71 Iam Analyst jobs in Saudi Arabia

Senior Manager - Identity Access Management

Riyadh, Riyadh D360 Bank

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Manager - Identity Access Management

Trending

Job Description

The role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.

Responsibilities
  • Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
  • Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
  • Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
  • Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
  • Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
  • Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
  • Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
  • Conduct periodic access reviews, audits, and risk assessments.
  • Maintain IAM-related documentation, policies, standards, and procedures.
  • Perform any other duties assigned to by line manager related to the nature of the work
  • Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Qualifications

Preferred Qualifications

  • A tertiary level qualification from an internationally recognized institution
  • Certified Identity and Access Manager (CIAM)


Years & Nature of Experience

  • Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
  • A specialist individual contributor or a team lead who has managed and delivered projects
  • Has team or technical supervision skills
  • Demonstrated expertise and experience with complex technical activities
  • Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
  • Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
  • Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
  • Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Manager - Identity Access Management

Riyadh, Riyadh D360 Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Manager - Identity Access Management

Trending

Job Description

The role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.

Responsibilities
  • Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
  • Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
  • Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
  • Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
  • Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
  • Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
  • Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
  • Conduct periodic access reviews, audits, and risk assessments.
  • Maintain IAM-related documentation, policies, standards, and procedures.
  • Perform any other duties assigned to by line manager related to the nature of the work
  • Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Qualifications

Preferred Qualifications

  • A tertiary level qualification from an internationally recognized institution
  • Certified Identity and Access Manager (CIAM)


Years & Nature of Experience

  • Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
  • A specialist individual contributor or a team lead who has managed and delivered projects
  • Has team or technical supervision skills
  • Demonstrated expertise and experience with complex technical activities
  • Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
  • Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
  • Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
  • Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Identity Access Management Operations Consultant

SAR90000 - SAR120000 Y Smpl ID

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Summary :

We are a leading consultant and system integrator in EMEA, with a flexible work environment.

We value having good people on our team and we make sure to give the recognition deserved for each contribution. If this sounds like the kind of company you would like to work with, we would love to meet with you.

Responsibilities

  • You contribute to the design, build,and deployment of our new IAM solution.
  • You assess business requests for possible solutions, and you design and implement these solutions via changes or projects.
  • You work in a team that is responsible for the Development and Operations of the Identity and Access Management domain. Participate in operational activities like incident handling, preparation, and execution of changes.
  • You evaluate innovations, technologies, and best practices that will be of value for the continuous improvement of our IAM platform. Conduct proof of value initiatives to present business value.
  • You have a natural drive for continuous improvement and for automating repetitive tasks.
  • You are proactive in preventing incidents from occurring, resolving recurring problems, and implementing changes in a controlled and secure manner.
  • You coach less experienced colleagues and transfer IAM knowledge to other teams (e.g. Service Desk).
  • You ensure proper documentation of IAM processes, process flows, designs, and operational procedures.
  • You communicate, keep each other informed, provide each other feedback, and ask for help on time. Your involvement does not stop at the boundaries of your profession.
  • You are a team player, be part of an enthusiastic and motivated team, but you are also capable of gettingthings done independently.

Requirements:

  • Proven track record of 3 years + experience in a similar role, working in IT Security, Specifically IAM/PAM domain.
  • Sail Point Experience is a must.
  • BSc in Computer Science or equivalent
  • Experience with IGA Implementation
  • Experience in software development processes, source control,and issue-tracking systems.
  • Good knowledge/skills in Access Management/SSO/Federation systems
  • Experience with Active Directory-based Integrations.
  • knowledge of Web Access management processes, and technologies, with emphasis on federation expertise, web services, and SOA
  • knowledge and experience with and working with modern IAM concepts (identities, authentication, and authorization), systems, technologies, security standards, and protocols such as PAM, SAML/OAuth2, RBAC, and LDAP.
  • Knowledge about any Identity and Access management platform Ex: (IBM, Oracle, SailPoint, CA, RSA, ForgeRock, Okta, Ping Identity, Quest, Beyond Trust, and CyberArk).
  • Experience with and knowledge of Microsoft Active Directory (AD) and Azure AD.
  • Good understanding of REST APIs, JSON, and Power Shell.
  • Analytical, intellectual curious, autonomous, collaborative, and understands business value means.
  • Integrity, reliability, and discretion in handling confidential information.
  • Capable of building bridges between development, with our customers and our partners.
  • Excellent documentation skills (technical solutions, automation, and ticket registration);
  • Excellent written and verbal communication skills, including the ability to effectively translate and present technology solutions in business or management terms.
  • Workshop and facilitation skills(or interest in) would be a big advantage.
  • English language required.
  • Familiarity with web services, SQL, and networking.
  • Previous experience in requirements gathering design and solution building and the ability to replicate this in a commercial setting.
  • Pro-active attitude, hands-on, and getting things done.
  • Strong problem-solving and good skills in financial modeling ,using Excel.
  • Able to perform under pressure to hit tight deadlines and deliver results in a fast-paced environment, whilstmulti-tasking on various projects.
  • Customer-focused, innovative thinking, self-starter, flexible, highly organized, and strong attention to detail.
  • Excellent teamwork and interpersonal skills.
  • Flexible, eager,ambitious, and adaptable to change.
  • Excellent judgment, organizational and problem-solving skills.
  • A willingness to travel occasionally under normal circumstances.
This advertiser has chosen not to accept applicants from your region.

