12 Identity And Access Management jobs in Saudi Arabia
Identity & Access Management Specialist
Posted today
Job Viewed
Job Description
Job Brief:
- Deploy & support Active Directory, PAM and MFA infrastructure/solution across organizations.
- Provide guidance & support for IAM integration to different teams across organizations.
- Perform regular patching and hardening for IAM infrastructure.
- Apply DevSecOps principal to automate tasks across IAM infrastructure.
Create and maintain documentation for daily operation, such as Standard Operation Procedure and Knowledge Base articles.
Responsibilities:
Identity Management System
- Harden the Identity Management System ensuring its proper security level.
- Lead and drive the maturity of the security of the system, launch and lead necessary projects and initiatives across various IT teams, security operations, network, and infrastructure.
- Serve as a subject matter expert for identity management development and support team, application and offer teams, and professional services specialists.
- Guide team to build robust and secure application.
- Set the right guideline and enforce it during development.
- Review all security aspects of the integrations of the applications and offers with the Identity Management System.
- Handle all security incidents related to Identity Management System.
- Handle all aspects of the Identity Management System.
Qualification and Experience:
- Bachelor's degree in IT Information Systems, economics, accounting and law or any other relevant field (Master's degree is preferred)
- • Certification in Fraud Examiner, Cyber Security."
- 4 - 8 years' experience preferably in the field or equivalent. "
Senior Manager - Identity Access Management
Posted today
Job Viewed
Job Description
Trending
Job DescriptionThe role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.
Responsibilities- Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
- Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
- Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
- Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
- Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
- Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
- Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
- Conduct periodic access reviews, audits, and risk assessments.
- Maintain IAM-related documentation, policies, standards, and procedures.
- Perform any other duties assigned to by line manager related to the nature of the work
- Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Preferred Qualifications
- A tertiary level qualification from an internationally recognized institution
- Certified Identity and Access Manager (CIAM)
Years & Nature of Experience
- Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
- A specialist individual contributor or a team lead who has managed and delivered projects
- Has team or technical supervision skills
- Demonstrated expertise and experience with complex technical activities
- Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
- Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
- Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
- Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
- Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
Identity & Access Management (IAM) / Privileged Access Management (PAM) Engineer
Posted today
Job Viewed
Job Description
CCDS is looking for a dedicated Saudi Identity & Access Management (IAM) / Privileged Access Management (PAM) Specialist to join our innovative cybersecurity team. In this critical role, you will be responsible for designing, implementing, and managing IAM and PAM solutions to secure client environments. Your expertise will ensure that only authorized users have access to sensitive systems and data, thereby safeguarding our clients' assets and meeting compliance requirements. You will work collaboratively with various teams to integrate IAM and PAM practices into existing security frameworks.
Key Responsibilities
Identity & Access Management (IAM):
Administer and maintain IAM solutions across the organization.
- Manage user identity lifecycle including provisioning, de-provisioning, and role-based access controls (RBAC).
- Develop and maintain identity policies, workflows, and approval processes.
- Troubleshoot IAM-related access and authentication issues.
Conduct periodic user access reviews and audits.
Privileged Access Management (PAM):
Maintain PAM solutions in coordination with third-party providers.
- Manage privileged accounts, credentials, and session recording.
- Implement just-in-time (JIT) privileged access and password vaulting.
- Monitor privileged session activities and generate compliance reports.
Ensure enforcement of least-privilege principles across systems and applications.
Security & Compliance:
Enforce compliance with ISO 27001, NCA, or other relevant security frameworks.
- Participate in security incident investigations related to identity and access breaches.
- Collaborate with IT, SOC, and audit teams to enhance security posture.
