Job Requisition ID: [[167007]]
Established in the 1930s as a trading business, Al-Futtaim Group today is one of the most diversified and progressive, privately held regional businesses headquartered in Dubai, United A”rab Emirates. Structured into five operating divisions; automotive, financial services, real estate, retail and healthcare; employing more than 35,000 employees across more than 20 countries in the Middle East, Asia and Africa, Al-Futtaim Group partners with over 200 of the world's most admired and innovative brands. Al-Futtaim Group’s entrepreneurship and relentless customer focus enables the organisation to continue to grow and expand; responding to the changing needs of our customers within the societies in which we operate.
By upholding our values of respect, excellence, collaboration and integrity; Al-Futtaim Group continues to enrich the lives and aspirations of our customers each and every day.
Overview of the role:
As a vital member of the Security Architecture subfunction within the CISO office, the Security Architect – Digital Identity leads the development, implementation, and product management of Identity and Access Management solutions. In the rapidly evolving cybersecurity landscape, this role is crucial for protecting the organization from emerging risks. By fulfilling this role, the Security Architect – Digital Identity significantly contributes to the organization's primary objective of enhancing Cyber Security Resilience.
What you will do:
Strategic Contribution
- Develop and maintain IAM target architecture and roadmap in collaboration with cross-functional teams. Generate and uphold architecture and design artifacts for IAM, ensuring alignment with industry best practices and regulatory standards.
- Analyse and optimize license utilization for cost-effectiveness and top-tier security, identifying ways to enhance yield per license and maximize return on security investment. Oversee IAM program management, including continuous improvement efforts, risk assessment, and mitigation strategies in coordination with relevant stakeholders.
- Lead security architectures for major projects and programs, performing security assessments, identifying gaps in existing security architecture, and recommending changes or improvements. Manage and contribute to the Architecture Governance Committee.
- Participate in risk reviews of new technologies and projects, ensuring they meet security requirements and standards.
Tactical Contribution
- Collaborate with cross-functional teams to design and develop comprehensive IAM solutions aligned with business requirements and security best practices.
- Lead the implementation of IAM systems, ensuring seamless integration and deployment by working closely with IT teams and vendors. Evaluate and select suitable IAM technologies and tools based on organizational needs.
- Develop and implement identity governance strategies and processes, covering user provisioning, role management, access request workflows, and access certifications, ensuring compliance with industry regulations and internal policies.
- Conduct thorough security architecture reviews to assess the effectiveness and adequacy of existing IAM solutions. Identify vulnerabilities and propose remediation actions to enhance the organization's security posture.
- Review, remediate, and close both internal and external audit findings related to the IAM domain promptly, ensuring compliance and security integrity.
- Engage with business units, IT teams, compliance personnel, and auditors to understand their IAM requirements and address any concerns. Serve as a subject matter expert, provide guidance on IAM-related matters, and maintain comprehensive documentation, including architecture diagrams, design specifications, and implementation guidelines. Generate regular reports on IAM system performance, compliance, and security metrics.
People Management
- Ensure that the goals are achieved through effective leadership and management by setting individual objectives, monitoring performance, supporting the development of staff, and motivating them to achieve their best work.
Regulatory Compliance and Privacy
- Take on the responsibility of ensuring compliance requirements from CBUAE ADHIS & DOH and safeguarding sensitive data by implementing monitoring implemented controls, monitoring data breaches, and collaborating with BU, IT & legal, and compliance teams to meet regulatory requirements.
Required Skills to be successful:
• Bachelor’s or master’s degree in computer science, Information Security, or a related field.
- Overall, 15 years of experience in Information Technology, with recent involvement in architecture and solution design roles, preferably from a Consulting or System Integrator background. (A minimum of 10 years dedicated to cybersecurity, with at least 5 years specifically focused on Security Architecture.
- Experiece leading at least one large and complex, end-to-end Identity and Access Management (IAM) Program [e.g.: 20K users, 100+ Business Applications including SAP],
- Excellent Communications & presentations skills.
About the Team:
You will be rerporting to Enterprise Architect - Digital Security
What equips you for the role:
- Bachelor’s or master’s degree in computer science, Information Security, or a related field.
- Relevant certifications such as CISSP, CISM, or IAM-specific certifications (e.g., CIAM, SC-300) are highly desirable.
- Overall, 15 years of comprehensive experience in Information Technology, with recent involvement in architecture and solution design roles, preferably from a Consulting or System Integrator background.
- A minimum of 10 years dedicated to cybersecurity, with at least 5 years specifically focused on Security Architecture.
- Demonstrated experience leading at least one large and complex, end-to-end Identity and Access Management (IAM) Program [e.g.: 20K users, 100+ Business Applications including SAP], encompassing assessment, target state definition, roadmap development, technology evaluation, architecture, solution design and implementation of processes and technologies.
- Proven track record of successfully managing large, complex IAM programs, showcasing the ability to navigate intricate organizational landscapes and deliver impactful solutions.
- Strong knowledge of IAM concepts, principles, and industry best practices.
- Experience with identity federation, Kerberos, single sign-on (SSO), multi-factor authentication (MFA) with Microsoft Entra ID, Privileged Access Management [PAM solution such as CyberArk], IGA and AM
- Familiarity with IAM standards and protocols, including SAML, OAuth, and OpenID Connect.
- Hands on implementation experience in one of the leading IGA solutions such as SailPoint, Saviynt, One Identity etc.
- Knowledge of SAP GRC and its integration with IGA is highly desirable
We’re here to provide excellent service but a little help from you can ensure a five-star candidate experience from start to finish.
Before you click “apply”: Please read the job description carefully to ensure you can confidently demonstrate why this opportunity is right for you and take the time to put together a well-crafted and personalised CV to further boost your visibility. Our global Talent Acquisition team members are all assigned to specific businesses to ensure that we make the best matches between talent and opportunities. We not only consider the requisite compatibility of skills and behaviours, but also how candidates align with our Values of Respect, Integrity, Collaboration, and Excellence.
As part of our candidate experience promise, we also want to make ourselves available to you throughout the application process. We make every effort to review and respond to every application.