Identity Access Management Implementation & Adapter development specialist

Jeddah, Makkah SBM

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Location: Riyadh.

Job Type: Full Time

Education & Experience

Education: Bachelor’s degree Information Technology or Equivalent.

Experience Level: 7+ Year.

Job Description

Job Description :

  • Design and deploy Identity Management & Governance solutions.
  • Develop custom adapters for applications (for user lifecycle management) not having Out of the Box adapters.
  • Develop custom workflows, lifecycle rules for multi-level approval requirements for user provisioning.
  • Integrate applications with OOB adapters available with Identity Management solution.
  • Administration and maintenance of Identity Management and Governance Solution.
  • Writing scripts and using lifecycles feature of identity manager to enforce compliance, support new business requirements etc. which cannot be attained from regular workflows.
  • Design and deploy Directory server solutions, Database solutions required as repositories for Identity Management solutions.
  • Expertise on configuring HA for solutions at application and data layer levels.
  • Expertise on following products but not limited to IBM SIM, IBM SIGI, IBM SDI, IBM DB2, IBM SDS.
  • Good to have expertise on Other Identity management solutions from Oracle, One Identity, SailPoint etc.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Access Control Engineers

Jeddah, Makkah BT Advanced Operation and Maintenance

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Degree in electronics or electrical engineering. Technical and hands-on understanding of plant and HVAC control theory and proven capability in servicing and maintaining Access Control systems; commissioning skills would be ideal. Knowledge and experience with other controls i.e. GE Siemens, & Honeywell. Arabic - Fluent / Excellent; English - Good.

Driver and Vehicle
  • Own a Car: Any
  • Have Driving License: Any
Job Skills
  • Good-looking
  • Commitment to morality
  • Respect the orders of the Director
  • Movement anywhere in the Kingdom according to the demands of work
About The Company

Business type: Electrical Engineering - Electronics - Information Technology (IT) - Software Engineering - Telecommunications - Communication Engineering.

  • Data Center Engineer: BS degree in engineering computer science; 3 years experience in networking technologies; Active CCNA certification required; Knowledge of traditional voice and wireless technology; Knowledge of wireless LAN/WAN and experience in Red Hat linux and MySQL database.
  • Intrusion System Engineers: Must have B.SC degree with 2 to 3 years of experience in the related field (perimeter intrusion detection – buried cable/ fence cable alarm/ microwave).
  • Airport Systems (SITA): Bachelor's / college degree of engineering in information technology or equivalent with 3 years experience in the special Airport systems (SAS).
  • Access Control Engineers: Degree in electronics or electrical engineering; Technical and hands-on understanding of plant and HVAC control theory; proven capability in servicing and maintaining Access Control systems; commissioning skills would be ideal; Knowledge and experience with other controls i.e. GE Siemens, & Honeywell.
  • Site Manager: Must have B.S electronics or computer engineering degree with 3 to 5 years of experience in the related field; Experience with low current systems such as (CCTV, FAS… etc).
  • BMS Engineers: Must have B.SC degree with 3 to 5 years of experience in the related field.
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Network Access Control

SAR120000 - SAR180000 Y DXC Technology

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description
Job Purpose:

The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization's network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.

