At a Glance
- Tasks: Manage privileged access and secrets, ensuring secure access to critical systems.
- Company: Join a security-first organisation in a fast-paced, regulated environment.
- Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
- Why this job: Make a real impact on security by tackling core engineering challenges.
- Qualifications: Experience with PAM, CyberArk, and automation skills are essential.
- Other info: Dynamic role with opportunities for continuous improvement and career advancement.
The predicted salary is between 36000 - 60000 £ per year.
We’re hiring a Privileged Access & Identity Security Engineer to join a highly technical, security-first organisation operating in a fast-paced, regulated environment. Identity, privileged access, and secrets are treated here as core security engineering problems, not just compliance controls. This role sits within the Identity & Access Management (IAM) function, with a strong emphasis on Privileged Access Management (PAM), automation, and secure access to critical systems and platforms.
Responsibilities:
- Own and operate enterprise PAM platforms (e.g. CyberArk or equivalent)
- Design, implement, and maintain privileged access controls across Windows, Unix/Linux, and application environments
- Automate onboarding of privileged and service accounts, including credential rotation and reconciliation
- Enforce least privilege and just-in-time access principles
- Monitor privileged sessions and support investigations into access-related incidents
Secrets & Non-Human Access:
- Manage credentials for applications, services, and automation workflows
- Support secure runtime credential retrieval and rotation
- Work with engineering teams to reduce hard-coded secrets and improve secrets hygiene
- Contribute to the evolution of secrets management and CI/CD integrations
IAM & Access Controls:
- Partner with infrastructure, application, and security teams to implement robust access models
- Support RBAC and access policy alignment across on-prem and cloud platforms
- Maintain clean documentation, standards, and operating procedures
Governance, Audit & Operations:
- Support access reviews, audit requests, and evidence production
- Contribute to incident response related to privileged access or credential exposure
- Help mature IAM and PAM processes through automation and continuous improvement
Must Have’s:
- Strong hands-on experience with Privileged Access Management (PAM)
- Deep knowledge of CyberArk (Vault, PSM/PSMP, CPM, Privilege Cloud) or equivalent
- Experience automating privileged access onboarding and credential lifecycle
- Solid understanding of least privilege, JIT access, and privileged account risk
- Background working in regulated or high-security environments
- Comfortable operating as a senior individual contributor with real ownership
Nice to have:
- Exposure to secrets management concepts or platforms
- Cloud experience (AWS and/or Azure)
- Scripting or automation (PowerShell, REST APIs, etc.)
IAM Engineer - Privileged Access & Secrets Management in London employer: Levy Global
Contact Detail:
Levy Global Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land IAM Engineer - Privileged Access & Secrets Management in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect on LinkedIn. We all know that sometimes it’s not just what you know, but who you know that can help you land that IAM Engineer role.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects related to PAM and secrets management. We want to see how you tackle real-world problems, so let your work speak for itself!
✨Tip Number 3
Prepare for those interviews! Brush up on your knowledge of CyberArk and automation techniques. We recommend practising common interview questions and scenarios related to privileged access management to really impress the hiring team.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. We’re excited to see your passion for IAM and how you can contribute to our security-first culture.
We think you need these skills to ace IAM Engineer - Privileged Access & Secrets Management in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Privileged Access Management and any relevant tools like CyberArk. We want to see how your skills align with the role, so don’t be shy about showcasing your hands-on experience!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about IAM and how you can contribute to our security-first approach. We love seeing genuine enthusiasm for the role and the company.
Showcase Your Technical Skills: Don’t forget to mention your technical skills, especially around automation and scripting. If you’ve got experience with PowerShell or REST APIs, let us know! We’re looking for someone who can hit the ground running.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at Levy Global
✨Know Your PAM Tools Inside Out
Make sure you’re well-versed in Privileged Access Management tools like CyberArk. Be ready to discuss your hands-on experience and any specific projects where you’ve implemented or maintained these systems. This shows you’re not just familiar with the theory but have practical skills that can benefit the team.
✨Demonstrate Your Automation Skills
Since automation is key in this role, prepare examples of how you've automated onboarding processes or credential lifecycles. Talk about the scripting languages you’ve used, like PowerShell or REST APIs, and how they improved efficiency in your previous roles.
✨Understand Security Principles Thoroughly
Brush up on concepts like least privilege and just-in-time access. Be prepared to explain how these principles apply to real-world scenarios and how you’ve enforced them in past positions. This will show your depth of knowledge and commitment to security best practices.
✨Prepare for Scenario-Based Questions
Expect questions that put you in hypothetical situations related to IAM and PAM challenges. Think through how you would handle incidents involving privileged access or credential exposure. This will demonstrate your problem-solving skills and ability to think critically under pressure.