Browse Jobs
For Companies
Log inGet Started
1D Consulting logo

Cyber Security Consultant

1D Consulting
Sheikh Zayed, Giza
Posted 7 months ago
39Applicants for2 open positions
  • 32Viewed
  • 9In Consideration
  • 1Not Selected
Search other opportunities

Job Details

Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:

Skills And Tools:

Job Description

1DConsulting is a specialized company offering cybersecurity consulting and implementation solutions. We provide clients across the Middle East and Africa with Professional IAM Services, Assessment and Consulting Services, System Integration, SLA Support, and Managed Services.

We are seeking a highly skilled dynamic Engineers to join our Identity team. As an IGA/IAM Implementation Engineer, you will be key in designing, implementing, and maintaining Identity and Access Management solutions for our customers. You will work closely with both technical and non-technical stakeholders, you’ll participate in the work of Identity Governance and Administration architecture, refining and implementation of IGA-related processes, integrating new services, and solving upcoming challenges.

 

Core Responsibilities:

  • Design and implementation of Identity and access management (IAM) solutions.
  • Participate in requirements gathering, solution design, and documentation.
  • Customize, configure, and develop integrations per design and manage project deliverables to successful completion.
  • Collaborate with customers and your project team to assess IAM requirements and develop customized solutions.
  • Manage access controls and identity governance.
  • Troubleshoot and resolve technical, process, or data quality-related issues.

- Stay updated on industry trends and best practices in IAM.

- Ensure compliance with security standards and regulatory requirements.

 

 

Job Requirements

Job Requirements:

  • Bachelor of Computer Science or relevant.
  • Must have experience working in a customer-facing (onsite) role.
  • Experiences with the information security field or any related field.
  • Experience in dealing with databases such as MSSQL, and Oracle. etc.
  • Experience in .Net programming languages.
  • Experience working with IGA/IAM/SSO technologies.
  • Experience and understanding of IAM concepts and best practices, such as Identity Lifecycle, Roles, RBAC, Segregations of Duty, workflow development, privileged access, and others.
  • Troubleshoot, identify and resolve technical identity and access management-related issues.
  • A high level of attention to detail and accuracy is required.
  • Ability to communicate clearly and concisely (both written and verbal, presentation, and interpersonal skills) to effectively communicate in English.
  • Familiar with common enterprise applications and infrastructure such as Active Directory, RDBMS, ERP, Exchange, Authentication solutions, PKI concepts, and Integration protocols such as RESTFUL, SOAP, and SCIM

Featured Jobs

Similar Jobs

Search other opportunities
JobsIT/Software DevelopmentCyber Security Consultant
Employers and Recruiters, go to our RECRUITMENT SERVICES.
Members Directory:
abcdefghijklmnopqrstuvwxyz#

Links

BlogAbout UsRecruitment ServicesRSSJobs in Saudi ArabiaJobs in UAEJob DescriptionsPartnersSitemapContact UsPrivacy, Cookies, Terms & Conditionsوظائف مصر
© 2025 WUZZUF. All Rights Reserved. Owned by BasharSoft LLC.