Enable job alerts via email!

Consultant-Identity Access Management (Cybersecurity)

KPMG UAE

Dubai

On-site

AED 120,000 - 200,000

Full time

3 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

An international firm is seeking an IAM Consultant to enhance its Cyber offerings in Identity and Access Management in Dubai. The role involves designing and implementing IAM solutions, crafting strategies, and managing IAM operations, requiring significant experience and relevant technical certifications. Candidates should possess strong communication skills and a proven ability to collaborate successfully within diverse teams.

Qualifications

  • 5 years of experience in Identity and Access Management.
  • Ability to lead the design and execution of IAM programs.
  • Demonstrated expertise in designing complex RBAC models.

Responsibilities

  • Design and implement IAM solutions and architectures.
  • Manage IAM governance and operations.
  • Develop IAM strategy and vision in alignment with organizational objectives.

Skills

Identity Governance
IAM/PAM Solutions
Role-Based Access Control (RBAC)
Integration Skills
Analytical Skills
Communication Skills

Education

Relevant Technical Certification
Degree in Computer Science or Related Field

Tools

SailPoint
CyberArk
Azure AD
ForgeRock

Job description

At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations.

Designation
  • Identity and Access Management - IAM Consultant
Experience
  • 5 years of experience in Identity and Access Management
Language
  • Arabic (added advantage)
Certifications
  • SailPoint IIQ (Associate / Professional / Engineer / Architect)
  • SailPoint IDN (Professional / Engineer)
  • CyberArk (Trustee / Defender / Sentry / Guardian)
  • Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
  • CISSP
  • CISM
Optional
  • SC-300 : Microsoft Identity and Access Administrator
  • Certified Access Management Specialist (CAMS)
  • Certifications in Architecture (, TOGAF, SABSA)
Skills
  • Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
  • Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
  • Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
  • Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
  • Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
  • Experience with firms like the Big 4 or leading Global Solution Integrators.
  • Capable of independently driving and coordinating various initiatives to successful completion.
  • Effective collaboration within global teams spanning multiple time zones.
  • Strong analytical prowess with an unwavering focus on detail and precision.
  • Outstanding communication, presentation, and report-writing aptitude.
Experience
  • Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
  • Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
  • Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
  • Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
  • Involved in application programming / scripting languages (C, Java, Perl, Shell).
  • Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
  • Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
  • Configured IAM settings and ensured seamless data synchronization between different IAM components.
  • Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
  • Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
  • Involved in Firewalls, IDS / IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
  • Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
  • Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
  • Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company's policies and process.
  • Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
  • Developed IAM documentation including policies, procedures, and standards.
  • Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
  • Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
  • Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
  • Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.