Identity Security Consultant at VAM Systems
Doha, Doha, Qatar -
Full Time


Start Date

Immediate

Expiry Date

04 Jul, 26

Salary

0.0

Posted On

05 Apr, 26

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Active Directory, Microsoft Entra ID, Identity Security, PAM, PIM, Conditional Access, MFA, Identity Protection, SOC, Incident Response, Threat Detection, Cyberark, Sailpoint, Zero Trust, Security Engineering, Root-cause Analysis

Industry

IT Services and IT Consulting

Description
Job Description We are currently looking Identity Security Consultant our Qatar operations. Required Experience & Skills 8+ years in Identity Security / Security Engineering Deep hands‑on experience with: Active Directory security Microsoft Entra ID security Conditional Access, MFA, Identity Protection Strong PAM / PIM implementation experience SOC‑level understanding of identity attack detection and response Strong troubleshooting and root‑cause analysis skills Excellent written and verbal communication skills Core Responsibilities Own identity security engineering across Active Directory (on‑prem) and Microsoft Entra ID Design, implement, and harden identity security configurations Act as technical authority for identity threat prevention, detection, and response Bridge Identity Engineering and SOC / Incident Response Mitigate Red team findings Active Directory Security (On‑Prem) Secure AD DS architecture and configurations Implement and enforce AD Tiering model (Tier 0 / Tier 1 / Tier 2) Protect Tier‑0 assets (Domain Controllers, PKI, ADFS, Entra Connect) Harden: Kerberos authentication NTLM usage and restrictions Delegation (constrained, resource‑based) GPOs for security baselines Manage privileged groups and admin separation Secure trust relationships and forest/domain boundaries Implement PAW / SAW / hardened admin access patterns Review and remediate AD attack paths and misconfigurations Entra ID (Azure AD) Security Design and enforce Conditional Access policies Implement strong authentication strategies (MFA, passwordless, phishing‑resistant MFA) Configure and monitor Entra ID Identity Protection Harden tenant security posture and reduce identity attack surface Control and monitor: Legacy authentication OAuth app permissions and consent Authentication methods and user flows Govern roles, service principals, and app registrations Secure Entra ID Connect / Cloud Sync architecture Privileged Access Management (PAM / PIM) Design and implement least‑privilege access models Understand and work with Cyberark integrations, Sailpoint etc. Implement and operationalize Entra PIM: Just‑In‑Time role activation Approval workflows Role eligibility governance Access reviews and alerts Identity Threat & Attack Chain Expertise Deep understanding of identity‑based attacks, including: Credential theft and replay Pass‑the‑Hash / Pass‑the‑Ticket Kerberoasting / AS‑REP roasting DCSync / DCShadow Golden and Silver Ticket attacks Privilege escalation and lateral movement Persistence mechanisms in AD and Entra ID OAuth token abuse and app consent attacks MFA fatigue and authentication bypass techniques Map attacker techniques to prevention, detection, and remediation controls SOC Integration & Detection Engineering Work closely with SOC teams on identity‑related threats Define and improve identity detection use‑cases Ensure logging and visibility for: Windows Security Event Logs Entra ID audit and sign‑in logs Integrate identity telemetry with SIEM / SOAR platforms Tune alerts to reduce false positives and improve signal quality Build and maintain identity incident response playbooks Support investigations of compromised accounts and privilege abuse Hardening, Assessments & Continuous Improvement Perform AD and Entra ID security posture assessments Identify configuration drift, technical debt, and risk exposure Deliver remediation plans and track closure Drive continuous identity security improvement initiatives Align identity security posture with Zero Trust principles Governance, Risk & Compliance Ensure identity controls meet internal security standards and regulatory requirements Support audit and risk assessments related to identity and access Provide evidence, documentation, and technical justifications Participate in design and security review boards Documentation & Knowledge Transfer Produce clear, audit‑ready documentation: Identity architecture diagrams Security standards and configuration baselines SOPs and operational runbooks Incident response procedures Provide knowledge transfer and guidance to internal teams Joining time frame: 2 weeks (maximum 1 month)
Responsibilities
The consultant will own identity security engineering for Active Directory and Microsoft Entra ID, designing and hardening configurations to prevent and detect threats. They will also bridge the gap between identity engineering and SOC teams to mitigate risks and ensure compliance with security standards.
Loading...