Qureos

Find The RightJob.

Security Operations Officer Data Security Specialist

Job Responsibilities:


IAM Implementation & Operations

• Deploy and configure enterprise IAM solutions (SSO, MFA, Federation, Azure Entra ID, SailPoint etc).

• Implement and manage IAM architectures for GCP (Cloud Identity, IAM, Workforce Identity Federation, Workload Identity Federation, Identity-Aware Proxy).

• Implement and manage IAM architectures for Azure (Entra ID, Conditional Access, Privileged Identity Management, Entitlement Management, Identity Protection).

• Contribute technical input to IAM roadmaps and architecture decisions.

• Support Zero Trust architecture implementations and adaptive authentication deployments.

• Integrate IAM solutions across on-premises IT and Operational Technology (OT) environments.

• Conduct regular access reviews to prevent privilege creep.

Priveleged Access Management

• Implement and administer PAM solutions

• Secure privileged accounts and enforce Just-In-Time (JIT) models for privileged accounts.

• Configure privileged session management, recording, and monitoring.

• Conduct periodic privileged account reviews and attestations.

• Manage break-glass emergency access procedures.

Identity Lifeccyle Management:

• Automate identity lifecycle management including joiner-mover-leaver processes.

• Implement automated provisioning and de-provisioning workflows across applications and systems.

• Configure Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) models.

Identity Governance & Administration (IGA):

• Deploy and manage IGA platforms.

• Configure access certification campaigns and periodic access reviews.

• Implement Segregation of Duties (SoD) policies and conflict detection.

• Generate compliance reports and audit trails for regulatory requirements

Cloud IAM Integration

• Integrate IAM solutions across multi-cloud environments (AWS IAM, Azure Entra ID, GCP Cloud Identity).

• Configure cross-cloud identity federation and single sign-on.

Governance & Collaboration

• Generate IAM metrics, dashboards, and KPIs for executive reporting.

• Monitor identity risk scores and implement risk-based access controls.

• Identify and remediate IAM-related risks and control gaps.

• Support incident response and investigations related to IAM and PAM.

• Generate IAM metrics, dashboards, and audit reports for compliance and governance.

• Ensure IAM policies, standards, and regulatory compliance requirements (ISO 27001, Qatar NIA, QCSF, PDPPL etc ) are consistently enforced.

• Collaborate with application owners, infrastructure teams, and business units on IAM requirements.

© 2026 Qureos. All rights reserved.