Apply now »

Tech Consulting - Cybersecurity - IAM - Cairo

Location:  Cairo
Other locations:  Primary Location Only
Salary: Competitive
Date:  Oct 8, 2025

Job description

Requisition ID:  1650511

As part of our Cyber Technology Consulting team, you will execute Identity and Access Management (IAM) engagements for clients across the MENA region. You will work closely with clients to design, implement, and mature IAM strategies, solutions, and governance aligned with their business and compliance needs. The client base spans various sectors and includes collaboration with other teams across Advisory services.

 

The opportunity

 

We’re looking for a senior consultant with deep expertise in IAM strategy, architecture, and implementation. This is a fantastic opportunity to join a leading firm and shape the identity security posture of regional and global organizations.

 

Your key responsibilities

 

  • Execute IAM transformation programs across identity lifecycle management, access governance, privileged access management (PAM), single sign-on (SSO), and multi-factor authentication (MFA).
  • Conduct maturity assessments, define IAM roadmaps, and develop IAM operating models aligned with regulatory and business requirements.
  • Oversee the implementation and integration of IAM platforms (e.g., SailPoint, Saviynt, MS Entra CyberArk, Okta, Ping, Oracle IAM).
  • Work with stakeholders across IT, security and business functions to establish effective IAM governance and role-based access controls (RBAC).
  • Conduct access risk reviews, identity attestation processes, and support audit and compliance initiatives.
  • Ensure alignment with global IAM standards and security frameworks (e.g., NCA ECC/DCC, NIST, ISO 27001, Zero Trust, CIS Controls).
  • Develop detailed reports, articulate technical findings, and deliver actionable recommendations to both technical teams and executive stakeholders.

 

Skills and attributes for success

 

  • Strong understanding of IAM principles including identity lifecycle, authentication, federation, authorization, and access certification.
  • Experience working in IAM engagements with cross-functional teams and third-party vendors.
  • Ability to articulate technical IAM solutions to both technical and non-technical stakeholders.
  • Proficiency in IAM tools and platforms such as CyberArk, SailPoint, Saviynt, MS Entra, Okta, Azure AD, or Oracle IAM.
  • Ability to define role-based access controls (RBAC) and Segregation of Duties (SoD) for business applications
  • Strong grasp of regulatory IAM requirements
  • Experience with cloud IAM models
  • Excellent communication, analytical, and problem-solving skills.
  • Collaborating with other members of the engagement team to plan the engagement and develop work program timelines, risk assessments and other documents/templates.
  • Ability to interpret complex technical results and present insights to business stakeholders.
  • Strong analytical, problem-solving, and critical-thinking skills.
  • Excellent communication and collaboration skills

 

 

To qualify for the role, you must have

  • A bachelor's degree in information technology, cyber security etc.
  • 4–6 years of relevant experience in IAM domain including IAM Governance, solution design, deployment, or integration.
  • Good understanding of identity lifecycle management, authentication/authorization, federation protocols, and directory services.
  • Knowledge of regulatory frameworks and compliance requirements (e.g., GDPR, HIPAA, SOX, ISO 27001, NCA ECC/DCC).
  • Hands-on experience with at least two IAM technology platforms (e.g., SailPoint, CyberArk, ForgeRock, Okta, Ping, Azure AD).
  • Familiarity with cloud identity and federation services (AWS IAM, Azure AD, GCP IAM).
  • An analytical and problem-solving mindset with the ability to bridge business and technical requirements.
  • A valid passport for travel.
  • Excellent communication skills with a consulting mindset.

 

Ideally, you’ll also have

 

  • Industry-recognized certifications such as CISSP, CISM, IAM certs such as SailPoint Certified IdentityNow/IdentityIQ, Saviynt IGA Professional, Saviynt PAM Professional, CyberArk Defender/Sentry, or Okta Certified Professional.
  • Experience with Zero Trust architecture and cloud-native IAM solutions.
  • Familiarity with automation, DevSecOps, and identity governance integration in CI/CD pipelines.
  • Exposure to customer IAM (CIAM) and identity threat detection.

 

What we offer
 

We offer a competitive compensation package where you’ll be rewarded based on performance and recognized for the value you bring to our business. Plus, we offer:

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

 

If you can demonstrate that you meet the criteria above, please contact us as soon as possible.


The exceptional EY experience. It’s yours to build.


EY | Building a better working world

 

EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

 

Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate.

 

Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Apply now »