- Document configurations, standards, and procedures
Requirements
Requirements:
- Saudi Nationality is a requirement
- Bachelor's degree in Information Technology, Cybersecurity, or a related field
- Minimum of 4years of experience in IAM, PAM, or cybersecurity roles
- Strong understanding of IAM/PAM concepts, frameworks, and technologies
- Experience with identity governance, authentication mechanisms, and access control models
- Proficiency in IAM and PAM tools, such as privileged access management solutions or identity management platforms
- Relevant certifications (e.g., CISSP, CISM, or IAM/PAM-specific certifications) are desirable
- Strong analytical, problem-solving, and communication skills
- Ability to work collaboratively in a team-oriented environment and manage multiple tasks efficiently
Benefits
- Paid Time Off
- Private Family Medical Insurance
- Training & Development plan
- 30 calendar day annual vacation
Identity & Access Management (IAM) / Privileged Access Management (PAM) Engineer
Posted today
Job Viewed
Job Description
CCDS is looking for a dedicated Saudi Identity & Access Management (IAM) / Privileged Access Management (PAM) Specialist to join our innovative cybersecurity team. In this critical role, you will be responsible for designing, implementing, and managing IAM and PAM solutions to secure client environments. Your expertise will ensure that only authorized users have access to sensitive systems and data, thereby safeguarding our clients' assets and meeting compliance requirements. You will work collaboratively with various teams to integrate IAM and PAM practices into existing security frameworks.
Key ResponsibilitiesIdentity & Access Management (IAM):
Administer and maintain IAM solutions across the organization.
- Manage user identity lifecycle including provisioning, de-provisioning, and role-based access controls (RBAC).
- Develop and maintain identity policies, workflows, and approval processes.
- Troubleshoot IAM-related access and authentication issues.
Conduct periodic user access reviews and audits.
Privileged Access Management (PAM):
Maintain PAM solutions in coordination with third-party providers.
- Manage privileged accounts, credentials, and session recording.
- Implement just-in-time (JIT) privileged access and password vaulting.
- Monitor privileged session activities and generate compliance reports.
Ensure enforcement of least-privilege principles across systems and applications.
Security & Compliance:
Enforce compliance with ISO 27001, NCA, or other relevant security frameworks.
- Participate in security incident investigations related to identity and access breaches.
- Collaborate with IT, SOC, and audit teams to enhance security posture.
- Document configurations, standards, and procedures.
Requirements:
- Saudi Nationality is a requirement.
- Bachelor's degree in Information Technology, Cybersecurity, or a related field.
- Minimum of 4years of experience in IAM, PAM, or cybersecurity roles.
- Strong understanding of IAM/PAM concepts, frameworks, and technologies.
- Experience with identity governance, authentication mechanisms, and access control models.
- Proficiency in IAM and PAM tools, such as privileged access management solutions or identity management platforms.
- Relevant certifications (e.g., CISSP, CISM, or IAM/PAM-specific certifications) are desirable.
- Strong analytical, problem-solving, and communication skills.
- Ability to work collaboratively in a team-oriented environment and manage multiple tasks efficiently.
- Paid Time Off
- Private Family Medical Insurance
- Training & Development plan
- 30 calendar day annual vacation
Identity and Access Management/Oracle
Posted today
Job Viewed
Job Description
Valleysoft | Center of Excellence is a leading IT services provider dedicated to helping organizations achieve their technology and business objectives. Based in Riyadh, we offer services that encompass enterprise application development, process management, and IT consulting, working alongside global partners like IBM.
We are currently seeking a knowledgeable and detail-oriented Identity and Access Management (IAM) Consultant with expertise in Oracle technologies. In this role, you will be responsible for designing and implementing IAM solutions to manage user identities, access rights, and security policies effectively. Your role will be crucial in ensuring that our clients have secure and efficient systems in place to protect sensitive information while allowing streamlined access for authorized users.
The ideal candidate will have a strong background in IAM practices, particularly with Oracle Identity Management solutions, as well as excellent problem-solving and communication skills. If you are passionate about enhancing security and access management in IT environments, we would love to have you on our team
Responsibilities- Design and implement Identity and Access Management solutions using Oracle technologies.
- Work with clients to assess their IAM needs and develop tailored security strategies.
- Configure and maintain Oracle Identity Management components, including user provisioning, access control, and identity governance.
- Integrate IAM systems with various applications to ensure seamless authentication and authorization processes.
- Conduct security assessments to identify potential vulnerabilities and recommend improvements.
- Develop and implement IAM policies and procedures aligned with industry best practices.
