الوصف الوظيفي
Job Role DescriptionAt KPMG, we offer an exceptional career experience to inspire and empower talents like you to help our clients solve complex Identity and Access Management business challenges. The role focuses on expanding KPMG's Cyber offerings in Identity and Access Management (IAM). Responsibilities involve designing and implementing IAM solutions, crafting IAM vision, strategy, roadmap, and architecture, as well as managing IAM governance and IAM operations. Designation Identity and Access Management – IAM Consultant >5 years of experience in Identity and Access Management Identity and Access Management – IAM Associate / Consultant / SailPoint IIQ Consultant3-5 years of experience in Identity and Access Management Language English Arabic (added advantage)Certifications: SailPoint IIQ (Associate/ Professional/ Engineer/ Architect) SailPoint IDN (Professional/ Engineer) CyberArk (Trustee/ Defender/ Sentry/ Guardian) Additional recognized technical certification such as Oracle, SailPoint IIQ or IDN, One Identity, Azure AD, Ping Identity, OKTA, BeyondTrust, or similar CISSP CISMOptional SC-300: Microsoft Identity and Access Administrator Certified Access Management Specialist (CAMS) Certifications in Architecture (e.g., TOGAF, SABSA)Skills Ability to lead the design and execution of end-to-end IAM, CIAM and PAM Programs (SailPoint, AAD, Saviynt, OKTA, ForgeRock). Hands-on experience with Identity Governance and Administration (IGA) solutions like SailPoint, Saviynt, or equivalent, including configuring workflows, access policies, and compliance controls. Proficient in integrating IAM solutions with diverse applications, services, and platforms, employing APIs, connectors, and identity federation protocols (such as SSO and SCIM). Skilled in PAM solutions such as CyberArk, Delinea, BeyondTrust, or similar platforms. Demonstrated expertise in designing and implementing complex Role-Based Access Control (RBAC) models. Experience with firms like the Big 4 or leading Global Solution Integrators. Capable of independently driving and coordinating various initiatives to successful completion. Effective collaboration within global teams spanning multiple time zones. Strong analytical prowess with an unwavering focus on detail and precision. Outstanding communication, presentation, and report-writing aptitude.Experience Implemented one of the IAM / PAM Technology solutions SailPoint, CyberArk, ForgeRock, BeyondTrust, Okta, Azure AD, etc. Developed comprehensive IAM vision, strategy, and roadmap, aligning with organizational objectives. Developed IAM architecture as part of the design process to ensure secure and efficient identity and access management capabilities. Performed vendor evaluation, systematically assessing potential suppliers to determine their suitability for meeting the organization's needs and requirements. Involved in application programming/scripting languages (C, Java, Perl, Shell). Established IAM environments across various stages, including Testing, User Acceptance Testing (UAT), Production, and Disaster Recovery. Demonstrated a strong understanding of business processes related to IAM, user provisioning process, security maintenance processes, etc. Configured IAM settings and ensured seamless data synchronization between different IAM components. Performed User Acceptance Testing (UAT) by engaging end-users and collaborating with business stakeholders. Developed blueprints for Role-Based Access Control (RBAC), outlining the structure and guidelines for assigning access privileges based on roles and responsibilities within the organization. Involved in Firewalls, IDS/IPS, Vulnerability Assessment tools, Endpoint solutions, Proxy servers, Security Incident and Event Management Systems, Data Loss Prevention, Active Directory and Permissions Management. Demonstrated expertise in Federation technologies with a specific focus on solutions offered by ADFS, SailPoint, and the Ping Identity platforms. Developed Authentication and Authorization reference architectures for existing, new, and emerging IAM technologies. Contributed to the execution of Identity and Access Management (IAM) security service delivery including requests, incidents, root cause analysis, and problem and change management in compliance with the company’s policies and process. Developed and reviewed technical security roadmaps related to IAM within a cloud security context as well as on-premises. Developed IAM documentation including policies, procedures, and standards. Designed IAM processes and workflows, creating clear and efficient steps to manage identities and access securely within the system. Designed IAM governance and operating model outlining the framework and guidelines to efficiently manage identity and access, ensuring adherence to best practices and regulatory standards. Demonstrated effective collaboration skills to work closely with team members and engaged with senior stakeholders. Demonstrated proficiency in problem-solving skills, allowing for the adept analysis of complex challenges within IAM.