14 Oct 2021
Cyber Security Architect Dubai UAE
Position: Cyber Security Architect
Date posted: 2021-10-14
Industry: IT
Employment type: Full Time
Experience: 3 to 5 year
Qualification: Bachelor’s Degree Holder
Salary: AED 10000 to 20000
Location: Dubai, United Arab Emirates
Company: Confidential
Description:
Hiring Cyber Security Architect – Identity and Access Management – Dubai.
Key Experience:
- Certification in GIAC, CISSP-ISSAP (Information System Security Architecture Professional)
- Thorough understanding of Information Security specifications including ISO 27001, PCI DSS.
- Cyber security solution architecture and system integration experience
- Preferably cyber security operations experience
- Understanding of Architecture Methods, Principles and Patters. Key Responsibilities
- Lead the development of the Identity and Access Management strategy, architecture, governance, and roadmap
- Define the IAM architectural principles, polices and standards in line with the business and IT strategy, Cyber Security Policies and industry practices.
- Advocate for and contribute to the development and enforcement of IAM policies across all systems and solutions.
- Design and govern an enterprise wide IAM architecture in line with the organization business strategy, regulatory requirements and security policies.
- Support audit, risk assessment and compliance functions by designing solutions to address its findings and risks.
- Work closely with the team and other stakeholders to ensure alignment with IAM strategy and architecture.
- Help guide business units to implement suitable IAM solutions for their needs while adhering to standards and policies.
- Deliver IAM architectural artifacts during projects lifecycle
- Identify potential areas of improvement in the enterprise IAM capabilities Technologies The IAM architect should have qualified to work with the following technologies:
- Identity Management and Governance
- Access Management
- Cloud Identity and Access Management
- Privileged Identity Management
- Directory Services
- Single Sign-on and Federation using standard protocols and frameworks such as Kerberos, SAML 2.0, OAuth and ADFS
- Multi-factor Authentication
- Adaptive and Attribute Based Authentication
- Device Authentication & Profiling
- Protection and threat intelligence Required Skills
- Ability to deliver architectural artifacts such as: reference architectures, high-level design, conceptual diagram