Key Responsibilities & Duties

  • Security Operations & Monitoring: Monitor firewalls, VPNs, intrusion prevention/detection systems, and other network security appliances for threats or anomalies. Respond to alerts and incidents based on threat intelligence and internal SOC escalations
  • Firewall Management: Perform firewall rule reviews, changes, and optimization under established policies. Work with vendors and Level 3 engineers for troubleshooting and rule impact analysis
  • Access Control & VPNs: Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments
  • Strong experience in Cisco ISE
  • Incident Response & Escalation: Participate in the response to security events and vulnerability findings. Document root cause analysis and corrective actions
  • Change Implementation & Documentation: Implement security-related configuration changes in coordination with change management processes. Maintain records of firewall policies, security incidents, and access controls
  • Compliance & Best Practices: Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits

Skills & Qualifications

  • Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways
  • Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS)
  • Familiarity with log analysis, SIEM tools, and incident handling procedures
  • Basic scripting or automation skills (Python, Bash) are a plus
  • Strong analytical and problem-solving abilities
  • Clear communication skills, particularly when interacting with cross-functional teams

Education & Certifications

  • Bachelor's Degree in Network Engineering, Computer Engineering, or a related field
  • Preferred certifications:
  • Cisco CCNA (required), CCNP (preferred)
  • SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus

Working Conditions

  • On-call responsibilities for after-hours security events may be required
  • Occasional work with external vendors, audits, or compliance teams
  • Participation in periodic vulnerability assessments and penetration test reviews

At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available
here
.

This advertiser has chosen not to accept applicants from your region.

Network Access Control Engineer

Riyadh, Riyadh DXC Technology Inc.

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

**Job Description:**# Job Purpose:The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization’s network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.# Key Responsibilities & Duties:**• Access Control & VPNs:** Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments.**•Design and Implementation**:Develop and implement Cisco ISE solutions, including Authentication, Authorization, and Accounting (AAA) policies, configuring policy sets, network access policies, and integrating ISE with other systems like Active Directory, LDAP, and Certificate Authorities.**•Troubleshooting and Support:**Serve as a subject matter expert for all Cisco ISE-related issues. This includes advanced troubleshooting of authentication failures, network access problems, and endpoint misclassifications and analyze logs and packet captures to identify root causes and provide solutions.**•Policy Management:** Create and enforce detailed network access policies (e.g., 802.1X, MAC Authentication Bypass, Guest and BYOD policies) to ensure a secure network posture. This also involves defining and managing endpoint profiling and posture assessment rules.**•System Maintenance and Optimization:**Regularly monitor the performance of the ISE infrastructure, applying patches and software upgrades as needed along with capacity planning and tuning to ensure the system is scalable and reliable.**•Integration and Automation:** Integrate Cisco ISE with other security solutions such as firewalls and Security Information and Event Management (SIEM) systems to provide a comprehensive security overview. **•Compliance & Best Practices:** Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits.# Skills & Qualifications:• Typically, 3+ years of relevant work experience in industry, with a minimum of 2 year in a similar role • Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS).• Proficiency in AAA methodologies and protocols like **RADIUS and TACACS+** is mandatory• Experience with network access control (NAC) solutions and technologies such as 802.1X, MAB, and device profiling. • Familiarity with log analysis, SIEM tools, and incident handling procedures. • Basic scripting or automation skills (Python, Bash) are a plus. • Strong analytical and problem-solving abilities. • Clear communication skills, particularly when interacting with cross-functional teams.**Nice-to-Have Skills Description:**Education & Certifications: • Bachelor's Degree in Network Engineering, Computer Engineering, or a related field. • Preferred certifications: • Cisco CCNA (required), CCNP (preferred) • SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus• Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways are a plus Working Conditions: • On-call responsibilities for after-hours security events may be required. • Occasional work with external vendors, audits, or compliance teams. • Participation in periodic vulnerability assessments and penetration test reviews.At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.**Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available** ***.***DXC Technology (NYSE: DXC) helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Learn more about how we deliver excellence for our customers and colleagues at .
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Iam analyst Jobs in Saudi Arabia !

Network Access Control Engineer

DXC.technology

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Description:

The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization’s network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.

