Cyber BA IAM

Cyber BA IAM

Posted Today by Bonhill Partners

£550 Per day
Inside
Onsite
London Area, United Kingdom

Summary: The Cyber BA (IAM) role involves delivering Identity and Access Management (IAM) design and implementation within regulated or large-scale enterprise environments. The position requires a strong understanding of access management principles and identity governance, along with experience in developing and embedding controls and processes. The role is based in London and is a full-time contract position.

Key Responsibilities:

  • Deliver IAM design and implementation within regulated or large-scale enterprise environments.
  • Develop, implement, and embed controls, processes, and procedures related to access management.
  • Understand and apply industry-recognised regulatory and security frameworks impacting access management.
  • Design controls based on Segregation of Duties (SoD) concepts.
  • Manage multiple priorities and parallel delivery streams within complex technology ecosystems.
  • Engage with broader cybersecurity domains, including business analysis or solution design.

Key Skills:

  • Experience in IAM design and implementation.
  • Strong understanding of access management principles and identity governance.
  • Knowledge of regulatory and security frameworks.
  • Proven experience with Segregation of Duties (SoD) concepts.
  • Ability to manage multiple priorities and delivery streams.
  • Broader exposure to cybersecurity domains.

Salary (Rate): £550 daily

City: London

Country: United Kingdom

Working Arrangements: on-site

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Role: Cyber BA (IAM)

Rate: up to £550 inside IR35

Contract length: 6 months rolling

Location: London, Liverpool street - full time.

Experience delivering IAM design and implementation within regulated or large-scale enterprise environments

Strong understanding of access management principles and identity governance

Experience developing, implementing, and embedding controls, processes, and procedures

Knowledge of industry-recognised regulatory and security frameworks impacting access management

Proven experience with Segregation of Duties (SoD) concepts and control design

Experience working within complex, enterprise-level technology ecosystems

Ability to manage multiple priorities and parallel delivery streams

Broader exposure to other cybersecurity domains, including business analysis or solution design