71 Iam Analyst jobs in Saudi Arabia
Senior Manager - Identity Access Management
Posted 6 days ago
Job Viewed
Job Description
Trending
Job DescriptionThe role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.
Responsibilities- Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
- Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
- Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
- Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
- Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
- Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
- Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
- Conduct periodic access reviews, audits, and risk assessments.
- Maintain IAM-related documentation, policies, standards, and procedures.
- Perform any other duties assigned to by line manager related to the nature of the work
- Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Preferred Qualifications
- A tertiary level qualification from an internationally recognized institution
- Certified Identity and Access Manager (CIAM)
Years & Nature of Experience
- Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
- A specialist individual contributor or a team lead who has managed and delivered projects
- Has team or technical supervision skills
- Demonstrated expertise and experience with complex technical activities
- Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
- Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
- Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
- Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
Senior Manager - Identity Access Management
Posted today
Job Viewed
Job Description
Trending
Job DescriptionThe role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.
Responsibilities- Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
- Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
- Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
- Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
- Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
- Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
- Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
- Conduct periodic access reviews, audits, and risk assessments.
- Maintain IAM-related documentation, policies, standards, and procedures.
- Perform any other duties assigned to by line manager related to the nature of the work
- Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Preferred Qualifications
- A tertiary level qualification from an internationally recognized institution
- Certified Identity and Access Manager (CIAM)
Years & Nature of Experience
- Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
- A specialist individual contributor or a team lead who has managed and delivered projects
- Has team or technical supervision skills
- Demonstrated expertise and experience with complex technical activities
- Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
- Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
- Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
- Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
Identity Access Management Operations Consultant
Posted today
Job Viewed
Job Description
Job Summary :
We are a leading consultant and system integrator in EMEA, with a flexible work environment.
We value having good people on our team and we make sure to give the recognition deserved for each contribution. If this sounds like the kind of company you would like to work with, we would love to meet with you.
Responsibilities
- You contribute to the design, build,and deployment of our new IAM solution.
- You assess business requests for possible solutions, and you design and implement these solutions via changes or projects.
- You work in a team that is responsible for the Development and Operations of the Identity and Access Management domain. Participate in operational activities like incident handling, preparation, and execution of changes.
- You evaluate innovations, technologies, and best practices that will be of value for the continuous improvement of our IAM platform. Conduct proof of value initiatives to present business value.
- You have a natural drive for continuous improvement and for automating repetitive tasks.
- You are proactive in preventing incidents from occurring, resolving recurring problems, and implementing changes in a controlled and secure manner.
- You coach less experienced colleagues and transfer IAM knowledge to other teams (e.g. Service Desk).
- You ensure proper documentation of IAM processes, process flows, designs, and operational procedures.
- You communicate, keep each other informed, provide each other feedback, and ask for help on time. Your involvement does not stop at the boundaries of your profession.
- You are a team player, be part of an enthusiastic and motivated team, but you are also capable of gettingthings done independently.
Requirements:
- Proven track record of 3 years + experience in a similar role, working in IT Security, Specifically IAM/PAM domain.
- Sail Point Experience is a must.
- BSc in Computer Science or equivalent
- Experience with IGA Implementation
- Experience in software development processes, source control,and issue-tracking systems.
- Good knowledge/skills in Access Management/SSO/Federation systems
- Experience with Active Directory-based Integrations.
- knowledge of Web Access management processes, and technologies, with emphasis on federation expertise, web services, and SOA
- knowledge and experience with and working with modern IAM concepts (identities, authentication, and authorization), systems, technologies, security standards, and protocols such as PAM, SAML/OAuth2, RBAC, and LDAP.
- Knowledge about any Identity and Access management platform Ex: (IBM, Oracle, SailPoint, CA, RSA, ForgeRock, Okta, Ping Identity, Quest, Beyond Trust, and CyberArk).
- Experience with and knowledge of Microsoft Active Directory (AD) and Azure AD.
- Good understanding of REST APIs, JSON, and Power Shell.
