Cybersecurity Consultant

1D Consulting - Egypt - Giza

1DConsulting is a specialized company offering cybersecurity consulting and implementation solutions. We provide clients across the Middle East and Africa with Professional IAM Services, Assessment and Consulting Services, System Integration, SLA Support, and Managed Services.

We are seeking a highly skilled dynamic Engineers to join our Identity team. As an IGA/IAM Implementation Engineer, you will be key in designing, implementing, and maintaining Identity and Access Management solutions for our customers. You will work closely with both technical and non-technical stakeholders, you’ll participate in the work of Identity Governance and Administration architecture, refining and implementation of IGA-related processes, integrating new services, and solving upcoming challenges.

 

Core Responsibilities:

- Design and implementation of Identity and access management (IAM) solutions.

- Participate in requirements gathering, solution design, and documentation.

- Customize, configure, and develop integrations per design and manage project deliverables to successful completion.

- Collaborate with customers and your project team to assess IAM requirements and develop customized solutions.

- Manage access controls and identity governance.

- Troubleshoot and resolve technical, process, or data quality-related issues.

- Stay updated on industry trends and best practices in IAM.

- Ensure compliance with security standards and regulatory requirements.

 

 


Job Requirements:- Bachelor of Computer Science or relevant.- Must have experience working in a customer-facing (onsite) role.- Experiences with the information security field or any related field.- Experience in dealing with databases such as MSSQL, and Oracle. etc.- Experience in .Net programming languages.- Experience working with IGA/IAM/SSO technologies.- Experience and understanding of IAM concepts and best practices, such as Identity Lifecycle, Roles, RBAC, Segregations of Duty, workflow development, privileged access, and others.- Troubleshoot, identify and resolve technical identity and access management-related issues.- A high level of attention to detail and accuracy is required.- Ability to communicate clearly and concisely (both written and verbal, presentation, and interpersonal skills) to effectively communicate in English.- Familiar with common enterprise applications and infrastructure such as Active Directory, RDBMS, ERP, Exchange, Authentication solutions, PKI concepts, and Integration protocols such as RESTFUL, SOAP, and SCIM
Post date: Today
Publisher: Wuzzuf .com
Post date: Today
Publisher: Wuzzuf .com