Identity Security Consultant
About This Role
Job Description
We are currently looking Identity Security Consultant our Qatar operations.
Required Experience & Skills
- 8+ years in Identity Security / Security Engineering
- Deep hands‑on experience with:
- Active Directory security
- Microsoft Entra ID security
- Conditional Access, MFA, Identity Protection
- Strong PAM / PIM implementation experience
- SOC‑level understanding of identity attack detection and response
- Strong troubleshooting and root‑cause analysis skills
- Excellent written and verbal communication skills
Core Responsibilities
- Own identity security engineering across Active Directory (on‑prem) and Microsoft Entra ID
- Design, implement, and harden identity security configurations
- Act as technical authority for identity threat prevention, detection, and response
- Bridge Identity Engineering and SOC / Incident Response
- Mitigate Red team findings
- Active Directory Security (On‑Prem)
- Secure AD DS architecture and configurations
- Implement and enforce AD Tiering model (Tier 0 / Tier 1 / Tier 2)
- Protect Tier‑0 assets (Domain Controllers, PKI, ADFS, Entra Connect)
- Harden:
- Kerberos authentication
- NTLM usage and restrictions
- Delegation (constrained, resource‑based)
- GPOs for security baselines
- Manage privileged groups and admin separation
- Secure trust relationships and forest/domain boundaries
- Implement PAW / SAW / hardened admin access patterns
- Review and remediate AD attack paths and misconfigurations
Entra ID (Azure AD) Security
- Design and enforce Conditional Access policies
- Implement strong authentication strategies (MFA, passwordless, phishing‑resistant MFA)
- Configure and monitor Entra ID Identity Protection
- Harden tenant security posture and reduce identity attack surface
- Control and monitor:
- Legacy authentication
- OAuth app permissions and consent
- Authentication methods and user flows
- Govern roles, service principals, and app registrations
- Secure Entra ID Connect / Cloud Sync architecture
Privileged Access Management (PAM / PIM)
- Design and implement least‑privilege access models
- Understand and work with Cyberark integrations, Sailpoint etc.
- Implement and operationalize Entra PIM:
- Just‑In‑Time role activation
- Approval workflows
- Role eligibility governance
- Access reviews and alerts
- Identity Threat & Attack Chain Expertise
Deep understanding of identity**‑**based attacks, including:
- Credential theft and replay
- Pass‑the‑Hash / Pass‑the‑Ticket
- Kerberoasting / AS‑REP roasting
- DCSync / DCShadow
- Golden and Silver Ticket attacks
- Privilege escalation and lateral movement
- Persistence mechanisms in AD and Entra ID
- OAuth token abuse and app consent attacks
- MFA fatigue and authentication bypass techniques
- Map attacker techniques to prevention, detection, and remediation controls
SOC Integration & Detection Engineering
- Work closely with SOC teams on identity‑related threats
- Define and improve identity detection use‑cases
- Ensure logging and visibility for:
- Windows Security Event Logs
- Entra ID audit and sign‑in logs
- Integrate identity telemetry with SIEM / SOAR platforms
- Tune alerts to reduce false positives and improve signal quality
- Build and maintain identity incident response playbooks
- Support investigations of compromised accounts and privilege abuse
Hardening, Assessments & Continuous Improvement
- Perform AD and Entra ID security posture assessments
- Identify configuration drift, technical debt, and risk exposure
- Deliver remediation plans and track closure
- Drive continuous identity security improvement initiatives
- Align identity security posture with Zero Trust principles
Governance, Risk & Compliance
- Ensure identity controls meet internal security standards and regulatory requirements
- Support audit and risk assessments related to identity and access
- Provide evidence, documentation, and technical justifications
- Participate in design and security review boards
Documentation & Knowledge Transfer
- Produce clear, audit‑ready documentation:
- Identity architecture diagrams
- Security standards and configuration baselines
- SOPs and operational runbooks
- Incident response procedures
- Provide knowledge transfer and guidance to internal teams
Joining time frame: 2 weeks (maximum 1 month)
Similar Jobs
Identity Security Consultant -Active Directory security
VAM SYSTEMS · Doha
**Job Description** We are currently looking Identity Security Consultant our Qatar operations. Required Experience \& Skills * 8\+ years in Identity Security / Security Engineering * Deep hands‑on experience with: * Act
2 days ago
Generate Resume ↗Identity Security Engineer (Okta & Identity Governance) - Bangkok Based, Relocation provided
Agoda · Al Rayyan
**About Agoda** At Agoda, we bridge the world through travel. Our story began in 2005, when two lifelong friends and entrepreneurs, driven by their passion for travel, launched Agoda to make it easier for everyone to exp
4 days ago
Generate Resume ↗Identity Security Engineer (Okta & Identity Governance) - Bangkok Based, Relocation provided
Agoda · Doha
**About Agoda** At Agoda, we bridge the world through travel. Our story began in 2005, when two lifelong friends and entrepreneurs, driven by their passion for travel, launched Agoda to make it easier for everyone to exp
4 days ago
Generate Resume ↗Identity Security Consultant
Nair Systems LLC ·
Responsible for identity security engineering, implementing security configurations, and managing privileged access while ensuring compliance and risk management in the banking ...
1 weeks ago
Generate Resume ↗Identity Security Consultant - IAM/PAM
VAM SYSTEMS · Doha
**Job Description** We are currently looking Identity Security Consultant our Qatar operations. Required Experience \& Skills * 8\+ years in Identity Security / Security Engineering * Deep hands‑on experience with: penet
1 months ago
Generate Resume ↗Stop applying blindly.
Start getting hired.
Base Career automates the hardest parts of job searching — apply smarter, not harder.
AI Resume in 60s
Your resume rewritten for this exact role using the job description as the brief.
ATS-Optimized
Get past automated screening filters with the right keywords matched to each job.
Application Tracker
Track every job, follow-up, and interview in one visual kanban board.
Free plan · No credit card required