- Analytical, intellectual curious, autonomous, collaborative, and understands business value means.
- Integrity, reliability, and discretion in handling confidential information.
- Capable of building bridges between development, with our customers and our partners.
- Excellent documentation skills (technical solutions, automation, and ticket registration);
- Excellent written and verbal communication skills, including the ability to effectively translate and present technology solutions in business or management terms.
- Workshop and facilitation skills(or interest in) would be a big advantage.
- English language required.
- Familiarity with web services, SQL, and networking.
- Previous experience in requirements gathering design and solution building and the ability to replicate this in a commercial setting.
- Pro-active attitude, hands-on, and getting things done.
- Strong problem-solving and good skills in financial modeling ,using Excel.
- Able to perform under pressure to hit tight deadlines and deliver results in a fast-paced environment, whilstmulti-tasking on various projects.
- Customer-focused, innovative thinking, self-starter, flexible, highly organized, and strong attention to detail.
- Excellent teamwork and interpersonal skills.
- Flexible, eager,ambitious, and adaptable to change.
- Excellent judgment, organizational and problem-solving skills.
- A willingness to travel occasionally under normal circumstances.
Identity Access Management Implementation & Adapter development specialist
Posted 3 days ago
Job Viewed
Job Description
Overview
Location: Riyadh.
Job Type: Full Time
Education & ExperienceEducation: Bachelor’s degree Information Technology or Equivalent.
Experience Level: 7+ Year.
Job DescriptionJob Description :
- Design and deploy Identity Management & Governance solutions.
- Develop custom adapters for applications (for user lifecycle management) not having Out of the Box adapters.
- Develop custom workflows, lifecycle rules for multi-level approval requirements for user provisioning.
- Integrate applications with OOB adapters available with Identity Management solution.
- Administration and maintenance of Identity Management and Governance Solution.
- Writing scripts and using lifecycles feature of identity manager to enforce compliance, support new business requirements etc. which cannot be attained from regular workflows.
- Design and deploy Directory server solutions, Database solutions required as repositories for Identity Management solutions.
- Expertise on configuring HA for solutions at application and data layer levels.
- Expertise on following products but not limited to IBM SIM, IBM SIGI, IBM SDI, IBM DB2, IBM SDS.
- Good to have expertise on Other Identity management solutions from Oracle, One Identity, SailPoint etc.
Access Control Engineers
Posted 4 days ago
Job Viewed
Job Description
Degree in electronics or electrical engineering. Technical and hands-on understanding of plant and HVAC control theory and proven capability in servicing and maintaining Access Control systems; commissioning skills would be ideal. Knowledge and experience with other controls i.e. GE Siemens, & Honeywell. Arabic - Fluent / Excellent; English - Good.
Driver and Vehicle- Own a Car: Any
- Have Driving License: Any
- Good-looking
- Commitment to morality
- Respect the orders of the Director
- Movement anywhere in the Kingdom according to the demands of work
Business type: Electrical Engineering - Electronics - Information Technology (IT) - Software Engineering - Telecommunications - Communication Engineering.
- Data Center Engineer: BS degree in engineering computer science; 3 years experience in networking technologies; Active CCNA certification required; Knowledge of traditional voice and wireless technology; Knowledge of wireless LAN/WAN and experience in Red Hat linux and MySQL database.
- Intrusion System Engineers: Must have B.SC degree with 2 to 3 years of experience in the related field (perimeter intrusion detection – buried cable/ fence cable alarm/ microwave).
- Airport Systems (SITA): Bachelor's / college degree of engineering in information technology or equivalent with 3 years experience in the special Airport systems (SAS).
- Access Control Engineers: Degree in electronics or electrical engineering; Technical and hands-on understanding of plant and HVAC control theory; proven capability in servicing and maintaining Access Control systems; commissioning skills would be ideal; Knowledge and experience with other controls i.e. GE Siemens, & Honeywell.
