25 Access Management jobs in the United Arab Emirates
Consultant-Identity Access Management
Posted today
Job Viewed
Job Description
Join to apply for the Consultant-Identity Access Management (Cybersecurity) role at KPMG Lower Gulf
Consultant-Identity Access Management (Cybersecurity)Join to apply for the Consultant-Identity Access Management (Cybersecurity) role at KPMG Lower Gulf
Get AI-powered advice on this job and more exclusive features.
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
Job Description
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
Designation
- Identity and Access Management – IAM Consultant
- Identity and Access Management – IAM Associate / Consultant / SailPoint IIQ Consultant
Language
- English
- Arabic (added advantage)
- SailPoint IIQ (Associate/ Professional/ Engineer/ Architect)
- SailPoint IDN (Professional/ Engineer)
- CyberArk (Trustee/ Defender/ Sentry/ Guardian)
- Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
- CISSP
- CISM
- SC-300: Microsoft Identity and Access Administrator
- Certified Access Management Specialist (CAMS)
- Certifications in Architecture (e.g., TOGAF, SABSA)
- Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
- Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
- Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
- Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
- Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
- Experience with firms like the Big 4 or leading Global Solution Integrators.
- Capable of independently driving and coordinating various initiatives to successful completion.
- Effective collaboration within global teams spanning multiple time zones.
- Strong analytical prowess with an unwavering focus on detail and precision.
- Outstanding communication, presentation, and report-writing aptitude.
- Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
- Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
- Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
- Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
- Involved in application programming/scripting languages (C, Java, Perl, Shell).
- Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
- Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
- Configured IAM settings and ensured seamless data synchronization between different IAM components.
- Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
- Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Involved in Firewalls, IDS/IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
- Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
- Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
- Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company's policies and process.
- Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
- Developed IAM documentation including policies, procedures, and standards.
- Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
- Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
- Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
- Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Accounting
Referrals increase your chances of interviewing at KPMG Lower Gulf by 2x
Sign in to set job alerts for "Identity Management Consultant" roles. Consultant-Cyber (Identity and Access Management) Assistant Manager-Cyber (Identity and Access Management) Information Security - Data Protection Consultant Senior Recruitment Consultant - Technology Graduate - Transport and Infrastructure ConsultantDubai, Dubai, United Arab Emirates 1 year ago
Business analyst for leading Insurances Industry in Dubai Business Analyst - ATM Domain (NCR and Diebold)Dubai, Dubai, United Arab Emirates 1 year ago
VIE _ Business Analyst (H/F) _ EMIRATS ARABES UNIS, DubaiAjman, Ajman Emirate, United Arab Emirates 7 months ago
We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrConsultant-Identity Access Management (Cybersecurity)
Posted 5 days ago
Job Viewed
Job Description
Join to apply for the Consultant-Identity Access Management (Cybersecurity) role at KPMG Lower Gulf
Consultant-Identity Access Management (Cybersecurity)Join to apply for the Consultant-Identity Access Management (Cybersecurity) role at KPMG Lower Gulf
Get AI-powered advice on this job and more exclusive features.
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
Job Description
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
Designation
- Identity and Access Management – IAM Consultant
- Identity and Access Management – IAM Associate / Consultant / SailPoint IIQ Consultant
Language
- English
- Arabic (added advantage)
- SailPoint IIQ (Associate/ Professional/ Engineer/ Architect)
- SailPoint IDN (Professional/ Engineer)
- CyberArk (Trustee/ Defender/ Sentry/ Guardian)
- Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
- CISSP
- CISM
- SC-300: Microsoft Identity and Access Administrator
- Certified Access Management Specialist (CAMS)
- Certifications in Architecture (e.g., TOGAF, SABSA)
- Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
- Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
- Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
- Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
- Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
- Experience with firms like the Big 4 or leading Global Solution Integrators.
- Capable of independently driving and coordinating various initiatives to successful completion.
- Effective collaboration within global teams spanning multiple time zones.
- Strong analytical prowess with an unwavering focus on detail and precision.
