240 Identity And Access Management jobs in Saudi Arabia

Senior Manager - Identity Access Management

Riyadh, Riyadh D360 Bank

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Manager - Identity Access Management

Trending

Job Description

The role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.

Responsibilities
  • Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
  • Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
  • Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
  • Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
  • Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
  • Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
  • Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
  • Conduct periodic access reviews, audits, and risk assessments.
  • Maintain IAM-related documentation, policies, standards, and procedures.
  • Perform any other duties assigned to by line manager related to the nature of the work
  • Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Qualifications

Preferred Qualifications

  • A tertiary level qualification from an internationally recognized institution
  • Certified Identity and Access Manager (CIAM)


Years & Nature of Experience

  • Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
  • A specialist individual contributor or a team lead who has managed and delivered projects
  • Has team or technical supervision skills
  • Demonstrated expertise and experience with complex technical activities
  • Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
  • Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
  • Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
  • Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Manager - Identity Access Management

Riyadh, Riyadh D360 Bank

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Manager - Identity Access Management

Trending

Job Description

The role is responsible for leading the design, implementation, and governance of the organization’s IAM program. This includes defining access policies, managing identity lifecycles, overseeing privileged access controls, and ensuring compliance with regulatory and security frameworks. The role ensures secure and efficient access to systems and data across the enterprise while minimizing risks.

Responsibilities
  • Develop and lead the enterprise-wide IAM strategy in alignment with InfoSec and IT strategies.
  • Developing the architecture, design and standards of Identity Governance infrastructures including Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-on and Provisioning systems.
  • Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established Policy, Standards and procedures.
  • Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by SLAs.
  • Well experienced with the following processes: New Hire On-Boarding, Employee Off-Boarding, Department Transfers, Access Remediation, and Privileged Access.
  • Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues.
  • Assist with unique/complex security access requests including internal and external audit and disaster recovery testing.
  • Conduct periodic access reviews, audits, and risk assessments.
  • Maintain IAM-related documentation, policies, standards, and procedures.
  • Perform any other duties assigned to by line manager related to the nature of the work
  • Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence and vigilance, within departmental/unit activities and operations
Qualifications

Preferred Qualifications

  • A tertiary level qualification from an internationally recognized institution
  • Certified Identity and Access Manager (CIAM)


Years & Nature of Experience

  • Recommended 5 to 7 years of equivalent experience where required competencies and experience has been demonstrated in user provisioning and de-provisioning.
  • A specialist individual contributor or a team lead who has managed and delivered projects
  • Has team or technical supervision skills
  • Demonstrated expertise and experience with complex technical activities
  • Has worked with more senior staff and dealt with complex issues, larger clients, accounts, projects, or internal relationships.
  • Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
  • Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service.
  • Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM)
  • Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth
#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Identity Access Management Operations Consultant

SAR90000 - SAR120000 Y Smpl ID

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Summary :

We are a leading consultant and system integrator in EMEA, with a flexible work environment.

We value having good people on our team and we make sure to give the recognition deserved for each contribution. If this sounds like the kind of company you would like to work with, we would love to meet with you.

Responsibilities

  • You contribute to the design, build,and deployment of our new IAM solution.
  • You assess business requests for possible solutions, and you design and implement these solutions via changes or projects.
  • You work in a team that is responsible for the Development and Operations of the Identity and Access Management domain. Participate in operational activities like incident handling, preparation, and execution of changes.
  • You evaluate innovations, technologies, and best practices that will be of value for the continuous improvement of our IAM platform. Conduct proof of value initiatives to present business value.
  • You have a natural drive for continuous improvement and for automating repetitive tasks.
  • You are proactive in preventing incidents from occurring, resolving recurring problems, and implementing changes in a controlled and secure manner.
  • You coach less experienced colleagues and transfer IAM knowledge to other teams (e.g. Service Desk).
  • You ensure proper documentation of IAM processes, process flows, designs, and operational procedures.
  • You communicate, keep each other informed, provide each other feedback, and ask for help on time. Your involvement does not stop at the boundaries of your profession.
  • You are a team player, be part of an enthusiastic and motivated team, but you are also capable of gettingthings done independently.

