JobsAisle
D

Cybersecurity IAM Sr. Manager

Dammam Airports Company

Dammam, Saudi ArabiaSAR 16,667-25,000/moToday
Saudi ArabiaIT & TechnologyFull Time

Skills Required

ExcelErpLeadership

Job Description

<div><p><b>Job Purpose:</b></p><p>Lead and oversee Identity and Access Management (IAM) initiatives for both IT and OT environments. The IAM Senior Manager in Information Security optimizes and manages identities and access for individuals and entities by implementing identification, authentication, authorization, permissions, and privileged access controls. This includes overseeing Bring Your Own Device (BYOD) policies, access rights, and user account systems and processes. The role ensures strict enforcement of cybersecurity standards and compliance while safeguarding data protection and managing privileged access.</p><p><b>Position Accountability Description</b></p><h3>Strategic Leadership</h3><ol><li>Develop and implement a strategic IAM (Identity and Access Management) roadmap aligned with the organization's cybersecurity goals, ensuring robust access control and cybersecurity measures across all systems and applications.</li><li>Oversee daily operations by managing team activities, resolving issues, and ensuring adherence to IAM policies, ensuring smooth and efficient departmental functioning.</li><li>Establish and monitor key performance indicators (KPIs) to measure the effectiveness of IAM processes and drive continuous improvement in access control, compliance, and cybersecurity.</li></ol><h3>Operational Excellence</h3><ol><li>Manage daily operations by overseeing team activities related to IAM, resolving issues, and ensuring adherence to policies, thereby maintaining smooth and efficient departmental functioning and minimizing disruptions.</li><li>Monitor and evaluate user provisioning processes and access request workflows, ensuring timely and accurate execution, and reducing the risk of errors or unauthorized access, thus optimizing operational efficiency.</li><li>Lead the regular review and update of access control policies and procedures, ensuring they remain aligned with industry best practices and organizational needs, to maintain a robust and efficient IAM framework.</li><li>Lead ongoing access reviews and certifications, ensuring that permissions and access rights are correctly aligned with current roles and responsibilities, reducing unnecessary access and improving overall system cybersecurity.</li><li>Manage the optimization of IAM technologies and tools by staying informed about the latest industry trends and integrating advanced solutions to enhance operational efficiency, cybersecurity, and user experience.</li><li>Guide the definition, establishment and maintenance the Identity and Access Management solutions.</li><li>Manage and execute identities and roles based on approved Segregation of duties (SoD) business Matrix.</li><li>Oversee Identity Governance and Administration (IGA) by ensuring the implementation and maintenance of effective policies, procedures, and technologies that manage user identities, roles, and access rights across the organization. Ensure compliance with regulatory requirements and internal cybersecurity standards while optimizing the lifecycle of user access.</li><li>Manage ERP Governance, Risk, and Compliance (GRC) access controls by implementing and monitoring cybersecurity measures that safeguard sensitive enterprise resource planning (ERP) systems. This includes defining user roles, enforcing segregation of duties, and ensuring alignment with corporate governance policies to mitigate risk.</li><li>Lead access control and Identity Management efforts, ensuring the seamless integration of systems that authenticate, authorize, and monitor user activities. Oversee the design and enforcement of access policies, maintaining the cybersecurity of critical assets by regulating and monitoring privileged access and permissions across IT and OT environments.</li><li>Review IAM update reports prepared for management, ensuring they accurately reflect the current status of identity and access management initiatives, compliance levels, and risk exposure. Provide insights and recommendations to senior leadership for continuous improvement and strategic decision-making.</li><li>Ensure that the IAM strategy is embedded in the various cybersecurity domains.</li><li>Define, establish, and maintain the Identity&Access Management (IAM) solutions architecture in a holistic manner, with coverage across technology, process, and people components.</li><li>Manage the Design, implementation&monitoring of ERP cybersecurity processes and authorization concepts.</li><li>Manage day-to-day support of ERP GRC (Governance Risk&Compliance) Access Controls.</li><li>Lead the enhancement process for the Identity Access Management (IAM) solutions.</li></ol><h3>Stakeholder Management</h3><ol><li>Build and maintain strong relationships with internal and external stakeholders, including IT, cybersecurity, and compliance teams, to ensure effective collaboration on IAM initiatives.</li><li>Collaborate with vendors and service providers to ensure IAM solutions meet organizational requirements and indust