- Outstanding communication, presentation, and report-writing aptitude.
- Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
- Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
- Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
- Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
- Involved in application programming/scripting languages (C, Java, Perl, Shell).
- Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
- Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
- Configured IAM settings and ensured seamless data synchronization between different IAM components.
- Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
- Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Involved in Firewalls, IDS/IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
- Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
- Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
- Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company’s policies and process.
- Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
- Developed IAM documentation including policies, procedures, and standards.
- Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
- Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
- Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
- Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
- Seniority levelMid-Senior level
- Employment typeFull-time
- Job functionInformation Technology
- IndustriesAccounting
Referrals increase your chances of interviewing at KPMG Lower Gulf by 2x
Sign in to set job alerts for “Identity Management Consultant” roles.Consultant-Cyber (Identity and Access Management)Assistant Manager-Cyber (Identity and Access Management)Information Security - Data Protection ConsultantSenior Recruitment Consultant - TechnologyGraduate - Transport and Infrastructure ConsultantDubai, Dubai, United Arab Emirates 1 year ago
Business analyst for leading Insurances Industry in DubaiBusiness Analyst - ATM Domain (NCR and Diebold)Dubai, Dubai, United Arab Emirates 1 year ago
VIE _ Business Analyst (H/F) _ EMIRATS ARABES UNIS, DubaiAjman, Ajman Emirate, United Arab Emirates 7 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrForgeRock- Identity & Access Management - Consultant
Posted 5 days ago
Job Viewed
Job Description
1 year ago Be among the first 25 applicants
Get AI-powered advice on this job and more exclusive features.
The role must execute the following core responsibilities:
- 6-8 years of experience in IT, aligned with information security team building and deploying Identity and Access Management solutions, including 2-5 years of hands-on experience with ForgeRock.
- Experience in implementing Identity and Access Management using ForgeRock and Azure Active Directory.
- Banking domain experience is mandatory, along with experience working in Agile teams using SCRUM.
- Good working knowledge of relational databases such as MySQL and Oracle, NoSQL databases like MongoDB, LDAP concepts, and Directory services.
- At least 2 cycles of ForgeRock solution build and deployment experience.
- Experience connecting to authorized sources via installation and configuration of connectors to destination targets, with clear definition and configuration of User Attributes, User, Process, and Resource definitions.
- Hands-on experience with customization of ForgeRock, including connector development, scripting, and building ForgeRock workflows.
- Experience with Directory services integration of ForgeRock.
- Proficiency in Java/J2EE development.
- In-depth understanding of databases, queries, and stored procedures.
- Ability to create detailed technical documentation, including design, use cases, and test cases.
- Strong troubleshooting skills.
- Experience with development tools like JDeveloper.
- Ability to work independently as a senior developer or architect, with leadership experience for small team management, especially in integration projects.
- Willingness to collaborate with offshore team members.
- Not Applicable
- Contract
- Information Technology
- IT Services and IT Consulting
Referrals increase your chances of interviewing at Dicetek LLC by 2x.
Get notified about new Identity Management Consultant jobs in Abu Dhabi, Abu Dhabi Emirate, United Arab Emirates.
This job posting is active as of now.
#J-18808-LjbffrIdentity and Access Management Professional
Posted today
Job Viewed
Job Description
Identity and Access Management Specialist
">We are seeking a seasoned professional with expertise in Identity and Access Management solutions to join our team. The ideal candidate will have extensive experience in designing, implementing, and managing IAM systems using ForgeRock.
">Responsibilities:
">- Design and implement identity management solutions using ForgeRock and Azure Active Directory.
- Develop and maintain custom connectors for integration with various sources and targets.
- Configure user attributes, user processes, and resource definitions.
- Work collaboratively with cross-functional teams to deliver high-quality solutions.
Requirements:
">- 6-8 years of experience in IT, with 2-5 years of hands-on experience with ForgeRock.
- Proficiency in Java/J2EE development and scripting languages.
