About the Job
The role is responsible for overseeing and controlling enterprise access to resources by effectively managing user and system identities, keys, rights, and restrictions. This includes implementing and maintaining identity and access management (IAM) processes and tools across all critical applications, ensuring that access aligns with established security principles of confidentiality, integrity, and availability. The IAM Engineer plays a crucial role in safeguarding sensitive information and ensuring that only authorized users have access to essential resources, thereby enhancing the organization's overall security posture.
Responsibilities
- Manage and optimize enterprise access to resources using technologies such as Active Directory, SAML, ADFS, FIM, Azure, Enterprise Authentication, Single Sign-On (SSO), and provisioning systems.
- Review and validate key lifecycle management workflows, ensuring the appropriate assignment and usage of keys.
- Oversee the provisioning and de-provisioning of access to applications, infrastructure, and operating systems in accordance with established policies, standards, and procedures.
- Update and resolve access request tickets, ensuring timely settlement of user requests and issues in line with Service Level Agreements (SLAs).
- Demonstrate proficiency in processes related to new hire onboarding, employee offboarding, department transfers, access remediation, and privileged access management.
- Collaborate with cross-functional teams, vendors, and users to troubleshoot and resolve access issues efficiently.
- Assist in handling unique and complex security access requests, including those related to internal and external audits and disaster recovery testing.
- Perform any other duties assigned by the line manager related to the nature of the work.
- Enforce, incorporate, and comply with all necessary controls and related information security policies, procedures, practices, training, reporting, personal due diligence, and vigilance within departmental/unit activities and operations.
Qualifications
Preferred Qualifications:
- A tertiary-level qualification from an internationally recognized institution.
- Industry-recognized certifications in PKI, HSM, and Key Management solutions.
Experience:
- 5 to 7 years of relevant experience with demonstrated competencies in user provisioning and de-provisioning.
- Strong interpersonal and organizational skills, including meeting deadlines, following written policies, standards, and procedures, and providing consistent and superior customer service.
- Experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM).
- Strong knowledge of different authentication protocols: Kerberos, LDAP, RADIUS, SAML, and OAuth.
- An experienced professional who can deliver on difficult technical tasks.
- Project implementation experience.
- Experience with Key Protection HSM (Hardware Security Module) design and administration.
- Very good knowledge in Certificate and Encryption Management solutions, including PKI, CA, Trusted Certificate Providers Management, etc.
Technical Competencies:
- Strong knowledge and experience with different IAM Technologies such as Active Directory Federation Services (ADFS) and MS Identity Management (FIM/MIM).
- Knowledge of different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth.
Behavioral Competencies:
- Adaptability
- Complex Reasoning
- Analytical Thinking
- Trust & Transparency
About Us
D360 Bank is a shariah-compliant digital bank that aims to provide the best financial experience in the Kingdom. Our vision is to reinvent finance through innovation and technology, making it convenient, accessible, and fair to all.
About The Team
Joining the D360 Bank Technology team places you at the forefront of a revolutionary transformation in the financial and banking sector. You will have the opportunity to immerse yourself in DevOps philosophies, spearheading essential advancements in our applications and services. We embrace cutting-edge Infrastructure and Configuration as code techniques, as well as automation, immutability, CI/CD, and scalability, all driven by our unwavering commitment to the ultimate satisfaction and security of our customers and users. You will play a vital role in shaping the future of banking technology, paving the way for unprecedented innovation and success.