IAM Specialist

السعودية

Job Purpose:

Manage and secure digital identities by administering identity and access management (IAM) systems and ensuring that access to systems, applications, and data is granted, modified, and revoked in accordance with approved security policies and least privilege principles. This role ensures that only authorized users and entities have appropriate access, reducing the risk of unauthorized access, misuse, or privilege escalation. The Digital Identity Specialist supports the full identity lifecycle, including joiner, mover, and leaver (JML) processes, and contributes to maintaining a strong access control environment through continuous monitoring, access reviews, and incident support. The role works closely with IT, application owners, and security teams to ensure identity services are reliable, compliant, and aligned with modern authentication and authorization standards.


Core Responsibilities:

• Administer IAM systems and user access permissions

• Implement and manage MFA and authentication mechanisms

• Support joiner, mover, and leaver (JML) processes

• Monitor identity and access-related security events

• Investigate unauthorized access attempts and anomalies

• Enforce least-privilege and role-based access controls

• Maintain identity and access documentation and records

• Support periodic access reviews and recertifications

• Coordinate with IT and application owners on access issues

• Ensure compliance with access control policies and standards


Nature of Experience:

• Identity and access management or authentication systems


Skills:

• IAM platforms (e.g., Azure AD, Okta, SailPoint)

• Authentication and authorization models

• Access governance and compliance

• Identity and Access Management (IAM) concepts and frameworks

• Administration of IAM platforms (e.g., Azure AD, Okta, SailPoint)

• Multi-Factor Authentication (MFA) and Single Sign-On (SSO)

• Role-based and least-privilege access control models

• Joiner, Mover, Leaver (JML) process management

• Monitoring and analysis of access-related security events

• Investigation of unauthorized access attempts

• Access reviews and recertification processes

• Understanding of authentication and authorization protocols

• Strong coordination and stakeholder communication skills


Skills

Job Purpose:

Manage and secure digital identities by administering identity and access management (IAM) systems and ensuring that access to systems, applications, and data is granted, modified, and revoked in accordance with approved security policies and least privilege principles. This role ensures that only authorized users and entities have appropriate access, reducing the risk of unauthorized access, misuse, or privilege escalation. The Digital Identity Specialist supports the full identity lifecycle, including joiner, mover, and leaver (JML) processes, and contributes to maintaining a strong access control environment through continuous monitoring, access reviews, and incident support. The role works closely with IT, application owners, and security teams to ensure identity services are reliable, compliant, and aligned with modern authentication and authorization standards.


Core Responsibilities:

• Administer IAM systems and user access permissions

• Implement and manage MFA and authentication mechanisms

• Support joiner, mover, and leaver (JML) processes

• Monitor identity and access-related security events

• Investigate unauthorized access attempts and anomalies

• Enforce least-privilege and role-based access controls

• Maintain identity and access documentation and records

• Support periodic access reviews and recertifications

• Coordinate with IT and application owners on access issues

• Ensure compliance with access control policies and standards


Nature of Experience:

• Identity and access management or authentication systems


Skills:

• IAM platforms (e.g., Azure AD, Okta, SailPoint)

• Authentication and authorization models

• Access governance and compliance

• Identity and Access Management (IAM) concepts and frameworks

• Administration of IAM platforms (e.g., Azure AD, Okta, SailPoint)

• Multi-Factor Authentication (MFA) and Single Sign-On (SSO)

• Role-based and least-privilege access control models

• Joiner, Mover, Leaver (JML) process management

• Monitoring and analysis of access-related security events

• Investigation of unauthorized access attempts

• Access reviews and recertification processes

• Understanding of authentication and authorization protocols

• Strong coordination and stakeholder communication skills

تاريخ النشر: 04 رجب 1447 - اليوم
الناشر: Bayt
تاريخ النشر: 04 رجب 1447 - اليوم
الناشر: Bayt