Requirements:

  • Proven track record of 3 years + experience in a similar role, working in IT Security, Specifically IAM/PAM domain.
  • Sail Point Experience is a must.
  • BSc in Computer Science or equivalent
  • Experience with IGA Implementation
  • Experience in software development processes, source control,and issue-tracking systems.
  • Good knowledge/skills in Access Management/SSO/Federation systems
  • Experience with Active Directory-based Integrations.
  • knowledge of Web Access management processes, and technologies, with emphasis on federation expertise, web services, and SOA
  • knowledge and experience with and working with modern IAM concepts (identities, authentication, and authorization), systems, technologies, security standards, and protocols such as PAM, SAML/OAuth2, RBAC, and LDAP.
  • Knowledge about any Identity and Access management platform Ex: (IBM, Oracle, SailPoint, CA, RSA, ForgeRock, Okta, Ping Identity, Quest, Beyond Trust, and CyberArk).
  • Experience with and knowledge of Microsoft Active Directory (AD) and Azure AD.
  • Good understanding of REST APIs, JSON, and Power Shell.
  • Analytical, intellectual curious, autonomous, collaborative, and understands business value means.
  • Integrity, reliability, and discretion in handling confidential information.
  • Capable of building bridges between development, with our customers and our partners.
  • Excellent documentation skills (technical solutions, automation, and ticket registration);
  • Excellent written and verbal communication skills, including the ability to effectively translate and present technology solutions in business or management terms.
  • Workshop and facilitation skills(or interest in) would be a big advantage.
  • English language required.
  • Familiarity with web services, SQL, and networking.
  • Previous experience in requirements gathering design and solution building and the ability to replicate this in a commercial setting.
  • Pro-active attitude, hands-on, and getting things done.
  • Strong problem-solving and good skills in financial modeling ,using Excel.
  • Able to perform under pressure to hit tight deadlines and deliver results in a fast-paced environment, whilstmulti-tasking on various projects.
  • Customer-focused, innovative thinking, self-starter, flexible, highly organized, and strong attention to detail.
  • Excellent teamwork and interpersonal skills.
  • Flexible, eager,ambitious, and adaptable to change.
  • Excellent judgment, organizational and problem-solving skills.
  • A willingness to travel occasionally under normal circumstances.
This advertiser has chosen not to accept applicants from your region.

Identity Access Management Implementation & Adapter development specialist

Jeddah, Makkah SBM

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

Location: Riyadh.

Job Type: Full Time

Education & Experience

Education: Bachelor’s degree Information Technology or Equivalent.

Experience Level: 7+ Year.

Job Description

Job Description :

  • Design and deploy Identity Management & Governance solutions.
  • Develop custom adapters for applications (for user lifecycle management) not having Out of the Box adapters.
  • Develop custom workflows, lifecycle rules for multi-level approval requirements for user provisioning.
  • Integrate applications with OOB adapters available with Identity Management solution.
  • Administration and maintenance of Identity Management and Governance Solution.
  • Writing scripts and using lifecycles feature of identity manager to enforce compliance, support new business requirements etc. which cannot be attained from regular workflows.
  • Design and deploy Directory server solutions, Database solutions required as repositories for Identity Management solutions.
  • Expertise on configuring HA for solutions at application and data layer levels.
  • Expertise on following products but not limited to IBM SIM, IBM SIGI, IBM SDI, IBM DB2, IBM SDS.
  • Good to have expertise on Other Identity management solutions from Oracle, One Identity, SailPoint etc.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Identity and Access Management Engineer

Riyadh, Riyadh ADFAR Tech

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

The IAM Engineer is responsible for designing, implementing, and managing the organization’s identity and access management solutions. The role requires deep expertise in ISVA (Identity Services and Verification Automation) and CyberArk for privileged access management, ensuring secure, compliant, and efficient access to systems and applications across the enterprise. The engineer will collaborate with IT, Security, and Compliance teams to enforce identity governance, manage privileged accounts, and implement security best practices for access control.

