
- Prepare monthly KPI and KRI metrics and reports for executive management.
- Create IAM presentations for an executive audience.
- Build business cases for any new capabilities or solutions needed.
- Collaborate with the Cybersecurity and solution architects to create and maintain the IAM strategy and roadmap.
What you will bring:
- Minimum of 10 years of experience in IT or Security, with at least 5 years in a management role overseeing IAM programs.
- Professional certification such as Certified Identity and Access Manager (CIAM) or Certified Identity Management Professional (CIMP), CISSP, or CISM is highly desirable.
- Experience with cybersecurity frameworks and standards, such as NIST, ISO 27001, or similar.
- General understanding of operational risk and risk-related control frameworks and practices such as ISO 27001, NIST SP 800-53, NIST CSF, COBIT, ITIL, etc.
- Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure Active Directory), SailPoint, or similar.
- Experience with CyberArk for user and service account privileged access management.
- Excellent analytical, problem-solving, presentation, and communication skills.
- Ability to work collaboratively with cross-functional teams and stakeholders in a highly matrixed organization.
- Experience with managing an outsourced team.
- The ability to prioritize multiple IAM initiatives using a risk-based approach.
- Good technical background in a range of security, and IAM technologies, specifically within an Azure environment.
- Experience migrating to a password-less environment.
- Excellent understanding of IAM principles, technologies, and best practices.
- Strong and broad understanding of Cybersecurity and IAM methodologies, frameworks and best practices.
- Understanding of project management methodologies.
- Knowledge of M365/Azure AD conditional access policies.
- Knowledge of Azure security principles and best practices.
- Bachelor's degree in computer science, information technology, or a related field.
- Excellent organizational skills.
- Ability to lead and work in a geographically dispersed virtual team environment.
- Excellent Power Point presentation documentation, verbal communication and interpersonal skills.
- Excellent stakeholder management skills and management of expectations.
- Proven experience in dealing/working with 3rd party suppliers.
Head of Identity & Access Management London, Agile (Basé à London) employer: Golden Bees
Contact Detail:
Golden Bees Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Head of Identity & Access Management London, Agile (Basé à London)
✨Tip Number 1
Familiarise yourself with the latest IAM tools and technologies, especially Microsoft Entra ID and CyberArk. Being well-versed in these platforms will not only boost your confidence but also demonstrate your readiness to take on the role.
✨Tip Number 2
Stay updated on current cybersecurity threats and trends. This knowledge will help you engage in meaningful conversations during interviews and show that you're proactive about the evolving landscape of IAM.
✨Tip Number 3
Network with professionals in the IAM field through LinkedIn or industry events. Building connections can provide insights into the role and may even lead to referrals, increasing your chances of landing the job.
✨Tip Number 4
Prepare to discuss your experience with risk assessments and audits. Be ready to share specific examples of how you've identified and mitigated IAM risks in previous roles, as this is a key responsibility for the position.
We think you need these skills to ace Head of Identity & Access Management London, Agile (Basé à London)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in Identity and Access Management (IAM) and cybersecurity. Focus on your management roles and any specific IAM tools or frameworks you've worked with, such as Microsoft Entra ID or CyberArk.
Craft a Compelling Cover Letter: In your cover letter, emphasise your leadership experience and how it aligns with the responsibilities of the Head of IAM role. Mention specific achievements in developing IAM standards or managing user access that demonstrate your capability.
Showcase Relevant Certifications: List any professional certifications you hold, such as CIAM, CIMP, CISSP, or CISM, prominently in your application. These credentials are highly desirable for this position and can set you apart from other candidates.
Highlight Collaboration Skills: Since the role involves working with cross-functional teams, provide examples in your application of how you've successfully collaborated with different departments to enhance IAM processes or resolve security issues.
How to prepare for a job interview at Golden Bees
✨Showcase Your IAM Expertise
Make sure to highlight your extensive experience in Identity and Access Management. Discuss specific projects where you developed or improved IAM standards, and be ready to explain how you managed user access while ensuring compliance with cybersecurity standards.
✨Demonstrate Problem-Solving Skills
Prepare examples of how you've identified gaps in IAM processes and implemented improvements. Be ready to discuss any incidents you've investigated, the corrective actions you recommended, and how you communicated these changes to users.
✨Stay Current with Industry Trends
Familiarise yourself with the latest threats and technologies in the IAM space. During the interview, mention any recent developments you've followed and how they could impact the company's IAM strategy.
✨Prepare for Technical Questions
Expect questions about IAM tools and technologies, especially those mentioned in the job description like Microsoft Entra ID and CyberArk. Brush up on your technical knowledge and be prepared to discuss your experience with these systems.