Design & implementation, depending on experience level: You design and implement identity governance processes (JML/Joiner‑Mover‑Leaver, Birthright access, recertifications, request/approval workflows) in Microsoft Entra ID Governance.
Lifecycle & provisioning: Modeling of identities, roles (RBAC/ABAC) and policies; integration of HR systems (e.g., SAP/Workday) and target systems via SCIM/REST/AD/Entra, including connector design.
Access reviews & entitlement management: Implementation of campaigns, SoD (segregation of duties) rules, delegation and recertification processes; automation of controls.
Privileged access & compliance: Integration with PIM, logging/monitoring and regulatory requirements (e.g., ISO 27001, SOX, NIS2/DORA — customer-specific).
Adoption & enablement: Workshops, guidelines, operations concepts; depending on seniority, technical leadership of workstreams, mentoring and quality assurance (concept/design reviews).
Requirements
Enthusiasm for identity & access topics, structured working style and willingness to learn.
Basic knowledge of Microsoft Entra ID, AD DS and common auth/authz protocols (LDAP, Kerberos, OAuth 2.0, OIDC, SAML).
For junior profiles: Initial practical experience in IGA or IAM (e.g., access reviews, entitlement requests, provisioning) from university, internships or 1–2 years of professional experience.
Basic skills in PowerShell/SQL or REST/SCIM APIs and an understanding of JML processes.
For experienced profiles (Senior/Architect): Several years of end‑to‑end experience in designing & implementing an IGA suite (Microsoft Entra ID Governance, One Identity, SailPoint, Omada) including data/role modeling, SoD, access reviews and lifecycle workflows.