- Site Manager: Must have B.S electronics or computer engineering degree with 3 to 5 years of experience in the related field; Experience with low current systems such as (CCTV, FAS… etc).
- BMS Engineers: Must have B.SC degree with 3 to 5 years of experience in the related field.
Network Access Control
Posted today
Job Viewed
Job Description
Job Description
Job Purpose:
The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization's network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.
Key Responsibilities & Duties
- Security Operations & Monitoring: Monitor firewalls, VPNs, intrusion prevention/detection systems, and other network security appliances for threats or anomalies. Respond to alerts and incidents based on threat intelligence and internal SOC escalations
- Firewall Management: Perform firewall rule reviews, changes, and optimization under established policies. Work with vendors and Level 3 engineers for troubleshooting and rule impact analysis
- Access Control & VPNs: Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments
- Strong experience in Cisco ISE
- Incident Response & Escalation: Participate in the response to security events and vulnerability findings. Document root cause analysis and corrective actions
- Change Implementation & Documentation: Implement security-related configuration changes in coordination with change management processes. Maintain records of firewall policies, security incidents, and access controls
- Compliance & Best Practices: Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits
Skills & Qualifications
- Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways
- Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS)
- Familiarity with log analysis, SIEM tools, and incident handling procedures
- Basic scripting or automation skills (Python, Bash) are a plus
- Strong analytical and problem-solving abilities
- Clear communication skills, particularly when interacting with cross-functional teams
Education & Certifications
- Bachelor's Degree in Network Engineering, Computer Engineering, or a related field
- Preferred certifications:
- Cisco CCNA (required), CCNP (preferred)
- SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus
Working Conditions
- On-call responsibilities for after-hours security events may be required
- Occasional work with external vendors, audits, or compliance teams
- Participation in periodic vulnerability assessments and penetration test reviews
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available
here
.
Network Access Control Engineer
Posted 1 day ago
Job Viewed
Job Description
#J-18808-Ljbffr
Be The First To Know
About the latest Iam analyst Jobs in Saudi Arabia !
Network Access Control Engineer
Posted 2 days ago
Job Viewed
Job Description
Job Description
Job Description:
The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization’s network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.
Key Responsibilities & Duties- Access Control & VPNs: Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments.
- Design and Implementation: Develop and implement Cisco ISE solutions, including Authentication, Authorization, and Accounting (AAA) policies, configuring policy sets, network access policies, and integrating ISE with other systems like Active Directory, LDAP, and Certificate Authorities.
- Troubleshooting and Support: Serve as a subject matter expert for all Cisco ISE-related issues. This includes advanced troubleshooting of authentication failures, network access problems, and endpoint misclassifications and analyze logs and packet captures to identify root causes and provide solutions.
- Policy Management: Create and enforce detailed network access policies (e.g., 802.1X, MAC Authentication Bypass, Guest and BYOD policies) to ensure a secure network posture. This also involves defining and managing endpoint profiling and posture assessment rules.
- System Maintenance and Optimization: Regularly monitor the performance of the ISE infrastructure, applying patches and software upgrades as needed along with capacity planning and tuning to ensure the system is scalable and reliable.
- Integration and Automation: Integrate Cisco ISE with other security solutions such as firewalls and Security Information and Event Management (SIEM) systems to provide a comprehensive security overview.
- Compliance & Best Practices: Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits.
- Typically, 3+ years of relevant work experience in industry, with a minimum of 2 years in a similar role.
- Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS).
- Proficiency in AAA methodologies and protocols like RADIUS and TACACS+ is mandatory.
- Experience with network access control (NAC) solutions and technologies such as 802.1X, MAB, and device profiling.
- Familiarity with log analysis, SIEM tools, and incident handling procedures.
- Basic scripting or automation skills (Python, Bash) are a plus.
- Strong analytical and problem-solving abilities.
- Clear communication skills, particularly when interacting with cross-functional teams.
- Education & Certifications: Bachelor’s Degree in Network Engineering, Computer Engineering, or a related field.
