Microsoft IAM Desired scope:
- Design, deploy, and manage IAM solutions within the Microsoft environment, including Azure AD, Active Directory, and related technologies.
- Help manage and enhance secure and scalable access controls, authentication mechanisms, and identity lifecycle management.
- Collaborate with security teams
- To ensure the integration of IAM controls into overall security strategies and practices.
- Integration of federation solutions to enable secure and seamless access across multiple domains and applications.
- Provide technical expertise and support for IAM-related initiatives.
- Incident Response and Troubleshooting:
- Respond to IAM-related incidents promptly, conducting troubleshooting and root cause analysis.
- Implement corrective measures to address identified issues.
Documentation and Training:
- Create and maintain comprehensive documentation for IAM solutions, configurations, and procedures
- Provide training and guidance to IT and support teams on IAM best practices.
Qualifications and Skills for screening:
- Bachelor's degree in Information Technology, Computer Science, or a related field.
- 5-7 years of experience in a Microsoft IAM role, with a focus on Azure AD, Active Directory, and related technologies.
- Microsoft certifications such as Azure Identity and Access Management, Microsoft Certified: Identity and Access Administrator Associate, or equivalent.
- Strong understanding of IAM principles, access controls, and authentication mechanisms.
- Experience with PowerShell scripting for automation and configuration.
- Familiarity with IAM-related compliance standards and regulatory requirements.
- Excellent communication and collaboration skills.
Top Skills
What We Do
We are a team of experts in cybersecurity, who specialize in protecting information assets against threats, both from inside the organization and outside. We partner with your organization to understand your specific concerns and craft a cybersecurity strategy designed specifically for your business and your specific needs. All of our experts come with 15+ years of information risk management experience in the Fortune 500 space. You can count on us to guide you throughout the process, and help you with your cybersecurity concerns. Our specialty includes - Cybersecurity - Zero Trust - Perimeter-less Security - Workforce Identity and Access Management - Consumer/Customer Identity and Access Management.
.png)







