£550 Per day
Inside
Onsite
London Area, United Kingdom
Summary: The Cyber BA (IAM) role involves delivering Identity and Access Management (IAM) design and implementation within regulated or large-scale enterprise environments. The position requires a strong understanding of access management principles and identity governance, along with experience in developing and embedding controls and processes. The role is based in London and is a full-time contract position.
Key Responsibilities:
- Deliver IAM design and implementation within regulated or large-scale enterprise environments.
- Develop, implement, and embed controls, processes, and procedures related to access management.
- Understand and apply industry-recognised regulatory and security frameworks impacting access management.
- Design controls based on Segregation of Duties (SoD) concepts.
- Manage multiple priorities and parallel delivery streams within complex technology ecosystems.
- Engage with broader cybersecurity domains, including business analysis or solution design.
Key Skills:
- Experience in IAM design and implementation.
- Strong understanding of access management principles and identity governance.
- Knowledge of regulatory and security frameworks.
- Proven experience with Segregation of Duties (SoD) concepts.
- Ability to manage multiple priorities and delivery streams.
- Broader exposure to cybersecurity domains.
Salary (Rate): £550 daily
City: London
Country: United Kingdom
Working Arrangements: on-site
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Role: Cyber BA (IAM)
Rate: up to £550 inside IR35
Contract length: 6 months rolling
Location: London, Liverpool street - full time.
Experience delivering IAM design and implementation within regulated or large-scale enterprise environments
Strong understanding of access management principles and identity governance
Experience developing, implementing, and embedding controls, processes, and procedures
Knowledge of industry-recognised regulatory and security frameworks impacting access management
Proven experience with Segregation of Duties (SoD) concepts and control design
Experience working within complex, enterprise-level technology ecosystems
Ability to manage multiple priorities and parallel delivery streams
Broader exposure to other cybersecurity domains, including business analysis or solution design