Identity Security Consultant
- Full-time
Job Description
We are currently looking Identity Security Consultant our Qatar operations.
Required Experience & Skills
- 8+ years in Identity Security / Security Engineering
- Deep hands‑on experience with:
- Active Directory security
- Microsoft Entra ID security
- Conditional Access, MFA, Identity Protection
- Strong PAM / PIM implementation experience
- SOC‑level understanding of identity attack detection and response
- Strong troubleshooting and root‑cause analysis skills
- Excellent written and verbal communication skills
Core Responsibilities
- Own identity security engineering across Active Directory (on‑prem) and Microsoft Entra ID
- Design, implement, and harden identity security configurations
- Act as technical authority for identity threat prevention, detection, and response
- Bridge Identity Engineering and SOC / Incident Response
- Mitigate Red team findings
- Active Directory Security (On‑Prem)
- Secure AD DS architecture and configurations
- Implement and enforce AD Tiering model (Tier 0 / Tier 1 / Tier 2)
- Protect Tier‑0 assets (Domain Controllers, PKI, ADFS, Entra Connect)
- Harden:
- Kerberos authentication
- NTLM usage and restrictions
- Delegation (constrained, resource‑based)
- GPOs for security baselines
- Manage privileged groups and admin separation
- Secure trust relationships and forest/domain boundaries
- Implement PAW / SAW / hardened admin access patterns
- Review and remediate AD attack paths and misconfigurations
Entra ID (Azure AD) Security
- Design and enforce Conditional Access policies
- Implement strong authentication strategies (MFA, passwordless, phishing‑resistant MFA)
- Configure and monitor Entra ID Identity Protection
- Harden tenant security posture and reduce identity attack surface
- Control and monitor:
- Legacy authentication
- OAuth app permissions and consent
- Authentication methods and user flows
- Govern roles, service principals, and app registrations
- Secure Entra ID Connect / Cloud Sync architecture
Privileged Access Management (PAM / PIM)
- Design and implement least‑privilege access models
- Understand and work with Cyberark integrations, Sailpoint etc.
- Implement and operationalize Entra PIM:
- Just‑In‑Time role activation
- Approval workflows
- Role eligibility governance
- Access reviews and alerts
- Identity Threat & Attack Chain Expertise
Deep understanding of identity‑based attacks, including:
- Credential theft and replay
- Pass‑the‑Hash / Pass‑the‑Ticket
- Kerberoasting / AS‑REP roasting
- DCSync / DCShadow
- Golden and Silver Ticket attacks
- Privilege escalation and lateral movement
- Persistence mechanisms in AD and Entra ID
- OAuth token abuse and app consent attacks
- MFA fatigue and authentication bypass techniques
- Map attacker techniques to prevention, detection, and remediation controls
SOC Integration & Detection Engineering
- Work closely with SOC teams on identity‑related threats
- Define and improve identity detection use‑cases
- Ensure logging and visibility for:
- Windows Security Event Logs
- Entra ID audit and sign‑in logs
- Integrate identity telemetry with SIEM / SOAR platforms
- Tune alerts to reduce false positives and improve signal quality
- Build and maintain identity incident response playbooks
- Support investigations of compromised accounts and privilege abuse
Hardening, Assessments & Continuous Improvement
- Perform AD and Entra ID security posture assessments
- Identify configuration drift, technical debt, and risk exposure
- Deliver remediation plans and track closure
- Drive continuous identity security improvement initiatives
- Align identity security posture with Zero Trust principles
Governance, Risk & Compliance
- Ensure identity controls meet internal security standards and regulatory requirements
- Support audit and risk assessments related to identity and access
- Provide evidence, documentation, and technical justifications
- Participate in design and security review boards
Documentation & Knowledge Transfer
- Produce clear, audit‑ready documentation:
- Identity architecture diagrams
- Security standards and configuration baselines
- SOPs and operational runbooks
- Incident response procedures
- Provide knowledge transfer and guidance to internal teams
Joining time frame: 2 weeks (maximum 1 month)