Click here to download our latest salary guide

DATA AND ACCESS MANAGEMENT

Ensuring the appropriate people are granted access to specific company data, applications and tools is an essential part of any information security strategy, regardless of the sector you work within.

We Identify Top Data & Access Management Talent​

Xcede help organizations locate exceptional IAM candidates in line with their cybersecurity needs and goals. We identify niche cyber technology candidates to help you deploy tailored data security solutions and IAM practices and tools across your organisation to protect your data at its source. We locate the specialists needed to regulate permissions on shared drives and manage all aspects of authentication, authorisation, compliance, and data policy and procedure.

By minimising vulnerabilities and risks, you can in turn protect your organization from internal and external attacks and reinforce your company’s reputation as a trusted, compliant supplier. ​

OUR DATA AND IAM JOBS​

Xcede are trusted by organisations of every size from innovative start-ups to industry-leading cyber vendors to deliver them the best Data & IAM candidates in the market. We have a proven track record of sourcing top IT talent in locations across the globe covering all functions within Data and Access Management. Our roles include: IAM Consultant; IAM Architect; IAG Consultant; DLP Specialist; GDPR Consultant and many more. ​

To see how Xcede can help you identify top Data & Access Management talent, contact our team today. Looking for a new role? Explore our current opportunities below.

Scroll to discoverscroll down

CYBER SPECIALISMS

InfoSec, GRC & Vulnerabilities
InfoSec, GRC & Vulnerabilities
Network Security & Operations
Network Security & Operations
Security Architecture & Engineering
Security Architecture & Engineering
Commercial & Support
Commercial & Support
Threat Research & Penetration Testing
Threat Research & Penetration Testing

LATEST CYBER JOBS

MEET THE CYBER TEAM
Alex Candeland
Alex Candeland
Specialisms: Cyber, Threat Research & Penetration Testing, InfoSec, GRC & Vulnerabilities, Network Security & Operations
Bao Trinh
Bao Trinh
Specialisms: Data, Cloud, Cyber, AI & Machine Learning, Software
Brett Marsh
Brett Marsh
Specialisms: Data Science, AI Product Management, Generative AI, AI Engineering, Product Management, UX, Software, Cyber
Daniel Klein
Daniel Klein
Specialisms: Cyber, Data, Cloud
Daniel Mills
Daniel Mills
Specialisms: Cloud, Cyber, DevOps
Jamaine Agyepong
Jamaine Agyepong
Specialisms: Cyber, Data & Access Management
James Bull
James Bull
Specialisms: Networks, Cloud Engineering & Architecture, DevOps , Product Management, Cyber, InfoSec, GRC & Vulnerabilities, Network Security & Operations
Jonathan Malone
Jonathan Malone
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Luke Caselle
Luke Caselle
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Network Security & Operations, Data & Access Management, Security Architecture & Engineering, Threat Research & Penetration Testing, Commercial & Support
Luke Davis
Luke Davis
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Matt O'Hare
Matt O'Hare
Specialisms: Cyber, Networks, Network Security & Operations
Mouna Kaess
Mouna Kaess
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Oliver Thomas
Oliver Thomas
Specialisms: Data & Access Management, Cyber
Shakir Muhammad
Shakir Muhammad
Specialisms: Cloud, Cyber, Network Security & Operations, Networks
Shay Kingham
Shay Kingham
Specialisms: Cyber