Key Responsibilities
  • Identity and Access Management Administration
    • Administer and maintain ISVA solutions for identity verification, user provisioning/deprovisioning, and access request automation.
    • Implement and manage CyberArk Privileged Access Management (PAM) solutions including Vault configuration, policies, safe management, and session monitoring.
    • Ensure the secure onboarding and offboarding of users and privileged accounts.
    • Monitor and enforce identity policies, access reviews, and compliance requirements.
  • Privileged Access Management (CyberArk)
    • Manage privileged accounts, credentials, and access workflows using CyberArk.
    • Configure and maintain CyberArk components such as Vault, CPM (Central Policy Manager), PSM (Privileged Session Manager), and PVWA (Password Vault Web Access).
    • Implement least-privilege principles, access approval workflows, and automated credential rotation.
    • Monitor privileged access sessions and generate audit reports for compliance and governance purposes.
  • Identity Governance & Compliance
    • Perform periodic access reviews and audits to ensure compliance with internal policies and external regulations (ISO 27001, SOX, GDPR).
    • Maintain documentation of access policies, workflows, and IAM configurations.
    • Collaborate with internal audit and compliance teams during assessments.
  • Integration & Automation
    • Integrate IAM solutions with enterprise systems (Active Directory, LDAP, HR systems, cloud platforms, SaaS applications).
    • Automate provisioning/deprovisioning processes to reduce manual effort and mitigate risk.
    • Support IAM-related automation for privileged account management, access requests, and approval workflows.
    • Investigate and resolve IAM-related incidents, including login issues, access failures, and policy violations.
    • Conduct root cause analysis for recurring access or security issues and implement preventative measures.
    • Provide 24x7 support for critical IAM and PAM incidents when needed.
  • Documentation & Reporting
    • Maintain up-to-date IAM architecture diagrams, configuration guides, and operational SOPs.
    • Generate reports for user access, privileged account usage, and compliance audits.
    • Provide recommendations for improvements in identity and access controls.
Required Qualifications & Skills
  • Experience: 6+ years in Identity and Access Management or Security Administration.
  • Technical Skills:
  • Strong experience with ISVA (Identity Services and Verification Automation) for identity lifecycle management.
  • Hands-on experience with CyberArk PAM including Vault, CPM, PSM, PVWA, and policies.
  • Strong understanding of Active Directory, LDAP, SSO/SAML/OAuth , and identity federation protocols.
  • Familiarity with access certification, RBAC (Role-Based Access Control), and least-privilege principles.
  • Knowledge of identity governance and compliance frameworks (ISO, SOX, GDPR).
  • Experience in integrating IAM/PAM solutions with cloud and on-premises systems.
  • Preferred Qualifications:
  • Certifications: CyberArk Trustee, Defender, or Sentry ; Certified Identity and Access Manager (CIAM) .
  • Experience with other IAM tools like SailPoint, Okta, Ping Identity , or Azure AD .
  • Knowledge of scripting for automation (PowerShell, Python, etc.).
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Engineering and Information Technology
  • Industries: Software Development

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Identity and Access Management Engineer

SAR90000 - SAR120000 Y ADFAR Tech

Posted today

Job Viewed

Tap Again To Close

Job Description

Identity and Access Management

ISVA – CyberArk

Position Summary:

The IAM Engineer is responsible for designing, implementing, and managing the organization's identity and access management solutions. The role requires deep expertise in
ISVA (Identity Services and Verification Automation)
and
CyberArk
for privileged access management, ensuring secure, compliant, and efficient access to systems and applications across the enterprise.

The engineer will collaborate with IT, Security, and Compliance teams to enforce identity governance, manage privileged accounts, and implement security best practices for access control.

Key Responsibilities:

1. Identity and Access Management Administration:

  • Administer and maintain
    ISVA
    solutions for identity verification, user provisioning/deprovisioning, and access request automation.
  • Implement and manage
    CyberArk
    Privileged Access Management (PAM) solutions including Vault configuration, policies, safe management, and session monitoring.
  • Ensure the secure onboarding and offboarding of users and privileged accounts.
  • Monitor and enforce identity policies, access reviews, and compliance requirements.

2. Privileged Access Management (CyberArk):

  • Manage privileged accounts, credentials, and access workflows using CyberArk.
  • Configure and maintain CyberArk components such as Vault, CPM (Central Policy Manager), PSM (Privileged Session Manager), and PVWA (Password Vault Web Access).
  • Implement least-privilege principles, access approval workflows, and automated credential rotation.
  • Monitor privileged access sessions and generate audit reports for compliance and governance purposes.

3. Identity Governance & Compliance:

  • Perform periodic access reviews and audits to ensure compliance with internal policies and external regulations (ISO 27001, SOX, GDPR).
  • Maintain documentation of access policies, workflows, and IAM configurations.
  • Collaborate with internal audit and compliance teams during assessments.