- Provide training and support to clients and end-users on IAM solutions and security protocols.
- Stay updated on the latest trends and technologies in identity and access management.
- Collaborate with IT security and compliance teams to ensure regulatory requirements are met.
- Bachelor's or Master's degree in Computer Science, Information Technology, or a related field.
- 5+ years of experience in Identity and Access Management, with a focus on Oracle solutions.
- Strong understanding of IAM principles, technologies, and best practices.
- Proven experience with Oracle Identity Management (OIM) and related products.
- Knowledge of authentication and authorization protocols such as SAML, OAuth, and OpenID Connect.
- Excellent analytical skills with the ability to troubleshoot and resolve complex issues.
- Strong communication and interpersonal skills, able to collaborate effectively with clients and technical teams.
- Relevant IAM certifications, such as Oracle Certified Professional or similar, are highly desirable.
- Experience in compliance frameworks (e.g., GDPR, HIPAA) is a plus.
Skills:
- Ability to design and implement IAM solutions effectively.
- Strong understanding of Oracle technologies and their application in IAM.
- Proficient in scripting and automation tools to improve IAM processes.
- Ability to communicate technical concepts to non-technical stakeholders.
Identity and Access Management Engineer
Posted today
Job Viewed
Job Description
Identity and Access Management
ISVA – CyberArk
Position Summary:
The IAM Engineer is responsible for designing, implementing, and managing the organization's identity and access management solutions. The role requires deep expertise in
ISVA (Identity Services and Verification Automation)
and
CyberArk
for privileged access management, ensuring secure, compliant, and efficient access to systems and applications across the enterprise.
The engineer will collaborate with IT, Security, and Compliance teams to enforce identity governance, manage privileged accounts, and implement security best practices for access control.
Key Responsibilities:
1. Identity and Access Management Administration:
- Administer and maintain
ISVA
solutions for identity verification, user provisioning/deprovisioning, and access request automation. - Implement and manage
CyberArk
Privileged Access Management (PAM) solutions including Vault configuration, policies, safe management, and session monitoring. - Ensure the secure onboarding and offboarding of users and privileged accounts.
- Monitor and enforce identity policies, access reviews, and compliance requirements.
2. Privileged Access Management (CyberArk):
- Manage privileged accounts, credentials, and access workflows using CyberArk.
- Configure and maintain CyberArk components such as Vault, CPM (Central Policy Manager), PSM (Privileged Session Manager), and PVWA (Password Vault Web Access).
- Implement least-privilege principles, access approval workflows, and automated credential rotation.
- Monitor privileged access sessions and generate audit reports for compliance and governance purposes.
3. Identity Governance & Compliance:
- Perform periodic access reviews and audits to ensure compliance with internal policies and external regulations (ISO 27001, SOX, GDPR).
- Maintain documentation of access policies, workflows, and IAM configurations.
- Collaborate with internal audit and compliance teams during assessments.
4. Integration & Automation:
- Integrate IAM solutions with enterprise systems (Active Directory, LDAP, HR systems, cloud platforms, SaaS applications).
- Automate provisioning/deprovisioning processes to reduce manual effort and mitigate risk.
- Support IAM-related automation for privileged account management, access requests, and approval workflows.
5. Incident Management & Troubleshooting:
- Investigate and resolve IAM-related incidents, including login issues, access failures, and policy violations.
- Conduct root cause analysis for recurring access or security issues and implement preventative measures.
- Provide 24x7 support for critical IAM and PAM incidents when needed.
6. Documentation & Reporting:
- Maintain up-to-date IAM architecture diagrams, configuration guides, and operational SOPs.
- Generate reports for user access, privileged account usage, and compliance audits.
- Provide recommendations for improvements in identity and access controls.
Required Qualifications & Skills:
- Experience:
6+ years in Identity and Access Management or Security Administration. - Technical Skills:
- Strong experience with
ISVA
(Identity Services and Verification Automation) for identity lifecycle management. - Hands-on experience with
CyberArk PAM
including Vault, CPM, PSM, PVWA, and policies. - Strong understanding of
Active Directory, LDAP, SSO/SAML/OAuth
, and identity federation protocols. - Familiarity with access certification, RBAC (Role-Based Access Control), and least-privilege principles.
