Senior IAM Engineer
Glocomms is partnered with a leading investment firm seeking a highly skilled Senior IAM Engineer to support enterprise-scale, secure, and high-performance computing environments that underpin critical scientific research and production systems.
Role Overview
This role is responsible for designing, building, and operating secure, scalable infrastructure and identity platforms across cloud, on‑premises, and hybrid environments. The individual will play a key role in enabling secure access to high‑performance computing (HPC) resources, cloud platforms, and SaaS services while embedding modern security practices into infrastructure engineering and software delivery workflows.
The position requires deep expertise in Identity and Access Management (IAM), infrastructure engineering, and secure system design, with a strong focus on automation, compliance, and developer experience.
Key Responsibilities
- Design, implement, and operate secure, scalable infrastructure supporting HPC, scientific research environments, and enterprise production systems.
- Lead IAM architecture and implementation, including authentication, authorization, access control, and user lifecycle management.
- Own and improve Joiner/Mover/Leaver (JML) processes, identity governance, and access certification workflows.
- Implement and manage enterprise authentication systems including SSO, SAML, OIDC, MFA, and directory services.
- Design and support Privileged Access Management (PAM), Public Key Infrastructure (PKI), and cryptographic services.
- Ensure secure access to Linux-based systems, Kubernetes platforms, OpenStack environments, and cloud platforms (AWS and Azure).
- Partner closely with software, platform, and research engineering teams to translate business and scientific requirements into secure technical solutions.
- Embed secure-by-design and secure development lifecycle principles into SDLC, CI/CD pipelines, and Infrastructure as Code (IaC).
- Implement automation to improve reliability, compliance, and operational efficiency across IAM and infrastructure platforms.
- Drive continuous improvement of IAM tooling, platforms, and processes to enhance security posture and developer experience.
- Support container security, input sanitization, secrets management, and secure systems integration.
- Contribute to enterprise security architecture and compliance initiatives, ensuring alignment with regulatory and internal control requirements.
- Participate in cross-functional engineering collaboration, influencing standards, patterns, and best practices across the organization.
Required Qualifications
- Strong experience in infrastructure engineering within enterprise-scale environments.
- Deep expertise in Identity and Access Management, including authentication, authorization, identity governance, and access control.
- Hands-on experience with SSO technologies (SAML, OIDC), MFA, PAM, and directory services.
- Proficiency with Linux systems, Kubernetes, and cloud platforms such as AWS and Azure.
- Experience supporting or integrating with HPC or research computing environments.
- Strong understanding of modern security practices, secure system design, and enterprise security architecture.
- Experience implementing Infrastructure as Code and integrating security into CI/CD pipelines.
- Solid knowledge of container security, cryptography, and secure access to infrastructure.
Nice to Have
- Experience with OpenStack environments and scientific computing platforms.
- Background in software architecture or security engineering roles.
- Proven ability to improve IAM and security tooling at scale through automation.
- Strong stakeholder engagement skills with both technical and non-technical audiences.
Impact
This role plays a critical part in enabling secure, compliant, and performant access to mission‑critical systems. The successful candidate will help shape the organization's identity and infrastructure security strategy while supporting innovation across cloud, research, and production environments.
FAQs
Congratulations, we understand that taking the time to apply is a big step. When you apply, your details go directly to the consultant who is sourcing talent. Due to demand, we may not get back to all applicants that have applied. However, we always keep your CV and details on file so when we see similar roles or see skillsets that drive growth in organisations, we will always reach out to discuss opportunities.
Yes. Even if this role isn’t a perfect match, applying allows us to understand your expertise and ambitions, ensuring you're on our radar for the right opportunity when it arises.
We also work in several ways, firstly we advertise our roles available on our site, however, often due to confidentiality we may not post all. We also work with clients who are more focused on skills and understanding what is required to future-proof their business.
That's why we recommend registering your CV so you can be considered for roles that have yet to be created.
Yes, we help with CV and interview preparation. From customised support on how to optimise your CV to interview preparation and compensation negotiations, we advocate for you throughout your next career move.