- Excellent problem-solving skills and attention to detail.
- Able to work independently and as part of a team.
Benefits:
">This role offers a unique opportunity to work on complex identity and access management projects, collaborate with experienced professionals, and grow your career in a dynamic environment.
">About the Job:
">The successful candidate will be responsible for designing and implementing identity management solutions using ForgeRock and Azure Active Directory. You will work closely with cross-functional teams to deliver high-quality solutions that meet business requirements.
">What We Offer:
">We offer a competitive salary, comprehensive benefits package, and opportunities for professional growth and development.
Identity and Access Management Specialist
Posted today
Job Viewed
Job Description
Join to apply for the Identity and Access Management Specialist role at Dicetek LLC
Identity and Access Management Specialist2 weeks ago Be among the first 25 applicants
Join to apply for the Identity and Access Management Specialist role at Dicetek LLC
Get AI-powered advice on this job and more exclusive features.
We are seeking an experienced IDAM (Identity and Access Management) Specialist with strong expertise in SailPoint to support our organization's identity governance initiatives. The ideal candidate will have hands-on experience in implementing, configuring, and managing SailPoint IdentityIQ or other related IAM tools.
Key Responsibilities- Implement and manage identity lifecycle processes using SailPoint.
- Develop and configure SailPoint workflows, rules, and connectors.
- Conduct role mining, access reviews, and policy enforcement.
- Integrate SailPoint with various systems and applications (on-prem and cloud).
- Collaborate with IT security, compliance, and business teams to ensure access governance.
- Troubleshoot and resolve IAM-related issues.
- 3+ years of experience in IDAM, with at least 2 years in SailPoint (IdentityIQ or similar).
- Strong understanding of identity governance, access certification, and role-based access control (RBAC).
- Experience with scripting languages (e.g., BeanShell, PowerShell) is a plus.
- Familiarity with regulatory requirements (e.g., GDPR, SOX) is an advantage.
- Excellent problem-solving and communication skills.
Identity and Access Management Expert
Posted today
Job Viewed
Job Description
We are seeking an experienced professional to expand our Identity and Access Management (IAM) offerings and provide expertise to clients in this area. As a key member of our Cyber practice , you will be responsible for providing guidance on best practices, risk assessment, and solutions implementation.
Key Responsibilities:- Develop and maintain strong relationships with clients to understand their IAM needs and provide tailored solutions.
- Collaborate with cross-functional teams to design and implement IAM strategies that meet client requirements.
- Conduct thorough risk assessments to identify vulnerabilities and recommend mitigation measures.
- Stay up-to-date with industry trends, technologies, and best practices to ensure the delivery of high-quality services.
- Proven experience in Identity and Access Management (IAM) consulting.
- Strong understanding of IAM frameworks, standards, and regulatory requirements.
- Excellent communication and interpersonal skills to effectively collaborate with clients and internal stakeholders.
- Ability to work in a fast-paced environment and manage multiple projects simultaneously.
- Opportunity to work on challenging projects and develop your expertise in IAM.
- Collaborative and dynamic work environment with a team of experienced professionals.
- Ongoing training and development opportunities to stay ahead in the field.
Identity and Access Management Lead
Posted today
Job Viewed
Job Description
We are seeking a highly skilled Senior Identity and Access Management (IAM) Engineer to join our team.
- This is a senior role that requires extensive experience in identity lifecycle management access provisioning de-provisioning workflows PAM and directory services.
The ideal candidate will have hands-on experience with IGA platforms user lifecycle management access certifications and RBAC as well as proficiency in at least one scripting language for automation and integration tasks.
- A minimum of 5 years' experience in a dedicated IAM role with a proven track record of engineering and supporting enterprise-level solutions.
- Strong understanding of core identity protocols and standards SAML OAuth OpenID Connect SCIM.
- Experience with directory services such as Microsoft Entra ID (Azure AD).
- Proficiency in at least one scripting language (e.g. PowerShell) for automation and integration tasks.