- Knowledge of identity governance and compliance frameworks (ISO, SOX, GDPR).
- Experience in integrating IAM/PAM solutions with cloud and on-premises systems.
- Preferred Qualifications:
- Certifications:
CyberArk Trustee, Defender, or Sentry
;
Certified Identity and Access Manager (CIAM)
. - Experience with other IAM tools like
SailPoint, Okta, Ping Identity, or Azure AD
. - Knowledge of scripting for automation (PowerShell, Python, etc.).
Identity and Access Management Senior Officer
Posted today
Job Viewed
Job Description
The
Identity and Access Management (IAM) Senior Officer
at J-B is responsible for executing and managing access provisioning tasks to ensure secure and efficient access to J-B's systems, applications, and data.
This includes provisioning business privileges, privileged access, and remote work access in compliance with J-B's cybersecurity policies and regulatory requirements.
The role focuses on the operational provisioning of access and the support of related tools and systems, without covering identity governance or access review tasks. The IAM Senior Officer will also serve as a subject matter expert, mentoring junior team members.
1. Identity Provisioning for Business Privileges
• Execute the provisioning of business privileges for J-B employees, contractors, and third-party users to ensure secure and appropriate access to perform their job roles.
• Process access requests for onboarding, role changes, and terminations in a timely and accurate manner, coordinating with HR and business units within J-B.
• Ensure all access provisioning requests align with predefined access roles and profiles and comply with J-B's access control policies.
• Handle escalations for non-standard access requests, ensuring approval processes are followed.
• Document and maintain accurate records of all provisioning activities within J-B.
2. Privileged Access Provisioning
• Perform the provisioning of privileged access accounts for administrators, developers, and other J-B users requiring elevated permissions.
• Ensure privileged accounts are provisioned securely and promptly deactivated when no longer required.
• Troubleshoot and resolve issues related to privileged access provisioning within J-B.
3. Identity Provisioning for Remote Work
• Provision secure access for J-B remote workers, including employees and contractors, to the bank's systems and applications.
• Grant access to remote work tools, such as VPNs, virtual desktops, and cloud-based applications, ensuring compliance with J-B's security policies.
• Ensure remote access provisioning includes robust security measures, such as multi-factor authentication (MFA) and encryption.
• Support onboarding of J-B remote workers by provisioning appropriate access and resolving access-related issues.
4. Incident Handling and Troubleshooting
• Respond to and resolve incidents related to access provisioning, privileged access, cryptographic key management, and HSM operations in J-B systems.
• Escalate complex incidents to senior management or technical teams as needed, ensuring timely resolution.
• Monitor provisioning tasks and related J-B systems for potential security risks or vulnerabilities and recommend corrective actions.
5. Collaboration and Communication
• Collaborate with J-B business units, IT teams, and HR to process access requests and resolve provisioning issues.
• Act as a point of contact for provisioning-related inquiries, providing guidance to J-B stakeholders on access management processes.
Be The First To Know
About the latest Identity and access management Jobs in Saudi Arabia !
Senior Access Management
Posted today
Job Viewed
Job Description
About the role :
The Senior Access Management (IAM & PAM) professional is responsible for implementing, managing and optimizing identity and access management solutions, with a specific focus on One Identity solution for IAM and Delinea solution for PAM. This role ensures secure access to systems and data while maintaining compliance with security policies and industry best practices. The incumbent will play a critical role in safeguarding enterprise resources from unauthorized access and security threats.
