← Back to all jobs

Identity Security Consultant

Company
VAM Systems
Location
Doha
Region
Qatar
Posted
5d ago
Source
Bayt
Apply Now →

Job Description

Job Description

We are currently looking   Identity Security Consultant our Qatar operations.

Required Experience & Skills

- 8+ years in Identity Security / Security Engineering

- Deep hands‑on experience with:

- Active Directory security

- Microsoft Entra ID security

- Conditional Access, MFA, Identity Protection

- Strong PAM / PIM implementation experience

- SOC‑level understanding of identity attack detection and response

- Strong troubleshooting and root‑cause analysis skills

- Excellent written and verbal communication skills

Core Responsibilities

- Own identity security engineering across Active Directory (on‑prem) and Microsoft Entra ID

- Design, implement, and harden identity security configurations

- Act as technical authority for identity threat prevention, detection, and response

- Bridge Identity Engineering and SOC / Incident Response

- Mitigate Red team findings

- Active Directory Security (On‑Prem)

- Secure AD DS architecture and configurations

- Implement and enforce AD Tiering model (Tier 0 / Tier 1 / Tier 2)

- Protect Tier‑0 assets (Domain Controllers, PKI, ADFS, Entra Connect)

- Harden:

- Kerberos authentication

- NTLM usage and restrictions

- Delegation (constrained, resource‑based)

- GPOs for security baselines

- Manage privileged groups and admin separation

- Secure trust relationships and forest/domain boundaries

- Implement PAW / SAW / hardened admin access patterns

- Review and remediate AD attack paths and misconfigurations

Entra ID (Azure AD) Security

- Design and enforce Conditional Access policies

- Implement strong authentication strategies (MFA, passwordless, phishing‑resistant MFA)

- Configure and monitor Entra ID Identity Protection

- Harden tenant security posture and reduce identity attack surface

- Control and monitor:

- Legacy authentication

- OAuth app permissions and consent

- Authentication methods and user flows

- Govern roles, service principals, and app registrations

- Secure Entra ID Connect / Cloud Sync architecture

  Privileged Access Management (PAM / PIM)

- Design and implement least‑privilege access models

- Understand and work with Cyberark integrations, Sailpoint etc.

- Implement and operationalize Entra PIM:

- Just‑In‑Time role activation

- Approval workflows

- Role eligibility governance

- Access reviews and alerts

- Identity Threat & Attack Chain Expertise

Deep understanding of identity ‑ based attacks, including:

- Credential theft and replay

- Pass‑the‑Hash / Pass‑the‑Ticket

- Kerberoasting / AS‑REP roasting

- DCSync / DCShadow

- Golden and Silver Ticket attacks

- Privilege escalation and lateral movement

- Persistence mechanisms in AD and Entra ID

- OAuth token abuse and app consent attacks

- MFA fatigue and authentication bypass techniques

- Map attacker techniques to prevention, detection, and remediation controls

  SOC Integration & Detection Engineering

- Work closely with SOC teams on identity‑related threats

- Define and improve identity detection use‑cases

- Ensure logging and visibility for:

- Windows Security Event Logs

- Entra ID audit and sign‑in logs

- Integrate identity telemetry with SIEM / SOAR platforms

- Tune alerts to reduce false positives and improve signal quality

- Build and maintain identity incident response playbooks

- Support investigations of compromised accounts and privilege abuse

Hardening, Assessments & Continuous Improvement

- Perform AD and Entra ID security posture assessments

- Identify configuration drift, technical debt, and risk exposure

- Deliver remediation plans and track closure

- Drive continuous identity security improvement initiatives

- Align identity security posture with Zero Trust principles

 Governance, Risk & Compliance

- Ensure identity controls meet internal security standards and regulatory requirements

- Support audit and risk assessments related to identity and access

- Provide evidence, documentation, and technical justifications

- Participate in design and security review boards

 Documentation & Knowledge Transfer

- Produce clear, audit‑ready documentation:

- Identity architecture diagrams

- Security standards and configuration baselines

- SOPs and operational runbooks

- Incident response procedures

- Provide knowledge transfer and guidance to internal teams

Joining time frame: 2 weeks (maximum 1 month)

Job History

First seen
2026-04-10 22:00:01
Last verified
2026-04-11 00:00:01
← Back to all jobs