- Strong analytical and problem-solving skills with attention to detail.
- A proactive self-motivated individual who can work effectively both independently and as part of a collaborative team.
- Ability to manage competing priorities in a fast-paced environment.
Be The First To Know
About the latest Access management Jobs in United Arab Emirates !
Identity and Access Management Professional
Posted today
Job Viewed
Job Description
We are seeking an experienced Identity and Access Management professional to join our team. The role will involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and operations.
Consultant-Cyber (Identity and Access Management)
Posted today
Job Viewed
Job Description
Get AI-powered advice on this job and more exclusive features.
Job Description
CONSULTANT-IAM (Identity and Access Management)
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
3-5 years of experience in Identity and Access Management
- Identity and Access Management – IAM Associate / Consultant / SailPoint IIQ Consultant
- English
- Arabic (added advantage)
- SailPoint IIQ (Associate/ Professional/ Engineer/ Architect)
- SailPoint IDN (Professional/ Engineer)
- CyberArk (Trustee/ Defender/ Sentry/ Guardian)
- Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
- SC-300: Microsoft Identity and Access Administrator
- Certified Access Management Specialist (CAMS)
- Certifications in Architecture (e.g., TOGAF, SABSA)
- Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
- Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
- Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
- Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
- Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
- Experience with firms like the Big 4 or leading Global Solution Integrators.
- Capable of independently driving and coordinating various initiatives to successful completion.
- Effective collaboration within global teams spanning multiple time zones.
- Strong analytical prowess with an unwavering focus on detail and precision.
- Outstanding communication, presentation, and report-writing aptitude.
- Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
- Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
- Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
- Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
- Involved in application programming/scripting languages (C, Java, Perl, Shell).
- Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
- Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
- Configured IAM settings and ensured seamless data synchronization between different IAM components.
- Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
- Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Involved in Firewalls, IDS/IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
- Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
- Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
- Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company's policies and process.
- Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
- Developed IAM documentation including policies, procedures, and standards.
- Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
- Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
- Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
- Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
- Support in installation, integration, and maintenance of one or more IAM / CIAM / PAM products such as Sailpoint, Saviynt, Okta, CyberArk, BeyondTrust, or ForgeRock.
- Deliver and manage major IAM programs, orchestrating the planning, implementation, and completion in alignment with established objectives and timelines.
- Provide post-implementation support and regular system maintenance and support which will periodically require evening, weekend, and on-call support.
- Take a leading role in evaluating the security capabilities and solutions of IAM, determining optimal ways to integrate them throughout the enterprise.
- Engage with clients, collaborating closely with both on-site and offshore delivery teams to ensure effective communication and strong coordination in the project execution process.
- Lead project management meetings including status updates, technical assessment reports and key stakeholder meetings.
- Develop, drive and review IAM frameworks including TOMs, policies, procedures, and templates.
- Develop comprehensive documentation, guidelines, and user manuals that explain IAM processes.
- Initiate onsite knowledge transfer and training sessions for end users, ensuring they are well-equipped to understand and utilize the IAM system effectively.
- Develop blueprints for Role-Based Access Control (RBAC), outlining the precise structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Develop IAM Reference Model for Low Level and High-Level Design documents to provide a structured framework for identity and access management implementations.
- Define IAM functional and non-functional design requirements, outlining the specific capabilities and performance characteristics required for effective IAM solutions.
- Review and enhance the IAM target operating model by refining KPIs, RACI, Policies, and Procedures, ensuring a streamlined and effective approach to IAM.
- Define Prioritization Strategy for the applications and systems in scope, determining the order and significance in which they should be addressed and integrated within the IAM framework.
- Monitor user activity and reporting on the IAM system and ensure that continuous monitoring tools and technologies access control is managed adequately.
- Provide subject matter recommendations related to the leading IAM products.
- Build working relationships with IAM vendor product management, development, and engineering teams.
- Lead and respond to client Request for Proposals (RFP) and pitches.