4. Integration & Automation:

  • Integrate IAM solutions with enterprise systems (Active Directory, LDAP, HR systems, cloud platforms, SaaS applications).
  • Automate provisioning/deprovisioning processes to reduce manual effort and mitigate risk.
  • Support IAM-related automation for privileged account management, access requests, and approval workflows.

5. Incident Management & Troubleshooting:

  • Investigate and resolve IAM-related incidents, including login issues, access failures, and policy violations.
  • Conduct root cause analysis for recurring access or security issues and implement preventative measures.
  • Provide 24x7 support for critical IAM and PAM incidents when needed.

6. Documentation & Reporting:

  • Maintain up-to-date IAM architecture diagrams, configuration guides, and operational SOPs.
  • Generate reports for user access, privileged account usage, and compliance audits.
  • Provide recommendations for improvements in identity and access controls.

Required Qualifications & Skills:

  • Experience:
    6+ years in Identity and Access Management or Security Administration.
  • Technical Skills:
  • Strong experience with
    ISVA
    (Identity Services and Verification Automation) for identity lifecycle management.
  • Hands-on experience with
    CyberArk PAM
    including Vault, CPM, PSM, PVWA, and policies.
  • Strong understanding of
    Active Directory, LDAP, SSO/SAML/OAuth
    , and identity federation protocols.
  • Familiarity with access certification, RBAC (Role-Based Access Control), and least-privilege principles.
  • Knowledge of identity governance and compliance frameworks (ISO, SOX, GDPR).
  • Experience in integrating IAM/PAM solutions with cloud and on-premises systems.
  • Preferred Qualifications:
  • Certifications:
    CyberArk Trustee, Defender, or Sentry
    ;
    Certified Identity and Access Manager (CIAM)
    .
  • Experience with other IAM tools like
    SailPoint, Okta, Ping Identity, or Azure AD
    .
  • Knowledge of scripting for automation (PowerShell, Python, etc.).
This advertiser has chosen not to accept applicants from your region.

Identity and Access Management Senior Officer

Riyadh, Riyadh J-B | جيبي

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Identity and Access Management Senior Officer

Identity and Access Management (IAM) Senior Officer at J-B is responsible for executing and managing access provisioning tasks to ensure secure and efficient access to J-B’s systems, applications, and data. This includes provisioning business privileges, privileged access, and remote work access in compliance with J-B’s cybersecurity policies and regulatory requirements. The role focuses on the operational provisioning of access and the support of related tools and systems, without covering identity governance or access review tasks. The IAM Senior Officer will also serve as a subject matter expert, mentoring junior team members.

Responsibilities
  • Identity Provisioning for Business Privileges: Execute the provisioning of business privileges for J-B employees, contractors, and third-party users to ensure secure and appropriate access to perform their job roles.
  • Process access requests for onboarding, role changes, and terminations in a timely and accurate manner, coordinating with HR and business units within J-B.
  • Ensure all access provisioning requests align with predefined access roles and profiles and comply with J-B’s access control policies.
  • Handle escalations for non-standard access requests, ensuring approval processes are followed.
  • Document and maintain accurate records of all provisioning activities within J-B.
  • Privileged Access Provisioning: Perform the provisioning of privileged access accounts for administrators, developers, and other J-B users requiring elevated permissions.
  • Ensure privileged accounts are provisioned securely and promptly deactivated when no longer required.
  • Troubleshoot and resolve issues related to privileged access provisioning within J-B.
  • Identity Provisioning for Remote Work: Provision secure access for J-B remote workers, including employees and contractors, to the bank’s systems and applications.
  • Grant access to remote work tools, such as VPNs, virtual desktops, and cloud-based applications, ensuring compliance with J-B’s security policies.
  • Ensure remote access provisioning includes robust security measures, such as multi-factor authentication (MFA) and encryption.
  • Support onboarding of J-B remote workers by provisioning appropriate access and resolving access-related issues.
  • Incident Handling and Troubleshooting: Respond to and resolve incidents related to access provisioning, privileged access, cryptographic key management, and HSM operations in J-B systems.
  • Escalate complex incidents to senior management or technical teams as needed, ensuring timely resolution.
  • Monitor provisioning tasks and related J-B systems for potential security risks or vulnerabilities and recommend corrective actions.
  • Collaboration and Communication: Collaborate with J-B business units, IT teams, and HR to process access requests and resolve provisioning issues.
  • Act as a point of contact for provisioning-related inquiries, providing guidance to J-B stakeholders on access management processes.
Notes

Information provided reflects the role responsibilities and does not include unrelated job listings or site notices.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Identity and access management Jobs in Saudi Arabia !

