Senior IAM/PAM specialist with seven years securing identity infrastructure across UK financial services. Production-grade Okta, Azure Entra ID, HashiCorp Vault, and Zero Trust architecture - delivered the way it actually works at scale.
No bloated retainers. No glossy decks. Each engagement is scoped tightly, priced fairly, and built to leave your team better equipped than when I arrived.
Risk, vulnerability, and pre-audit reviews of your IAM and PAM estate. Findings tied to NIST and ISO 27001 with a remediation plan you can actually execute.
View details →Zero Trust IAM design, SSO federation strategy, and cloud identity blueprints across Azure Entra ID, Okta, and hybrid environments.
View details →Hands-on Okta, Vault, and Entra ID delivery. Configuration, integration, runbooks. Your team owns the outcome when I leave.
View details →Map IAM and PAM controls to NIST CSF, ISO 27001, SAMA, NCA ECC, PCI DSS, and CIS. Audit-ready evidence packs your auditors will accept.
View details →Free hands-on labs covering IAM and PAM end to end. Bespoke team workshops by enquiry only - limited availability.
Browse labs →I have spent the last seven years inside the privileged access teams of major UK banks and global IT services providers. I have onboarded the difficult accounts. I have written the runbooks. I have explained to auditors why a finding looks worse than it is.
Identity Bytes exists to share what actually works in production - not what reads well in a vendor whitepaper. The labs are free and stay free. The consulting is for organisations that want senior expertise without big-firm overheads.
My Full Story →Production-grade hands-on labs. Open-source tooling and free-tier accounts only - no enterprise licences required.
Stand up an enterprise-style directory in Docker. Master DN structures, object classes, and LDIF - the foundation every IAM platform builds on.
Configure Okta as an Identity Provider, federate a sample app over SAML, enforce MFA, and build your first lifecycle automation.
A complete JIT pipeline. Vault dynamic secrets, Okta OIDC authentication, time-bound privilege elevation, and full audit trail.
How social engineering bypassed enterprise MFA and the IAM controls that would have stopped it.
Complete runbook for emergency privileged access: invocation, audit, and credential rotation.
AI agents need credentials too. Why machine identity is the next PAM scaling problem.
Thirty-minute discovery call. No obligation. We figure out together whether I am the right fit before either of us commits to anything.