At a Glance
- Tasks: Join us as a Cyber Security Specialist, mapping access-management processes and conducting gap analysis.
- Company: Be part of a dynamic team in Sheffield, focused on cutting-edge cybersecurity solutions.
- Benefits: Enjoy hybrid work options, competitive salary, and opportunities for professional growth.
- Why this job: Make a real impact in the world of cybersecurity while collaborating with diverse teams.
- Qualifications: 5+ years in IT security or IAM, with hands-on experience in AWS, Azure, and GCP.
- Other info: Ideal for tech-savvy individuals passionate about cloud security and identity management.
The predicted salary is between 48000 - 84000 ÂŁ per year.
Location: UK - Sheffield (Hybrid)
Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analysing IAM logs and evaluating risk.
On the cloud side, they must understand IAM constructs in:
- AWS (users, roles, policies, permission boundaries)
- Azure (Azure AD, RBAC, PIM)
- GCP (principals, roles, policy bindings)
- Alibaba Cloud (RAM users, groups, roles, and policy management)
Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments.
Cloud-Specific IAM Knowledge (Required)
- AWS IAM: In-depth understanding of IAM users/groups/roles/policies, permission boundaries, service-linked roles, and AWS Organizations (SCPs). Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., “*” or wildcard actions), and recommending fine-grained least-privilege models.
- Azure Active Directory & Azure RBAC: Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies. Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation.
- GCP IAM: Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and Organization-level policies. Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organization/Folder/Project-level least-privilege structures.
- Kubernetes RBAC & Cloud-Native Identities: Solid grasp of Kubernetes RBAC entities—Role, Cluster Role, Role Binding, ClusterRoleBinding—and how they map to Kubernetes API groups. Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration).
- SaaS Application Identity Management: Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM). Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365).
Required Skills & Experience:
- 5+ years as a Business Analyst (or similar) focused on IT security, governance, or IAM.
- Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP.
- Practical knowledge of AWS IAM (users/roles/policies), Azure AD & RBAC, and GCP IAM (roles/bindings).
- Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE).
- Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning).
- Strong gap-analysis skills, able to pinpoint missing or weak access controls.
- Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/CloudFormation) for IAM-related misconfigurations.
- Excellent stakeholder management; able to facilitate cross-functional workshops and drive consensus.
Cyber Security Specialist employer: LinkedIn
Contact Detail:
LinkedIn Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Specialist
✨Tip Number 1
Familiarise yourself with the specific IAM constructs and policies of AWS, Azure, and GCP. Understanding these platforms deeply will not only help you in interviews but also demonstrate your commitment to the role.
✨Tip Number 2
Engage with online communities or forums focused on cybersecurity and IAM. Networking with professionals in the field can provide insights into the latest trends and challenges, which you can discuss during your interview.
✨Tip Number 3
Prepare to showcase your gap analysis skills by reviewing case studies or examples of IAM processes you've worked on. Being able to articulate your thought process and findings will set you apart from other candidates.
✨Tip Number 4
Brush up on your communication skills, especially in terms of aligning technical concepts with business needs. Practising how to explain complex IAM topics in simple terms can be a game-changer in interviews.
We think you need these skills to ace Cyber Security Specialist
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cybersecurity, particularly focusing on IAM processes in AWS, Azure, and GCP. Use specific examples to demonstrate your hands-on experience and skills related to the job description.
Craft a Compelling Cover Letter: Write a cover letter that showcases your understanding of the role and how your background aligns with the company's needs. Mention your experience with gap analysis and stakeholder management, as well as your familiarity with cloud-specific IAM knowledge.
Highlight Key Skills: In your application, emphasise your strong communication skills and data-driven mindset. Provide examples of how you've successfully aligned security, DevOps, and business teams in previous roles.
Showcase Relevant Projects: If applicable, include details about specific projects where you mapped and documented IAM processes or conducted gap analyses. This will help demonstrate your practical knowledge and problem-solving abilities in real-world scenarios.
How to prepare for a job interview at LinkedIn
✨Showcase Your Technical Knowledge
Make sure to brush up on your understanding of IAM constructs across AWS, Azure, GCP, and Alibaba Cloud. Be prepared to discuss specific examples of how you've implemented or reviewed IAM policies, as this will demonstrate your hands-on experience.
✨Prepare for Scenario-Based Questions
Expect questions that require you to analyse a given scenario related to access management or gap analysis. Practise articulating your thought process clearly, as this will showcase your analytical skills and ability to communicate effectively with stakeholders.
✨Highlight Your Communication Skills
Since the role requires strong communication between Security, DevOps, and business teams, be ready to provide examples of how you've successfully facilitated cross-functional workshops or driven consensus in previous roles.
✨Demonstrate a Data-Driven Mindset
Be prepared to discuss how you've used data to evaluate risks or identify over-privileged accounts in past projects. This will show that you not only understand the technical aspects but also appreciate the importance of data in decision-making.