Design & implementation, depending on experience level: You design and implement identity governance processes (JML, birthright access, recertifications, request/approval workflows) in Microsoft Entra ID Governance.
Lifecycle & provisioning: Modeling identities, roles (RBAC/ABAC) and policies; integrating HR systems (e.g., SAP/Workday) and target systems via SCIM/REST/AD/Entra, including connector design.
Privileged access & compliance: Integration with PIM, logging/monitoring, and regulatory requirements (e.g., ISO 27001, SOX, NIS2/DORA — customer-specific).
Adoption & enablement: Workshops, guidelines, operational concepts; depending on seniority, technical leadership of workstreams, mentoring and quality assurance (concept/design reviews).
Requirements
Enthusiasm for identity & access topics, a structured way of working, and willingness to learn.
Basic knowledge of Microsoft Entra ID, AD DS and common authentication/authorization protocols (LDAP, Kerberos, OAuth 2.0, OIDC, SAML).
For junior profiles: Initial practical experience in IGA or IAM (e.g., access reviews, entitlement requests, provisioning) — from studies, internships or 1–2 years of professional experience.
Basic skills in PowerShell/SQL or REST/SCIM APIs, and an understanding of JML processes.
For experienced profiles (Senior/Architect): Several years of end-to-end experience in designing and implementing an IGA suite (Microsoft Entra ID Governance, One Identity, SailPoint, Omada) including data/role modeling, SoD, access reviews, and lifecycle workflows.
Governance frameworks (RBAC/ABAC), policy and control design, PIM integration, automation (e.g., PowerShell, rules/policies, REST) and operational/transition concepts.