← Back
Group Specialist - Identity Access Control
Company: dpworld
Location: Bangalore, Karnataka, India
Source: oracle
Language: english
<figure class="table"><table style="border-collapse:collapse;border:none;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><h3 style="margin:6.0pt 0cm;"><span style="color:black;font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>KEY ACCOUNTABILITIES</strong></span></span></h3></td></tr><tr style="height:40.0pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:40.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p style="text-align:justify;"> </p><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Develop, review & update access management procedure that can be followed by Group Technology, other business departments & regional technology teams</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Design, implement, and enhance enterprise IAM architecture and engineering solutions with a focus on SailPoint and PAM platforms. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Build scalable identity governance and administration capabilities for workforce identities, including employees, contractors, and third-party users. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Define and maintain IAM standards, design patterns, integration patterns, and operational procedures. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Partner with cybersecurity architecture and enterprise technology teams to ensure IAM solutions are secure, scalable, and aligned with enterprise standards.Liaise with Application Governance Specialist to understand the applications, access provisioning mechanisms etc. for each application</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Assist BUs in conducting access control reviews of their applications & systems</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Lead and support onboarding of enterprise applications into SailPoint for access provisioning, deprovisioning, access requests, certification, and role-based governance. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Design and implement connectors, workflows, rules, roles, policies, and provisioning integrations in SailPoint. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Integrate SailPoint with target systems such as Active Directory, Azure AD/Entra ID, LDAP, databases, cloud platforms, business applications, and custom applications. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Work with application owners to define birthright access, approval workflows, entitlement models, RBAC, and SoD controls. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Ensure accurate reconciliation of accounts, entitlements, and access data across onboarded applications. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong hands-on experience in Identity and Access Management (IAM) engineering and delivery. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Proven experience with SailPoint (IdentityIQ, IdentityNow, or equivalent SailPoint platform). </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong experience in Privileged Access Management (PAM) platforms such as CyberArk, BeyondTrust, Delinea, or similar. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience integrating HRMS systems with IAM platforms to automate Joiner, Mover, Leaver lifecycle processes. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong understanding of RBAC, ABAC, SoD, access request workflows, certification, provisioning, reconciliation, and identity lifecycle management. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience onboarding applications to IAM tools using APIs, connectors, SCIM, JDBC, LDAP, AD, REST, SOAP, or custom integration methods. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience managing privileged accounts including vaulting, password rotation, session monitoring, and least privilege controls. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Knowledge of Active Directory, Azure AD/Entra ID, LDAP, MFA, SSO, federation, service accounts, cloud identities, and enterprise application authentication models. </span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;">Scripting or development capability in Java, BeanShell, PowerShell, Python, SQL, or similar for automation and integration is preferred.</span><span style="font-size:10.0pt;" lang="EN-GB">Act as an ambassador for DP World at all times when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies</span></span></p></li></ul></td></tr></tbody></table></figure><figure class="table"><table style="border-collapse:collapse;border:none;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr style="height:11.7pt;"><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;height:11.7pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p class="Tablehead" style="margin:3.0pt 0cm;text-align:left;" align="left"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>QUALIFICATIONS, EXPERIENCE AND SKILLS</strong></span></span></p></td></tr><tr style="height:15.75pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:15.75pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Knowledge and Experience</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Bachelor’s degree in computer science or equivalent</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Should have 10-12 years of experience in IAM engineering</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience with SailPoint IdentityIQ or IdentityNow implementation and customization. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience with PAM tools such as CyberArk, BeyondTrust, Delinea, or Arcon. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Familiarity with ITSM and workflow tools such as ServiceNow. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience with cloud and hybrid identity environments. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Understanding of security architecture, zero trust principles, and access governance best practices. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Relevant certifications such as SailPoint certifications, CyberArk certifications, CISSP, CISM, or equivalent are desirable.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Program and Project management skills</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Time management skills</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Team player and conflict management skills</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Coaching / guiding skills</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Ability to adapt in a complex environment, loves challenges, with the will and drive to learn new things on his/her own</span></span></p></li></ul><p style="margin-left:18.0pt;text-align:justify;"> </p><p style="margin-left:4.3pt;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Technical Skills</strong></span></span></p><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Technical know-how about IAM & PAM engineering and implementation</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Knowledge of Active Directory, Azure AD/Entra ID, LDAP, MFA, SSO, federation, service accounts, cloud identities, and enterprise application authentication models. </span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Scripting or development capability in Java, BeanShell, PowerShell, Python, SQL, or similar for automation and integration is preferred.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Knowledge of developing policies, procedures related to access management processes</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Act as an ambassador for DP World at all times when working; promoting and demonstrating positive</span></span></p><p style="text-align:justify;"> </p></li></ul></td></tr></tbody></table></figure><p> </p><p>#LI-AA6</p>
🔥 Apply Now