Identity Fabric Principal

Brak informacji o wynagrodzeniu
SeniorFull-time·B2B
#340092·Dodano dziś·0
Źródło: Qualco Group
Aplikuj teraz

Tech Stack / Keywords

AICloudCybersecurityAPISecurityPowerShellCI/CDITSM

Firma i stanowisko

At Quento, the ICT arm of the Qualco Group, we deliver comprehensive and innovative solutions across AI, Digital Engineering, Cloud, and Cybersecurity, helping businesses accelerate digital transformation. With a presence in Greece, Luxembourg, and Belgium, and backed by the expertise of the Qualco Group, we combine deep technical knowledge with strategic partnerships to support business growth.


Wymagania

  • Bachelor's degree
  • Minimum 10 years of IT professional experience
  • Minimum 8 years of experience in similar position
  • Hybrid environment readiness: ability to operate with AD DS/AD FS dependencies and modernize pragmatically without disrupting services
  • Automation-by-default: preference for repeatable delivery via PowerShell and controlled processes (CI/CD and/or ITSM where applicable)
  • Compliance-oriented design: ability to design/operate IAM controls aligned with GDPR/EUDPR and internal audit expectations (traceability and evidence)
  • IGA alignment: capability to deliver governance outcomes with SailPoint and align them with Microsoft identity patterns
  • Future-proofing: readiness to cover AI/agent identities and access controls using least privilege and clear governance
  • Token & session security: knowledge of token/session lifecycles (issuance, validation, lifetimes, refresh tokens), plus common risks and mitigations
  • API permissions & consent: understanding and practical application of scopes vs roles, delegated vs application permissions, and admin/incremental consent models
  • Entra External ID patterns: practical knowledge of CIAM/B2B/B2C onboarding patterns and UX vs security trade-offs
  • Hybrid identity foundations (AD DS): solid understanding of domains/forests, trusts, OU/GPO, delegation and how AD DS impacts hybrid identity
  • SailPoint IGA exposure: practical experience with SailPoint IdentityIQ and/or IdentityNow concepts, delivery model and outcomes
  • Provisioning & lifecycle integrations: experience with SCIM, authoritative sources, reconciliation, and JIT vs managed provisioning trade-offs
  • GDPR/EUDPR + AI readiness: ability to apply privacy-by-design in IAM (minimisation, purpose, retention, token/claim hygiene, auditability) and extend governance to AI/agent access where required
  • Flow implementation & troubleshooting: ability to implement and debug Auth Code + PKCE, Device Code, Client Credentials and OBO flows in real applications
  • Claims & identity context: ability to design claim sets, mapping/normalization across IdPs, least-privilege claims, and handle group/role overage patterns
  • Federation operations: experience configuring IdP/SP integrations, metadata management, rollover planning, and resolving common SSO failures
  • Assurance & risk-based access: capability to apply step-up patterns, MFA trust models, phishing-resistant readiness, and Conditional Access alignment to sensitivity
  • Microsoft Entra ID delivery: hands-on experience with Entra ID tenant configuration, authentication posture, and operational governance
  • Conditional Access & Identity Protection: experience designing/tuning CA policies, MFA enforcement, risk signals, exclusions/break-glass, and safe rollout practices
  • Entra ID Governance: working capability with access packages, entitlement management, access reviews, and lifecycle workflows in delivery contexts
  • App integration engineering: strong experience with Enterprise Apps, App Registrations, service principals, managed identities, and integration support
  • Federation legacy (AD FS): ability to operate/troubleshoot AD FS (claims rules, relying parties) and contribute to modernization planning
  • PowerShell automation (Entra/M365): ability to automate reporting and bulk ops using Microsoft Graph PowerShell and relevant modules with reliable logging
  • PowerShell (AD DS/AD FS): capability to script user/group operations and operational reporting/troubleshooting within governance constraints
  • IGA process delivery: ability to implement JML, access requests/approvals, certifications/reviews, SoD concepts, and role/entitlement modeling
  • Very good knowledge of the English language (B2).

Obowiązki

  • Support project teams in implementing and troubleshooting auth flows (Auth Code + PKCE, Device Code, Client Credentials, OBO), including edge cases and production incidents
  • Review and harden token/session configurations (lifetimes, refresh behaviour, session controls) and advise on mitigations for common auth threats (replay, token theft)
  • Design and standardize claims/attributes strategy (least-privilege claims, normalization across IdPs, group/role overage handling) for scalable integrations
  • Define API access models and permission strategy (scopes vs roles, delegated vs app permissions) and govern consent patterns (admin/incremental) for least privilege and auditability
  • Configure and operate federation integrations (IdP/SP), including metadata management, planned rollovers, and resolving common SSO issues
  • Design risk-based access controls and step-up patterns aligned to application sensitivity, using Conditional Access and appropriate MFA/authentication strength
  • Deliver Entra ID tenant-level configurations and operational posture improvements (baseline configuration, governance touchpoints, operational practices)
  • Design and guide external identity onboarding patterns (Entra External ID CIAM/B2B/B2C), balancing UX, security controls, and supportability
  • Build, tune and safely roll out Conditional Access / Identity Protection policies (exclusions, break-glass, staged deployment, monitoring and rollback approach)
  • Implement and operate Entra ID Governance capabilities (access packages, entitlement management, access reviews, lifecycle workflows) in alignment with delivery timelines
  • Provide application onboarding and integration support (Enterprise Apps, App Registrations, service principals, managed identities), including troubleshooting and configuration reviews
  • Support hybrid identity dependencies involving AD DS (directory design impacts, group structures, delegation models) and advise on sustainable hybrid patterns
  • Operate and troubleshoot AD FS where still required, and contribute to modernization roadmaps toward cloud-native federation patterns
  • Develop and maintain PowerShell automation for identity operations (Graph PowerShell and relevant modules): reporting, bulk changes, baseline checks, and repeatable tasks with robust logging
  • Provide scripted operational support for AD DS/AD FS (user/group lifecycle tasks, reporting, troubleshooting accelerators) within governance and access boundaries
  • Participate in SailPoint-based IGA delivery (IdentityIQ/IdentityNow): requirements translation, design validation, and alignment of governance outcomes with Microsoft identity patterns
  • Implement IGA processes end-to-end (JML, access requests/approvals, certifications/reviews, SoD, role/entitlement modeling) and integrate with delivery/operations
  • Design and improve provisioning and lifecycle integrations (SCIM, authoritative sources, reconciliation, JIT vs managed provisioning), ensuring clean offboarding and access hygiene
  • Embed GDPR/EUDPR requirements into IAM delivery (minimization, purpose, retention, auditability, token/claim hygiene) and extend governance to AI/agent access where applicable
  • Ensure all activities and duties comply with regulatory requirements and support the Group Anti-Bribery and Corruption Policy.

Oferta

  • This role is an on-site opportunity in Poland
  • CV submitted in English
  • Equal opportunity employer regardless of race, gender identity and expression, age, ethnicity, or disability

Inne informacje

  • This role is an on-site opportunity in Poland
  • CV must be submitted in English
  • Quento collects and processes personal data in accordance with the EU General Data Protection Regulation (GDPR) for recruitment purposes only
Qualco Group

Qualco Group

3 aktywne oferty

Zobacz wszystkie oferty
Aplikuj teraz