Identity and Access Management Senior Officer

SAR120000 - SAR240000 Y J-B | جيبي

Posted today

Job Viewed

Tap Again To Close

Job Description

The
Identity and Access Management (IAM) Senior Officer
at J-B is responsible for executing and managing access provisioning tasks to ensure secure and efficient access to J-B's systems, applications, and data.

This includes provisioning business privileges, privileged access, and remote work access in compliance with J-B's cybersecurity policies and regulatory requirements.

The role focuses on the operational provisioning of access and the support of related tools and systems, without covering identity governance or access review tasks. The IAM Senior Officer will also serve as a subject matter expert, mentoring junior team members.

1. Identity Provisioning for Business Privileges


• Execute the provisioning of business privileges for J-B employees, contractors, and third-party users to ensure secure and appropriate access to perform their job roles.


• Process access requests for onboarding, role changes, and terminations in a timely and accurate manner, coordinating with HR and business units within J-B.


• Ensure all access provisioning requests align with predefined access roles and profiles and comply with J-B's access control policies.


• Handle escalations for non-standard access requests, ensuring approval processes are followed.


• Document and maintain accurate records of all provisioning activities within J-B.

2. Privileged Access Provisioning


• Perform the provisioning of privileged access accounts for administrators, developers, and other J-B users requiring elevated permissions.


• Ensure privileged accounts are provisioned securely and promptly deactivated when no longer required.


• Troubleshoot and resolve issues related to privileged access provisioning within J-B.

3. Identity Provisioning for Remote Work


• Provision secure access for J-B remote workers, including employees and contractors, to the bank's systems and applications.


• Grant access to remote work tools, such as VPNs, virtual desktops, and cloud-based applications, ensuring compliance with J-B's security policies.


• Ensure remote access provisioning includes robust security measures, such as multi-factor authentication (MFA) and encryption.


• Support onboarding of J-B remote workers by provisioning appropriate access and resolving access-related issues.

4. Incident Handling and Troubleshooting


• Respond to and resolve incidents related to access provisioning, privileged access, cryptographic key management, and HSM operations in J-B systems.


• Escalate complex incidents to senior management or technical teams as needed, ensuring timely resolution.


• Monitor provisioning tasks and related J-B systems for potential security risks or vulnerabilities and recommend corrective actions.

5. Collaboration and Communication


• Collaborate with J-B business units, IT teams, and HR to process access requests and resolve provisioning issues.


• Act as a point of contact for provisioning-related inquiries, providing guidance to J-B stakeholders on access management processes.

This advertiser has chosen not to accept applicants from your region.

Security Engineer

Jeddah, Makkah FNRCO

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description:

Microsoft Entra (Entra ID, Permissions Management, ID Governance)

  • Identity & Access Management (IAM) concepts (SSO, MFA, conditional access, RBAC).
  • Entra ID administration (user/group management, app registration, service principals).
  • Federation & integration (SAML, OAuth 2.0, OpenID Connect).
  • Identity Governance (access reviews, entitlement management, lifecycle workflows).
  • Permissions Management (cloud entitlements across Azure, GCP).
  • Troubleshooting authentication & authorization issues.

Microsoft Azure

  • Azure AD / Entra integration with Azure resources.
  • Azure RBAC & security best practices.
  • Azure Policy & compliance management.
  • Azure Monitor, Log Analytics, Sentinel (security monitoring).
  • Familiarity with ARM templates/Bicep for infrastructure automation.

Microsoft Active Directory (AD)

  • AD domain services administration (user, group, OU, GPO).
  • Domain & forest trust management.
  • DNS integration with AD.
  • AD replication & troubleshooting (dcdiag, repadmin).
  • Security hardening (admin tiering, delegation).
  • AD backup & recovery procedures.

Microsoft Active Directory Certificate Services (AD CS)

  • PKI concepts (public/private keys, X.509 certificates, CRL, OCSP).
  • Installing & configuring AD CS (root CA, subordinate CA).
  • Certificate templates, enrollment policies, and auto-enrollment.
  • Managing CRLs & OCSP responders.
  • Securing CA infrastructure & key material.
  • Certificate lifecycle management & renewal automation.

