Enable job alerts via email!

Consultant-Identity Access Management (Cybersecurity)

KPMG UAE

Dubai

On-site

AED 80,000 - 120,000

Full time

Today
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking an IAM Consultant to enhance their Cyber offerings. This role involves designing and implementing comprehensive Identity and Access Management solutions, focusing on governance and strategy. The ideal candidate will have extensive experience in IAM technologies, including SailPoint and CyberArk, and will be responsible for crafting IAM architectures that align with organizational goals. Join a forward-thinking company where your expertise will drive impactful changes in identity security and access management, working collaboratively with global teams to tackle complex challenges.

Benefits

Health Insurance
Flexible Working Hours
Professional Development Opportunities
Performance Bonuses
Paid Time Off

Qualifications

  • 5+ years of experience in Identity and Access Management.
  • Strong understanding of IAM governance and operations.
  • Proficiency in IAM tools like SailPoint and CyberArk.

Responsibilities

  • Design and implement IAM solutions and strategies.
  • Manage IAM governance and operations effectively.
  • Collaborate with global teams to ensure project success.

Skills

IAM Program Design
Identity Governance and Administration (IGA)
Identity Federation Protocols
PAM Solutions
Role-Based Access Control (RBAC)
Analytical Skills
Communication Skills

Education

Bachelor's Degree in Computer Science or related field
Technical Certifications (CISSP, CISM)

Tools

SailPoint
CyberArk
Azure AD
Okta
ForgeRock

Job description

JOB DESCRIPTION

Job Role Description

At KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and operations.

Designation

  • Identity and Access Management - IAM Consultant

Experience

  • 5 years of experience in Identity and Access Management
  • Identity and Access Management - IAM Associate / Consultant / SailPoint IIQ Consultant

Language

  • English
  • Arabic (added advantage)

Certifications :

  • SailPoint IIQ (Associate / Professional / Engineer / Architect)
  • SailPoint IDN (Professional / Engineer)
  • CyberArk (Trustee / Defender / Sentry / Guardian)
  • Additional recognized technical certifications such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar
  • CISSP
  • CISM

Optional

  • SC-300 : Microsoft Identity and Access Administrator
  • Certified Access Management Specialist (CAMS)
  • Certifications in Architecture (, TOGAF, SABSA)

Skills

  • Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock).
  • Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls.
  • Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM).
  • Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms.
  • Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models.
  • Experience with firms like the Big 4 or leading Global Solution Integrators.
  • Capable of independently driving and coordinating various initiatives to successful completion.
  • Effective collaboration within global teams spanning multiple time zones.
  • Strong analytical prowess with an unwavering focus on detail and precision.
  • Outstanding communication, presentation, and report-writing aptitude.

Experience

  • Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc.
  • Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives.
  • Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities.
  • Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements.
  • Involved in application programming / scripting languages (C, Java, Perl, Shell).
  • Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery.
  • Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc.
  • Configured IAM settings and ensured seamless data synchronization between different IAM components.
  • Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders.
  • Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization.
  • Involved in Firewalls, IDS / IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management.
  • Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms.
  • Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies.
  • Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company's policies and process.
  • Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises.
  • Developed IAM documentation including policies, procedures, and standards.
  • Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system.
  • Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards.
  • Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders.
  • Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.