- Support Thought Leadership and Webinar initiatives for Identity and Access Management.
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Accounting
Referrals increase your chances of interviewing at KPMG Lower Gulf by 2x
Consultant-Identity Access Management (Cybersecurity) Assistant Manager-Cyber (Identity and Access Management)Dubai, Dubai, United Arab Emirates 1 year ago
Ajman, Ajman Emirate, United Arab Emirates 7 months ago
We're unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrConsultant-Cyber (Identity and Access Management)
Posted today
Job Viewed
Job Description
JOB DESCRIPTION
CONSULTANT-IAM (Identity and Access Management)
Job Role Description
At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.
Experience
3-5 years of experience in Identity and Access Management
- Identity and Access Management - IAM Associate / Consultant / SailPoint IIQ Consultant
Language
English
Arabic (added advantage)
Certifications :
- SailPoint IIQ (Associate / Professional / Engineer / Architect)
- SailPoint IDN (Professional / Engineer)
- CyberArk (Trustee / Defender / Sentry / Guardian)
- Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
Optional
- SC-300 : Microsoft Identity and Access Administrator
- Certified Access Management Specialist (CAMS)
- Certifications in Architecture (, TOGAF, SABSA)
Skills
- Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
- Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
- Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
- Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
- Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
- Experience with firms like the Big 4 or leading Global Solution Integrators.
- Capable of independently driving and coordinating various initiatives to successful completion.
- Effective collaboration within global teams spanning multiple time zones.
- Strong analytical prowess with an unwavering focus on detail and precision.
- Outstanding communication, presentation, and report-writing aptitude.
Experience
- Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
- Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
- Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
- Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
- Involved in application programming / scripting languages (C, Java, Perl, Shell).
- Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
- Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
- Configured IAM settings and ensured seamless data synchronization between different IAM components.
- Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
- Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Involved in Firewalls, IDS / IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
- Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
- Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
- Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company's policies and process.
- Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
- Developed IAM documentation including policies, procedures, and standards.
- Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
- Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
- Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
- Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
- Support in installation, integration, and maintenance of one or more IAM / CIAM / PAM products such as Sailpoint, Saviynt, Okta, CyberArk, BeyondTrust, or ForgeRock.
- Deliver and manage major IAM programs, orchestrating the planning, implementation, and completion in alignment with established objectives and timelines.
- Provide post-implementation support and regular system maintenance and support which will periodically require evening, weekend, and on-call support.
- Take a leading role in evaluating the security capabilities and solutions of IAM, determining optimal ways to integrate them throughout the enterprise.
- Engage with clients, collaborating closely with both on-site and offshore delivery teams to ensure effective communication and strong coordination in the project execution process.
- Lead project management meetings including status updates, technical assessment reports and key stakeholder meetings.
- Develop, drive and review IAM frameworks including TOMs, policies, procedures, and templates.
- Develop comprehensive documentation, guidelines, and user manuals that explain IAM processes.
- Initiate onsite knowledge transfer and training sessions for end users, ensuring they are well-equipped to understand and utilize the IAM system effectively.
- Develop blueprints for Role-Based Access Control (RBAC), outlining the precise structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
- Develop IAM Reference Model for Low Level and High-Level Design documents to provide a structured framework for identity and access management implementations.
- Define IAM functional and non-functional design requirements, outlining the specific capabilities and performance characteristics required for effective IAM solutions.
- Review and enhance the IAM target operating model by refining KPIs, RACI, Policies, and Procedures, ensuring a streamlined and effective approach to IAM.
- Define Prioritization Strategy for the applications and systems in scope, determining the order and significance in which they should be addressed and integrated within the IAM framework.
- Monitor user activity and reporting on the IAM system and ensure that continuous monitoring tools and technologies access control is managed adequately.
- Provide subject matter recommendations related to the leading IAM products.
- Build working relationships with IAM vendor product management, development, and engineering teams.
- Lead and respond to client Request for Proposals (RFP) and pitches.
Responsibilities