Certificate Lifecycle Management (CLM)

  • Managing certificate inventories & expiration alerts.
  • Automated issuance & renewal (SCEP, ACME protocols).
  • Integrating PKI with endpoint, server, and network devices.
  • Governance & compliance for certificate usage.
  • Transitioning cryptographic algorithms (e.g., SHA-1 → SHA-256, RSA → ECC).

Microsoft PKI

  • Deep understanding of PKI trust chains.
  • Secure design of enterprise PKI.
  • Policy & practice statement creation.
  • Hardware Security Module (HSM) integration.
  • Root & subordinate CA separation & protection.

Microsoft Network Policy Server (NPS)

  • RADIUS server configuration.
  • Integration with AD for authentication.
  • NPS policies for wired/wireless 802.1X authentication.
  • NPS & MFA integration.
  • Troubleshooting RADIUS authentication issues (logs, Event Viewer).

Google Cloud Console Management

  • GCP IAM (roles, service accounts, policies).
  • Project, folder, and organization-level resource management.
  • Integration with external identity providers (Entra ID, SAML).
  • Monitoring & logging with Google Cloud Operations Suite.
  • Security best practices in GCP (org policy, security command center).

Requirements:

  • Bachelor’s degree in IT, Engineering, or related field.
  • Experience: 8 Years - 12 Years.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer

SAR90000 - SAR120000 Y Vectra AI

Posted today

Job Viewed

Tap Again To Close

Job Description

Vectra is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises.

The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a single platform. Powered by patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. For more information, visit

About the Role
As a key member of the pre-sales team, you partner closely with your sales counterpart, prospects and Vectra customers in the assigned region. The Security Engineer leads customers and partners through demos and guides on all things Vectra in a clear and concise manner. You drive all pre-sales related activities for our prospects leading them all the way through to closing of the deal (and who doesn't love closing a deal). And because we love our customers, you might step into some collaboration with customers periodically after the deal is closed to further make valuable contributions to the relationship.

At a Glance

  • Pre-sales technical account management together with the Regional Sales Managers.
  • Explore and maintain knowledge of Vectra's key competitors.
  • Communicate multi-functionally constantly to ensure all key team members are in the loop about product functionality and product desires experienced in the field.
  • Partner with the Product Management and R&D departments to develop features critical to Vectra's success.
  • Develop and maintain an in-depth technical knowledge of the Vectra product line.
  • Identify new opportunities by creating and developing strong technical relationships with customers and channel partners.
  • Maintain knowledge at a high technical level of the current security landscape.
  • Collaborate with Customers on technology reviews, product findings, and integrations with other technologies they may have.
  • Collaborate with other Vectra Engineers on high-level projects to deliver Vectra technologies to our customers.
  • Participate in deployment review and forecast calls.
  • Participate in design review and release meetings.
  • Travel as needed within region.

What Will Impress Us

  • Startup DNA - willing and able to go above and beyond, motivated to find solutions.
  • Customer-first behaviour.
  • Extensive experience in a similar capacity as technical or pre-sales.
  • Large account management is required.
  • Communicating excellently in verbal and written at a business proficient level in Arabic and English.

Technical Qualifications

  • Deep understanding of security-focused product lines (CASB, EDR, SIEM or forensics-type platforms) with the ability to translate into security best practices.
  • Proven understanding in networking and ability to understand L3 to L7 OSI layers.
  • String written (RFP) and verbal communications (Pre-sales presentations and conferences) are a must.
  • Good understanding of an attacker progression (Red Team or Pentest).
  • Good understanding of Incident Response (Blue Team) methodologies.
  • Proven understanding of Cloud Security.
  • Proven understanding of Security Processes and methodologies (CISSP/.) is a plus.

Sounds like this could be a match? We are looking forward to receiving your application

Vectra provides a comprehensive total rewards package that supports the financial, physical, mental and overall health of our employees and their families. Compensation includes competitive base pay, incentive plan eligibility, and participation in the employee equity plan (stock options). Specific benefits offered varies by location, but commonly include health care insurance, income protection / life insurance, access to retirement savings plans, behavioral & emotional wellness services, generous time away from work, and a comprehensive employee recognition program.

Vectra is committed to creating a diverse environment and is proud to be an equal opportunity employer.

We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Identity And Access Management Jobs