Responsibilities :
- Identity and Access Management (IAM):
Deploy, configure, and manage One Identity IAM solutions to ensure secure authentication, authorization, and user lifecycle management - Privileged Access Management (PAM):
Implement and maintain Delinea PAM solutions to enforce least privilege access and secure privileged credentials. Monitor and manage firewall performance to ensure security and efficiency while maintaining access control policies. - Access Governance:
Develop and enforce access policies, role-based access controls (RBAC), and segregation of duties (SoD) to minimize security risks. - Authentication & Authorization:
Ensure strong authentication mechanisms (e.g., Multi-Factor Authentication, Single Sign-On) are effectively applied across enterprise systems. - Compliance & Audit:
Maintain compliance with security frameworks (e.g., NCA, NIST, ISO by implementing robust access controls and preparing for internal and external audits. - Threat Monitoring & Incident Response:
Work with Security Operations teams to detect and respond to IAM/PAM-related security incidents, analyzing and mitigating threats in real time. - Process Automation
: Leverage automation tools to streamline user provisioning, deprovisioning, and access request workflows, improving efficiency and security. - Collaboration & Training
: Partner with IT, Security, and Business Units to align IAM/PAM strategies with organizational objectives and provide guidance on best practices. - Documentation & Reporting
: Maintain detailed documentation of IAM/PAM configurations, policies, and procedures, and generate reports for compliance and security assessments.
Qualifications:
- Education:
Bachelor's degree in Cybersecurity, Information Technology, or a related field; advanced degree preferred. - Experience
: 8+ years of experience in Identity and Access Management, Privileged Access Management, or a related security domain. - Technical Proficiency:
Expertise in IAM/PAM solutions such as Delinea, One Identity, Microsoft Entra ID, or similar platforms. - Security Framework
s: Solid understanding of regulatory and compliance standards such as NCA, NIST and ISO 27001. - Problem-Solving Skills:
Strong analytical and troubleshooting abilities to resolve complex access-related issues. - Collaboration & Communication:
Ability to work effectively in a cross-functional environment and communicate technical concepts to non-technical stakeholders. - Certifications (Preferred):
CISSP, CISM, or vendor-specific IAM/PAM certifications.
Privileged Access Management
Posted today
Job Viewed
Job Description
About the Company
We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products. HCLTech is a globally recognized leader in the Tech and IT industry, but we've never forgotten the startup mindset that got us here. We've always approached our work with an idea-first attitude because every one of our accomplishments —no matter how big or small —can be traced back to an idea's single spark. It's that spark —that inner drive —that sets our people apart from our competitors. It enables us not just to pull off game-changing feat after game-changing feat but to better our world in the process. We want you to find your spark. Because that's what drives you to be better, be more and ultimately, be more fulfilled.
About the Role
We are seeking an experienced Privileged Access Management (PAM) Specialist with strong infrastructure support capabilities. The ideal candidate will have 8-10 years of experience in IT security with specific expertise in privileged access management solutions, infrastructure environments, and L3 support capabilities.
Responsibilities
- Design, implement, and maintain enterprise wide Beyond PAM solutions ensuring secure management of privileged credentials and access
- Provide L3 technical support for complex PAM-related incidents and problems within the infrastructure environment
- Develop and enforce PAM policies, procedures, and standards aligned with industry best practices and compliance requirements
- Manage the full lifecycle of privileged accounts, including provisioning, certification, and deprovisioning
- Implement and optimize PAM tools for session recording, credential vaulting, and automated password rotation
- Operation experience of Thales MFA and token management
- MFA Integration experience with ADFS for token management
- Beyond Trust password vault for saving complex password.
- Conduct regular security assessments and audits of privileged access controls
- Perform root cause analysis for security incidents related to privileged access
- Create and maintain documentation for PAM architecture, configurations, and operational procedures
- Collaborate with cross-functional teams to integrate PAM solutions with existing infrastructure and security tools
- Provide mentorship to junior team members on PAM best practices and troubleshooting techniques
- Work for security management in the domain and drive for compliance activities
Qualifications
- 8-10 years of experience in IT security with focus on privileged access management
- Proven experience with implementing and supporting enterprise Beyond Trust PAM solutions (Other PAM solution experience will be added knowledge)
- Strong knowledge of infrastructure components including servers, databases, network devices, and cloud environments
- Advanced troubleshooting and problem-solving skills for complex L3 support issues
- Experience with identity management concepts and technologies
- Thorough understanding of security frameworks (NIST, ISO 27001, CIS)
- Good to have Strong scripting skills (PowerShell, Python, Bash, or similar)
- Experience with SIEM tools and security monitoring solutions
- Knowledge of compliance requirements related to privileged access (SOX, PCI DSS, HIPAA, etc.)
