drjobs Security Architect العربية

Security Architect

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

Not Mentionedyears

Job Location drjobs

Dubai - UAE

Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Nationality

Emirati

Gender

Male

Vacancy

1 Vacancy

Job Description

Roles and responsibilities

As a vital member of the Security Architecture subfunction within the CISO office, the Security Architect – Digital Identity leads the development, implementation, and product management of Identity and Access Management solutions. In the rapidly evolving cybersecurity landscape, this role is crucial for protecting the organization from emerging risks. By fulfilling this role, the Security Architect – Digital Identity significantly contributes to the organization's primary objective of enhancing Cyber Security Resilience.

What you will do:

Strategic Contribution

  • Develop and maintain IAM target architecture and roadmap in collaboration with cross-functional teams. Generate and uphold architecture and design artifacts for IAM, ensuring alignment with industry best practices and regulatory standards.
  • Analyse and optimize license utilization for cost-effectiveness and top-tier security, identifying ways to enhance yield per license and maximize return on security investment. Oversee IAM program management, including continuous improvement efforts, risk assessment, and mitigation strategies in coordination with relevant stakeholders.
  • Lead security architectures for major projects and programs, performing security assessments, identifying gaps in existing security architecture, and recommending changes or improvements. Manage and contribute to the Architecture Governance Committee.
  • Participate in risk reviews of new technologies and projects, ensuring they meet security requirements and standards.

Tactical Contribution

  • Collaborate with cross-functional teams to design and develop comprehensive IAM solutions aligned with business requirements and security best practices.
  • Lead the implementation of IAM systems, ensuring seamless integration and deployment by working closely with IT teams and vendors. Evaluate and select suitable IAM technologies and tools based on organizational needs.
  • Develop and implement identity governance strategies and processes, covering user provisioning, role management, access request workflows, and access certifications, ensuring compliance with industry regulations and internal policies.
  • Conduct thorough security architecture reviews to assess the effectiveness and adequacy of existing IAM solutions. Identify vulnerabilities and propose remediation actions to enhance the organization's security posture.
  • Review, remediate, and close both internal and external audit findings related to the IAM domain promptly, ensuring compliance and security integrity.
  • Engage with business units, IT teams, compliance personnel, and auditors to understand their IAM requirements and address any concerns. Serve as a subject matter expert, provide guidance on IAM-related matters, and maintain comprehensive documentation, including architecture diagrams, design specifications, and implementation guidelines. Generate regular reports on IAM system performance, compliance, and security metrics.

Desired candidate profile

  • Ensure that the goals are achieved through effective leadership and management by setting individual objectives, monitoring performance, supporting the development of staff, and motivating them to achieve their best work.

Regulatory Compliance and Privacy

  • Take on the responsibility of ensuring compliance requirements from CBUAE ADHIS & DOH and safeguarding sensitive data by implementing monitoring implemented controls, monitoring data breaches, and collaborating with BU, IT & legal, and compliance teams to meet regulatory requirements.

Required Skills to be successful:

  • Bachelor’s or master’s degree in computer science, Information Security, or a related field.
  • Overall, 15 years of experience in Information Technology, with recent involvement in architecture and solution design roles, preferably from a Consulting or System Integrator background. ( A minimum of 10 years dedicated to cybersecurity, with at least 5 years specifically focused on Security Architecture.
  • Experiece leading at least one large and complex, end-to-end Identity and Access Management (IAM) Program [e.g.: 20K users, 100+ Business Applications including SAP],
  • Excellent Communications & presentations skills.

About the Team:

You will be rerporting to Enterprise Architect - Digital Security

What equips you for the role:

  • Bachelor’s or master’s degree in computer science, Information Security, or a related field.
  • Relevant certifications such as CISSP, CISM, or IAM-specific certifications (e.g., CIAM, SC-300) are highly desirable.
  • Overall, 15 years of comprehensive experience in Information Technology, with recent involvement in architecture and solution design roles, preferably from a Consulting or System Integrator background.
  • A minimum of 10 years dedicated to cybersecurity, with at least 5 years specifically focused on Security Architecture.
  • Demonstrated experience leading at least one large and complex, end-to-end Identity and Access Management (IAM) Program [e.g.: 20K users, 100+ Business Applications including SAP], encompassing assessment, target state definition, roadmap development, technology evaluation, architecture, solution design and implementation of processes and technologies.
  • Proven track record of successfully managing large, complex IAM programs, showcasing the ability to navigate intricate organizational landscapes and deliver impactful solutions.
  • Strong knowledge of IAM concepts, principles, and industry best practices.
  • Experience with identity federation, Kerberos, single sign-on (SSO), multi-factor authentication (MFA) with Microsoft Entra ID, Privileged Access Management [PAM solution such as CyberArk], IGA and AM
  • Familiarity with IAM standards and protocols, including SAML, OAuth, and OpenID Connect.
  • Hands on implementation experience in one of the leading IGA solutions such as SailPoint, Saviynt, One Identity etc.
  • Knowledge of SAP GRC and its integration with IGA is highly desirab

Employment Type

Full-time

Department / Functional Area

Security

About Company

Report This Job
Disclaimer: Drjobs.ae is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.

Similar Jobs