- Preferred certifications: Cisco CCNA (required), CCNP (preferred).
- SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus.
- Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways are a plus.
- On-call responsibilities for after-hours security events may be required.
- Occasional work with external vendors, audits, or compliance teams.
- Participation in periodic vulnerability assessments and penetration test reviews.
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment Fraud StatementRecruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor asks a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
#J-18808-LjbffrNetwork Access Control Engineer
Posted today
Job Viewed
Job Description
Identity and Access Management Engineer
Posted 4 days ago
Job Viewed
Job Description
Overview
The IAM Engineer is responsible for designing, implementing, and managing the organization’s identity and access management solutions. The role requires deep expertise in ISVA (Identity Services and Verification Automation) and CyberArk for privileged access management, ensuring secure, compliant, and efficient access to systems and applications across the enterprise. The engineer will collaborate with IT, Security, and Compliance teams to enforce identity governance, manage privileged accounts, and implement security best practices for access control.
Key Responsibilities- Identity and Access Management Administration
- Administer and maintain ISVA solutions for identity verification, user provisioning/deprovisioning, and access request automation.
- Implement and manage CyberArk Privileged Access Management (PAM) solutions including Vault configuration, policies, safe management, and session monitoring.
- Ensure the secure onboarding and offboarding of users and privileged accounts.
- Monitor and enforce identity policies, access reviews, and compliance requirements.
- Privileged Access Management (CyberArk)
- Manage privileged accounts, credentials, and access workflows using CyberArk.
- Configure and maintain CyberArk components such as Vault, CPM (Central Policy Manager), PSM (Privileged Session Manager), and PVWA (Password Vault Web Access).
- Implement least-privilege principles, access approval workflows, and automated credential rotation.
- Monitor privileged access sessions and generate audit reports for compliance and governance purposes.
- Identity Governance & Compliance
- Perform periodic access reviews and audits to ensure compliance with internal policies and external regulations (ISO 27001, SOX, GDPR).
- Maintain documentation of access policies, workflows, and IAM configurations.
- Collaborate with internal audit and compliance teams during assessments.
- Integration & Automation
- Integrate IAM solutions with enterprise systems (Active Directory, LDAP, HR systems, cloud platforms, SaaS applications).
- Automate provisioning/deprovisioning processes to reduce manual effort and mitigate risk.
- Support IAM-related automation for privileged account management, access requests, and approval workflows.
- Investigate and resolve IAM-related incidents, including login issues, access failures, and policy violations.
- Conduct root cause analysis for recurring access or security issues and implement preventative measures.
- Provide 24x7 support for critical IAM and PAM incidents when needed.
- Documentation & Reporting
- Maintain up-to-date IAM architecture diagrams, configuration guides, and operational SOPs.
- Generate reports for user access, privileged account usage, and compliance audits.
- Provide recommendations for improvements in identity and access controls.
- Experience: 6+ years in Identity and Access Management or Security Administration.
- Technical Skills:
- Strong experience with ISVA (Identity Services and Verification Automation) for identity lifecycle management.
- Hands-on experience with CyberArk PAM including Vault, CPM, PSM, PVWA, and policies.
- Strong understanding of Active Directory, LDAP, SSO/SAML/OAuth , and identity federation protocols.
- Familiarity with access certification, RBAC (Role-Based Access Control), and least-privilege principles.
- Knowledge of identity governance and compliance frameworks (ISO, SOX, GDPR).
- Experience in integrating IAM/PAM solutions with cloud and on-premises systems.
- Preferred Qualifications:
- Certifications: CyberArk Trustee, Defender, or Sentry ; Certified Identity and Access Manager (CIAM) .
- Experience with other IAM tools like SailPoint, Okta, Ping Identity , or Azure AD .
- Knowledge of scripting for automation (PowerShell, Python, etc.).
- Mid-Senior level
- Full-time
- Engineering and Information Technology
- Industries: Software Development