- Excellent communication skills with ability to translate technical concepts to non-technical stakeholders
Required Skills
- Relevant certifications such as CISSP, CISM, Beyond trust
- Experience with DevSecOps practices and tools
- Familiarity with cloud security and PAM solutions for cloud environments (AWS, Azure, GCP)
- Experience with implementing Just-In-Time (JIT) and Zero Trust access models
- Knowledge of threat detection and incident response processes
- Experience with automation and orchestration tools for security operations
Preferred Skills
- PAM Platforms: CyberArk, BeyondTrust, HashiCorp Vault, Thycotic Secret Server
- Operating Systems: Windows Server, Linux (various distributions)
- Directory Services: Active Directory, LDAP
- Authentication: SAML, OAuth, MFA, PKI
- Networking: TCP/IP, firewalls, routing, VPN technologies
- Scripting: PowerShell, Python, Bash
- SIEM Tools: Splunk, QRadar, ArcSight or similar
- Infrastructure as Code: Terraform, Ansible
Benefits
- A supportive, diverse, and global team with a brilliant culture.
- Competitive compensation and benefits that includes up to 20 days' vacation per year, various insurances like Term life and Business Travel insurance. These are apart from the statutory benefits applicable in the country. Employee benefits are regulated by an internal policy that contains full details regarding the entitlement and conditions for the benefits as per the law of the land.
- Great opportunities to make the role your own, upskill yourself and get involved with exciting projects.
- Total Wellbeing is our focus. Alongside your professional excellence, you join the likeminded colleagues to create a larger impact within the company and society at large in your chosen area of passion - CSR Council, Diversity Council, Women Connect, Sparks – Engagement Champion to name a few.
- To know more about us visit –
Identity Management Consultant
Posted today
Job Viewed
Job Description
We are hiring for the below requirement for one of our major clients in Jeddah
Digital Identity
Job Details
:
Role: Digital Identity
Employment Type: 1 year contract, outsourced
Work Location: Jeddah, Kingdom of Saudi Arabia
Notice Period: Immediate joiners to a maximum of 15-30 days of notice
Required Experience:
- Collaborate with clients to gather and analyze requirements for Identity Governance and Administration solutions.
- Building polices, processes and frameworks related to identity and Access management (e.g. identity lifecycle management, requesting access, auditing permissions).
- Conduct assessments of clients' existing IAM processes, systems, and controls to identify areas for improvement.
- Working with clients to develop Identity and Access Management strategies, architectures, and implementation plans.
- Defining technical and business requirements for identity and access management solutions.
- Advises on the implementation of new IAM features that are tailored to the specific environment.
- Establishes the link between the IAM team and the business stakeholders, capturing their evolving requirements and communicating about the IAM program roadmap.
- Focuses on the efficient deployment, roll-out, and transition of new features and versions of the IAM platform.
- Configure and customize IGA and Access Management platforms to align with clients' business processes and security policies.
- Develop and implement access control policies, roles, and entitlements to ensure appropriate levels of access across systems and applications.
- Provide guidance and expertise on best practices for identity lifecycle management, access certification, role-based access control, and compliance reporting.
- Collaborate with cross-functional teams, including security, IT, and compliance, to integrate IGA solutions into clients' environments.
- Provide training and support to clients' teams to facilitate adoption and ongoing management of IGA solutions.
- Interacts with the vendor and service providers to address contractual agreements related to the IAM platform.
- Proven track record with 6+ years of experience in IT services and information security.
- Minimum of 4 years of experience working on identity and access management.
- Familiarity with identity and Access management systems (Microsoft AD, Azure AD, Intra ID, ADFS, MDM Intune, Office 365)
- Familiarity with RBAC and Role Engineering.
- Prior consulting experience and Excellent customer-facing skills are highly desirable.
If interested, please apply here with your latest resume and we shall get in touch with you.
Thanks & regards,
AIQU