At a Glance
- Tasks: Secure and modernise identity management and privileged access across a global trading firm.
- Company: Join a leading global trading firm focused on cyber security transformation.
- Benefits: Competitive salary, growth opportunities, and the chance to shape security strategy.
- Other info: Ideal for curious problem-solvers who thrive in fast-paced environments.
- Why this job: Be part of a large-scale cyber transformation and make a real impact.
- Qualifications: Technical security background with experience in IAM, PAM, or cloud security.
The predicted salary is between 60000 - 80000 £ per year.
My client, a global trading firm, is investing heavily in identity security and privileged access transformation as part of a wider cyber acceleration programme. They’re now hiring an Identity & Privileged Access Engineer to help modernise and secure authentication, privileged access, and identity management across the organisation.
Responsibilities include:
- Securing privileged access pathways
- Implementing and improving PAM controls
- Managing Microsoft Entra ID and conditional access
- Supporting phishing-resistant authentication initiatives
- Automating identity and access workflows
- Improving least-privilege and access governance controls
To be successful you will bring:
- Hands-on technical security background
- Experience in IAM, PAM, infrastructure security or cloud security
- Exposure to scripting/automation
- Understanding of privileged access and authentication security
- Strong problem-solving and implementation mindset
This is why you should consider applying:
- Large-scale cyber transformation
- Ownership from day one
- Ability to shape identity security strategy
- Strong technical environment
- Huge growth opportunity
Traits my client is looking for:
- Beyond the technical skillset, the team is looking for engineers who are naturally curious and genuinely enjoy solving difficult technical problems.
- The ideal person will:
- Love tackling complex challenges and figuring things out
- Enjoy solving puzzles and working through ambiguity
- Be intellectually curious and constantly looking to improve systems and processes
- Thrive in environments where not everything is fully defined from day one
- Be comfortable building, iterating and evolving solutions as projects develop
- Enjoy thinking creatively and developing innovative solutions to difficult security problems
- Take ownership and proactively drive improvements rather than waiting for direction
This environment will suit people who enjoy fast-moving engineering cultures, greenfield problem solving, and having real influence over technical direction.
Identity & Privileged Access Engineer in London employer: Iceberg
Contact Detail:
Iceberg Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Identity & Privileged Access Engineer in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the industry. Attend meetups, webinars, or even online forums. The more people you know, the better your chances of landing that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects related to identity security and privileged access. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by practising common technical questions and scenarios related to IAM and PAM. We recommend doing mock interviews with friends or using online platforms to get comfortable with the format.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive and take the initiative to reach out directly.
We think you need these skills to ace Identity & Privileged Access Engineer in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV speaks directly to the job description. Highlight your experience in IAM, PAM, and any relevant technical skills that match what we're looking for. We want to see how your background aligns with our needs!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to showcase your problem-solving mindset and your passion for tackling complex challenges. Let us know why you're excited about the role and how you can contribute to our identity security strategy.
Showcase Your Technical Skills: Don’t just list your skills; demonstrate them! If you've worked on automating identity workflows or improving access governance controls, share specific examples. We love seeing real-world applications of your expertise!
Apply Through Our Website: We encourage you to apply through our website for a smoother process. It helps us keep track of your application and ensures you don’t miss out on any important updates. Plus, it shows you're keen to join our team!
How to prepare for a job interview at Iceberg
✨Know Your Stuff
Make sure you brush up on your technical knowledge related to identity and access management. Familiarise yourself with PAM controls, Microsoft Entra ID, and the latest trends in authentication security. Being able to discuss these topics confidently will show that you're serious about the role.
✨Show Your Problem-Solving Skills
Prepare to share examples of how you've tackled complex challenges in the past. Think of specific instances where you implemented solutions or improved processes. This will demonstrate your problem-solving mindset and your ability to thrive in ambiguous situations.
✨Be Curious and Engaged
During the interview, ask insightful questions about the company's current identity security initiatives and future plans. This shows that you're genuinely interested in the role and eager to contribute to their cyber transformation journey.
✨Demonstrate Ownership
Talk about times when you've taken ownership of a project or initiative. Highlight how you proactively drove improvements and iterated on solutions. This aligns perfectly with what the company is looking for in a candidate who can shape their identity security strategy.