Overview
Cadent Gas Ltd Secure our digital future through identity excellence. As an IAM Technical Analyst, you will report to the Identity & Access Management team and work closely with internal IT teams and external partners to support delivery of Cadent’s IAM roadmap into an ITIL‑disciplined environment, providing IT services in a multisource model to an enterprise of 7000+ employees and external workers in a regulated utility. The IAM team aims to enhance user experience by simplifying, improving, and automating access to systems & data for digital identities, including Privileged Access Management (PAM). We focus on provisioning and revocation of access to resources, ensuring access is authenticated, limited, and based on the principle of least privilege. We are accountable for ongoing development and deployment of automated access management processes and integrations on Cadent’s non‑SAP platforms and systems (Microsoft Active Directory, Entra ID and MS 365), and we enhance governance to improve management of digital identities, protect Cadent’s network to meet regulatory obligations (NCSC CAF), and align to strategy and best practice.
Responsibilities
* Technical delivery – Implement, support and optimize IAM and PAM services across the enterprise, including SSO enablement of new SaaS applications and providing technical input and support to other projects and programmes.
* Technical assurance – Ensure compliance with the Change Management process and provide technical validation to protect live service.
* Security & Compliance – Align with NCSC CAF and regulatory obligations, develop, manage, and adhere to IAM Standard Operating Procedures (SOPs), and support internal and external IAM security audits.
* Automation & Integration – Drive improvements in provisioning, revocation, and access governance.
* Collaborative culture – Collaborate across IT, business, and vendor teams to deliver secure solutions.
* Continuous Improvement – Champion innovation and efficiency in identity management, including maintenance plans and roadmaps to maintain service health.
Qualifications
* Education & Certifications – Degree in IT or Cybersecurity, ITIL Foundation, and ideally CIAM, CISSP or CISM.
* Extensive hands‑on experience in IT; specifically Microsoft Active Directory (AD), Entra ID and MS 365, with a good knowledge of system technologies, monitoring tools, processes, and incident handling in a 24×7×365 support environment.
* Experience configuring, implementing, developing, and supporting complex solutions; evidence of vendor / stakeholder management qualities.
* Technical curiosity and continuous skills refresh, with cutting‑edge and new‑to‑market technologies explored, understood, and assessed.
* Experience and understanding of different delivery methods and tools, including Waterfall, Agile, SCRUM, Prince2, KANBAN and JIRA.
* Experience building relationships and working with a variety of stakeholders, supported by interpersonal and communication skills at all levels, and the ability to translate complex IT issues into business‑related vocabulary.
* Experience and understanding of the ITIL framework and ITSM tools, specifically ServiceNow.
* Experience working in a regulated utility industry is desired.
* Experience and understanding of UK Data Privacy legislation.
Additional Technical Knowledge or Qualifications (Highly Desirable)
* Identity and Access Management, specifically Microsoft Active Directory (AD), Entra ID and MS 365, including Entra Connect, app registrations, certificate and password management for user and machine authentication.
* Deep knowledge of SAML, OAuth, OpenID Connect, SCIM, MFA and federation protocols.
* HR provisioning, specifically SAP SuccessFactors to AD / Entra ID.
* Experience with Microsoft Entra ID Conditional Access, Defender for Identity, and Entra Permissions Management including PIM.
* Strong understanding of cyber‑security principles, including zero‑trust, privileged access management (PAM), Just‑In‑Time (JIT) access, Role‑Based Access Control and adaptive authentication.
* Privileged Access Management, specifically CyberArk suite.
* Experience integrating applications with IGA solutions using a variety of APIs and protocols such as Web service protocols REST/SOAP, LDAP, CSV.
* Hands‑on experience with identity automation; PowerShell scripting / MS Graph API, and other API‑based integrations.
* Data Lifecycle management tools such as Microsoft Defender & Microsoft Purview.
* NCSC Cyber Assessment Framework (CAF).
* DevOps and cloud security best practices in AWS / Azure environments.
J-18808-Ljbffr