Manager - Cyber Security - Identity and Access management Specialist
Abu Dhabi, AE, 136
EY
Tarjoamme palveluita, jotka auttavat ratkaisemaan asiakkaidemme vaikeimmat haasteetManager - Cyber Security- Identity and Access management Specialist
As part of our Cyber Technology Consulting team, you will lead and manage Identity and Access Management (IAM) engagements for clients across the MENA region. You will work closely with clients to design, implement, and mature IAM strategies, solutions, and governance aligned with their business and compliance needs. The client base spans various sectors and includes collaboration with other teams across Advisory services.
The opportunity
We’re looking for manager with deep expertise in IAM strategy, architecture, and implementation. This is a fantastic opportunity to join a leading firm and shape the identity security posture of regional and global organizations.
Your key responsibilities
- Lead IAM transformation programs across identity lifecycle management, access governance, privileged access management (PAM), single sign-on (SSO), and multi-factor authentication (MFA).
- Conduct maturity assessments, define IAM roadmaps, and develop IAM operating models aligned with regulatory and business requirements.
- Oversee the implementation and integration of IAM platforms (e.g., SailPoint, Saviynt, MS Entra CyberArk, Okta, Ping, Oracle IAM).
- Work with stakeholders across IT, security and business functions to establish effective IAM governance and role-based access controls (RBAC).
- Conduct access risk reviews, identity attestation processes, and support audit and compliance initiatives.
- Ensure alignment with global IAM standards and security frameworks (e.g., NIST, ISO 27001, Zero Trust, CIS Controls).
- Manage engagement delivery, resourcing, quality assurance, and client satisfaction.
- Develop detailed reports, articulate technical findings, and deliver actionable recommendations to both technical teams and executive stakeholders.
- Manage multiple engagements, ensuring timely delivery, quality assurance, and adherence to industry best practices.
- Mentor and coach junior team members, fostering their technical and professional development.
Skills and attributes for success
- Strong understanding of IAM principles including identity lifecycle, authentication, federation, authorization, and access certification.
- Experience leading complex IAM engagements with cross-functional teams and third-party vendors.
- Ability to articulate technical IAM solutions to both technical and non-technical stakeholders.
- Proficiency in IAM tools and platforms such as CyberArk, SailPoint, Saviynt, MS Entra, Okta, Azure AD, or Oracle IAM.
- Ability to define role-based access controls (RBAC) and Segregation of Duties (SoD) for business applications
- Strong grasp of regulatory IAM requirements
- Experience with cloud IAM models
- Excellent communication, analytical, and problem-solving skills.
- Collaborating with other members of the engagement team to plan the engagement and develop work program timelines, risk assessments and other documents/templates.
- Ability to interpret complex technical results and present insights to business stakeholders.
- Strong analytical, problem-solving, and critical-thinking skills.
- Excellent communication and collaboration skills
To qualify for the role, you must have
- A bachelor's or master’s degree in information technology, cyber security etc.
- Excellent communication skills with a consulting mindset.
- 6-7 years of experience in IAM domain
- A valid passport for travel.
- Excellent communication skills with a consulting mindset.
Ideally, you’ll also have
- Industry-recognized certifications such as CISSP, CISM, IAM certs such as SailPoint Certified IdentityNow/IdentityIQ, Saviynt IGA Professional, Saviynt PAM Professional, CyberArk Defender/Sentry, or Okta Certified Professional.
- Experience with Zero Trust architecture and cloud-native IAM solutions.
- Familiarity with automation, DevSecOps, and identity governance integration in CI/CD pipelines.
- Exposure to customer IAM (CIAM) and identity threat detection.
What we offer
We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
The exceptional EY experience. It’s yours to build.
EY | Building a better working world
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Azure CI/CD CISM CISSP Cloud Compliance Cyberark DevSecOps Governance IAM ISO 27001 NIST Okta Oracle Risk assessment SailPoint SSO Strategy Threat detection Zero Trust
Perks/benefits: Career development Competitive pay
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.