Key Responsibilities & Duties
  • Access Control & VPNs: Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments.
  • Design and Implementation: Develop and implement Cisco ISE solutions, including Authentication, Authorization, and Accounting (AAA) policies, configuring policy sets, network access policies, and integrating ISE with other systems like Active Directory, LDAP, and Certificate Authorities.
  • Troubleshooting and Support: Serve as a subject matter expert for all Cisco ISE-related issues. This includes advanced troubleshooting of authentication failures, network access problems, and endpoint misclassifications and analyze logs and packet captures to identify root causes and provide solutions.
  • Policy Management: Create and enforce detailed network access policies (e.g., 802.1X, MAC Authentication Bypass, Guest and BYOD policies) to ensure a secure network posture. This also involves defining and managing endpoint profiling and posture assessment rules.
  • System Maintenance and Optimization: Regularly monitor the performance of the ISE infrastructure, applying patches and software upgrades as needed along with capacity planning and tuning to ensure the system is scalable and reliable.
  • Integration and Automation: Integrate Cisco ISE with other security solutions such as firewalls and Security Information and Event Management (SIEM) systems to provide a comprehensive security overview.
  • Compliance & Best Practices: Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits.
Skills & Qualifications
  • Typically, 3+ years of relevant work experience in industry, with a minimum of 2 years in a similar role.
  • Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS).
  • Proficiency in AAA methodologies and protocols like RADIUS and TACACS+ is mandatory.
  • Experience with network access control (NAC) solutions and technologies such as 802.1X, MAB, and device profiling.
  • Familiarity with log analysis, SIEM tools, and incident handling procedures.
  • Basic scripting or automation skills (Python, Bash) are a plus.
  • Strong analytical and problem-solving abilities.
  • Clear communication skills, particularly when interacting with cross-functional teams.
Nice-to-Have Skills Description
  • Education & Certifications: Bachelor’s Degree in Network Engineering, Computer Engineering, or a related field.
  • Preferred certifications: Cisco CCNA (required), CCNP (preferred).
  • SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus.
  • Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways are a plus.
Working Conditions
  • On-call responsibilities for after-hours security events may be required.
  • Occasional work with external vendors, audits, or compliance teams.
  • Participation in periodic vulnerability assessments and penetration test reviews.
About DXC Technology

At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment Fraud Statement

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor asks a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Network Access Control Engineer

Riyadh, Riyadh DXC Technology Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**Job Description:**# Job Purpose:The Level 2 Network Security Engineer plays a key operational role in safeguarding the organization’s network infrastructure. This position focuses on the configuration, monitoring, and maintenance of network security systems such as firewalls, VPNs, IPS/IDS, and secure gateways. The engineer is responsible for identifying and responding to security incidents, managing rule changes, and supporting secure network design in coordination with Level 3 engineers and security architects.# Key Responsibilities & Duties:**• Access Control & VPNs:** Manage remote access and site-to-site VPNs, including configurations, troubleshooting, and usage auditing. Support NAC and segmentation policies within LAN/WAN environments.**•Design and Implementation**:Develop and implement Cisco ISE solutions, including Authentication, Authorization, and Accounting (AAA) policies, configuring policy sets, network access policies, and integrating ISE with other systems like Active Directory, LDAP, and Certificate Authorities.**•Troubleshooting and Support:**Serve as a subject matter expert for all Cisco ISE-related issues. This includes advanced troubleshooting of authentication failures, network access problems, and endpoint misclassifications and analyze logs and packet captures to identify root causes and provide solutions.**•Policy Management:** Create and enforce detailed network access policies (e.g., 802.1X, MAC Authentication Bypass, Guest and BYOD policies) to ensure a secure network posture. This also involves defining and managing endpoint profiling and posture assessment rules.**•System Maintenance and Optimization:**Regularly monitor the performance of the ISE infrastructure, applying patches and software upgrades as needed along with capacity planning and tuning to ensure the system is scalable and reliable.**•Integration and Automation:** Integrate Cisco ISE with other security solutions such as firewalls and Security Information and Event Management (SIEM) systems to provide a comprehensive security overview. **•Compliance & Best Practices:** Ensure alignment with internal security policies and regulatory standards (e.g., ISO 27001, SAMA, NCA). Assist in compliance reporting and periodic audits.# Skills & Qualifications:• Typically, 3+ years of relevant work experience in industry, with a minimum of 2 year in a similar role • Solid understanding of network protocols (TCP/IP, DNS, NAT, VPN, SSL/TLS).• Proficiency in AAA methodologies and protocols like **RADIUS and TACACS+** is mandatory• Experience with network access control (NAC) solutions and technologies such as 802.1X, MAB, and device profiling. • Familiarity with log analysis, SIEM tools, and incident handling procedures. • Basic scripting or automation skills (Python, Bash) are a plus. • Strong analytical and problem-solving abilities. • Clear communication skills, particularly when interacting with cross-functional teams.**Nice-to-Have Skills Description:**Education & Certifications: • Bachelor's Degree in Network Engineering, Computer Engineering, or a related field. • Preferred certifications: • Cisco CCNA (required), CCNP (preferred) • SD-WAN or Wireless certifications (Cisco, Aruba, etc.) are a plus• Experience with firewalls (Palo Alto, Fortinet, Cisco ASA/FTD), IPS/IDS, and secure web gateways are a plus Working Conditions: • On-call responsibilities for after-hours security events may be required. • Occasional work with external vendors, audits, or compliance teams. • Participation in periodic vulnerability assessments and penetration test reviews.At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.**Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available** ***.***DXC Technology (NYSE: DXC) helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Learn more about how we deliver excellence for our customers and colleagues at . #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Identity and Access Management Engineer

