āļāļĢāļ°āļāļēāļĻāļāļēāļāļāļĩāđāļŦāļĄāļāļāļēāļĒāļļāđāļĨāđāļ§
IT Identity & Access Management Architect
āļāļĩāđāļāļđāļāļāļīāđāļĄāļāļāđāđāļāļĒ āļāļģāļāļąāļ (āļĄāļŦāļēāļāļ)Job Summary:
Identity & access management provides specialized technical services and advisories in IAM solutions, specifically on the directory areas like Active Directory, Azure AD, AD Federation Services and Azure AD Connect.
Responsibilities:
- Identify and resolve gaps in the business processes which may include security/authorization set-up, user documentation, data interface design, data migration and reconciliation.
- Use Active Directory knowledge to manage access entitlements between diverse systems on prem/cloud.
- Maintain business Roles and all associated data, rules including access bundling rules, and processes.
- Serve as a trusted adviser to the business stakeholders and understand their core business processes, business priorities which can be enhanced using Identity management solutions.
- Provide Identity and access management advisory, solution architecture, and consulting to internal projects of varying size.
- Drive organization wide strategy and implementation plans including but not limited to Privileged Access Management, Single Sign on and IAM governance.
- Definition of Authorization Using Authorization Strategies.
- Define and implement long term sourcing strategy, KPIs.
- Assist in alignment of overall security governance as it relates to IAM with IT architecture governance and project and portfolio management (PMO).
- Manage the workflow within IAM including access provisioning, compliance, access management (including privileged accounts) and other functions in Information security.
- Integrate the IAM solutions with SIEM solutions to log and monitor security exceptions.
- Plan and manage Access Certification, RBAC & SoD related initiatives.
Qualifications:
- Bachelor's or Master's degrees in Computer Engineering, Computer Science, Information Technology or related fields.
- Achieve a minimum GPA of 2.70 for a bachelor's degree and 3.30 for a master's degree.
- TOEIC at least 550/IELTS at least 4.0/TOEFL at least 31/BULATS at least 40.
- Having knowledges as below,
- Active Directory
- Azure (B2B, B2C)
- Authentication method and Protocal such as LDAP, SAML, OAuth, OpenID Connect, MFA, Passkey, FIDO, Secure Token, Password less.
- Authorization such as Attribute-Based Access Control (ABAC) and Authorization, Role-Based Access Control (RBAC) and Authorization, Relationship-Based Access Control (ReBAC) and Authorization.
- New technology and security services.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĩāđāļāļģāđāļāđāļ
- āđāļĄāđāļĢāļ°āļāļļāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļąāđāļāļāđāļģ
āļĢāļ°āļāļąāļāļāļģāđāļŦāļāđāļāļāļēāļ
- āļĢāļ°āļāļąāļāđāļāđāļēāļŦāļāđāļēāļāļĩāđ
āđāļāļīāļāđāļāļ·āļāļ
- 30,000 - 65,000 THB
āļŠāļēāļĒāļāļēāļ
- āđāļāļāļĩ / āđāļāļĩāļĒāļāđāļāļĢāđāļāļĢāļĄ
āļāļĢāļ°āđāļ āļāļāļēāļ
- āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļīāļĐāļąāļ
āđāļāļŠāļāļĩāļāļĩāļĄāļļāđāļāļĄāļąāđāļāļŠāļĢāđāļēāļāļŠāļĢāļĢāļāđāļāļ§āļąāļāļāļĢāļĢāļĄāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļēāļĢ āđāļāļ·āđāļāļāļāļāļŠāļāļāļāļāļ§āļēāļĄāļāđāļāļāļāļēāļĢāļāļāļāļāļđāđāļāļĢāļīāđāļ āļāđāļāļāļļāļāļĒāļļāļāļāļļāļāļŠāļĄāļąāļĒ āļŠāļĢāđāļēāļāļāļļāļāļ āļēāļāļāļĩāļ§āļīāļāļāļĩāđāļāļĩāđāļŦāđāļāļąāļāļāļāđāļāļŠāļąāļāļāļĄāđāļĨāļ°āļŠāļīāđāļāđāļ§āļāļĨāđāļāļĄāļāļĩāđāļĒāļąāđāļāļĒāļ·āļāļĄāļēāļāļĨāļāļāļĻāļāļ§āļĢāļĢāļĐ āļāđāļēāļāļāļēāļĢāļāđāļāļāļ§āđāļēāļ§āļīāļāļąāļĒāđāļĨāļ°āļāļąāļāļāļēāļāļāđāļāļīāļāļāļ§āļąāļāļāļĢāļĢāļĄāđāļāļāđāļāđāļĨāļĒāļĩāđāļāļāļĢāļ°āļāļ§āļāļāļēāļĢāļāļĨāļīāļ āļāļ§āļąāļāļāļĢāļĢāļĄāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļēāļĢāļāđāļēāļāđ āđāļāļ·āđāļāđāļāđāļāļāļēāļāđāļĨāļ·āļāļāđāļŦāđāļĨāļđāļāļāđāļēāļāļąāđ ...
āļĢāđāļ§āļĄāļāļēāļāļāļąāļāđāļĢāļē: āđāļāļĢāļēāļ°āļ§āđāļēāļŦāļąāļ§āđāļāļāļāļāļ§āļąāļāļāļāļĢāļĢāļĄāļāļāļāđāļāļĢ āļāļ·āļ āļāļāđāļāļŠāļāļĩāļāļĩ āļŦāļĢāļ·āļ SCG People āļāļĩāđāļĒāļķāļāļĄāļąāđāļāđāļĨāļ°āļāļāļīāļāļąāļāļīāļāļēāļĄāļāļļāļāļĄāļāļēāļĢāļāđ 4 āđāļĨāļ°āđāļāđāļāļāļ Open & Challenge āđāļāļ·āđāļāđāļāđāļāļāļēāļĢāļŠāļĢāđāļēāļāļāļ·āđāļāđāļŠāļĩāļĒāļ āļāļāļāļāļāļāđāļāļĢāđāļŦāđāđāļāđāļāļāļĩāđāļĒāļāļĄāļĢāļąāļāđāļāļ āļđāļĄāļīāļ āļēāļāļāļēāđāļāļĩāļĒāļ āđāļāļāļēāļāļ°āļāļāļāđāļāļĢāđāļŦāđāļāļāļ§āļąāļāļāļĢāļĢāļĄāļāļĩāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāđāļĨāļ°āđāļāđāļāđāļāļāļāļĒāđāļēāļāļāđāļēāļāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨ āđāļĨāļ°āļāļēāļĢāļāļąāļāļāļēāļāļĒāđāļēāļāļĒāļąāđāļāļĒāļ·āļāļāļēāļĄāļ§āļīāļŠāļąāļĒāļāļąāļĻāļāđ ... āļāđāļēāļāļāđāļ
āļŠāļ§āļąāļŠāļāļīāļāļēāļĢ
- āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ
- āļāļģāļāļēāļ 5 āļ§āļąāļ/āļŠāļąāļāļāļēāļŦāđ
- āļāļąāđāļ§āđāļĄāļāļāļģāļāļēāļāļĒāļ·āļāļŦāļĒāļļāđāļ
- āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ
- āļāđāļēāđāļāļīāļāļāļēāļ
- āđāļāļāļąāļŠāļāļķāđāļāļāļĒāļđāđāļāļąāļāļāļĨāļāļēāļ
- āļāļĢāļ°āļāļąāļāļāļąāļāļāļāļĢāļĢāļĄ