Riyadh, Riyadh ADFAR Tech

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

The IAM Engineer is responsible for designing, implementing, and managing the organization’s identity and access management solutions. The role requires deep expertise in ISVA (Identity Services and Verification Automation) and CyberArk for privileged access management, ensuring secure, compliant, and efficient access to systems and applications across the enterprise. The engineer will collaborate with IT, Security, and Compliance teams to enforce identity governance, manage privileged accounts, and implement security best practices for access control.

Key Responsibilities
  • Identity and Access Management Administration
    • Administer and maintain ISVA solutions for identity verification, user provisioning/deprovisioning, and access request automation.
    • Implement and manage CyberArk Privileged Access Management (PAM) solutions including Vault configuration, policies, safe management, and session monitoring.
    • Ensure the secure onboarding and offboarding of users and privileged accounts.
    • Monitor and enforce identity policies, access reviews, and compliance requirements.
  • Privileged Access Management (CyberArk)
    • Manage privileged accounts, credentials, and access workflows using CyberArk.
    • Configure and maintain CyberArk components such as Vault, CPM (Central Policy Manager), PSM (Privileged Session Manager), and PVWA (Password Vault Web Access).
    • Implement least-privilege principles, access approval workflows, and automated credential rotation.
    • Monitor privileged access sessions and generate audit reports for compliance and governance purposes.
  • Identity Governance & Compliance
    • Perform periodic access reviews and audits to ensure compliance with internal policies and external regulations (ISO 27001, SOX, GDPR).
    • Maintain documentation of access policies, workflows, and IAM configurations.
    • Collaborate with internal audit and compliance teams during assessments.
  • Integration & Automation
    • Integrate IAM solutions with enterprise systems (Active Directory, LDAP, HR systems, cloud platforms, SaaS applications).
    • Automate provisioning/deprovisioning processes to reduce manual effort and mitigate risk.
    • Support IAM-related automation for privileged account management, access requests, and approval workflows.
    • Investigate and resolve IAM-related incidents, including login issues, access failures, and policy violations.
    • Conduct root cause analysis for recurring access or security issues and implement preventative measures.
    • Provide 24x7 support for critical IAM and PAM incidents when needed.
  • Documentation & Reporting
    • Maintain up-to-date IAM architecture diagrams, configuration guides, and operational SOPs.
    • Generate reports for user access, privileged account usage, and compliance audits.
    • Provide recommendations for improvements in identity and access controls.
Required Qualifications & Skills
  • Experience: 6+ years in Identity and Access Management or Security Administration.
  • Technical Skills:
  • Strong experience with ISVA (Identity Services and Verification Automation) for identity lifecycle management.
  • Hands-on experience with CyberArk PAM including Vault, CPM, PSM, PVWA, and policies.
  • Strong understanding of Active Directory, LDAP, SSO/SAML/OAuth , and identity federation protocols.
  • Familiarity with access certification, RBAC (Role-Based Access Control), and least-privilege principles.
  • Knowledge of identity governance and compliance frameworks (ISO, SOX, GDPR).
  • Experience in integrating IAM/PAM solutions with cloud and on-premises systems.
  • Preferred Qualifications:
  • Certifications: CyberArk Trustee, Defender, or Sentry ; Certified Identity and Access Manager (CIAM) .
  • Experience with other IAM tools like SailPoint, Okta, Ping Identity , or Azure AD .
  • Knowledge of scripting for automation (PowerShell, Python, etc.).
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Engineering and Information Technology
  • Industries: Software Development

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Iam Analyst Jobs