Engineer, Information Security_IAM_Keycloak_Fullstack

3 - 4 years

2 - 7 Lacs

Posted:1 week ago| Platform: Foundit logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Key Responsibilities:

  • Core Role:

    Design, implement, and maintain information security tools and services in the Identity and Access Management (IAM) domain, with a primary focus on authentication and authorization solutions.
  • IAM Products:

    Support and manage enterprise-level IAM systems and services, such as

    Keycloak

    ,

    ForgeRock

    ,

    Ping

    , and other Identity Providers (IdPs). Demonstrate expertise in configuring, troubleshooting, and enhancing these systems to meet security and access management requirements.
  • Authentication Standards:

    Ensure the adoption and implementation of authentication standards (e.g.,

    OAuth 2.0

    ,

    OpenID Connect (OIDC)

    ,

    SAML 2.0

    ). Translate organizational requirements into appropriate authentication and authorization frameworks.
  • LDAP Knowledge:

    Apply a solid understanding of

    LDAP

    concepts, integration with enterprise directories, and their role in IAM systems. Troubleshoot, optimize, and maintain LDAP-based access management environments.
  • System Design & Deployment:

    Collaborate with the engineering and security teams to design, deploy, and operate secure authentication solutions across the organization. Develop and document IAM-related policies, processes, and procedures in line with best practices.
  • Security Monitoring & Incident Response:

    Assist the Information Security team with monitoring security systems, analyzing logs, identifying vulnerabilities, and addressing escalated security incidents. Support incident response efforts related to IAM solutions.
  • Cross-team Collaboration:

    Partner with other teams to design and implement secure solutions for various enterprise applications and infrastructure components.
  • Cloud IAM Integration:

    Assist in integrating IAM solutions with cloud technologies and platforms (e.g., AWS, Azure, GCP). Ensure secure identity and access management in hybrid or cloud-native environments.
  • Continuous Learning & Development:

    Stay up to date with the latest technological advancements in IAM, security standards, and cybersecurity best practices. Participate in continuing education related to identity access management and information security.
  • Security Best Practices:

    Contribute to secure coding initiatives by developing secure enhancements and using security best practices to mitigate vulnerabilities. Ensure compliance with security standards in all IAM-related activities.
  • Cybersecurity Tools & Threat Management:

    Analyze the output of industry-standard cybersecurity tools (e.g., vulnerability scanners, SIEM systems) to identify threats and reduce risk exposure. Develop strategies to address IAM-related security weaknesses.
  • Incident Management:

    Assist in the implementation of proactive IAM measures and contribute to security breach response procedures. Aid in the management of incidents by diagnosing, troubleshooting, and remediating IAM security issues.
  • Custom Enhancements & Documentation:

    Assist in

    custom development

    using

    Java

    or other relevant programming languages for enhancements in IAM systems. Contribute to technical documentation in a software development environment, ensuring compliance with IAM best practices.
  • Vendor & Product Support:

    Collaborate with vendors and product teams for troubleshooting, maintenance, and the enhancement of IAM products and services. Ensure proper documentation and knowledge sharing within the team.

Required Qualifications:

  • Bachelor s degree in computer science, Cybersecurity, Engineering, or a related field (or equivalent work experience).
  • At least

    2 years

    of experience in technology system support, software development, or a related field, with at least

    1 year

    of experience in information security applications and systems, specifically IAM.
  • Strong working knowledge of

    Identity and Access Management

    concepts, including authentication and authorization mechanisms.
  • Hands-on experience with IAM products

    such as

    Keycloak

    ,

    ForgeRock

    , or

    Ping

    (Keycloak is a preferred focus). Ability to configure, troubleshoot, and manage these systems in enterprise environments.
  • Solid understanding of

    LDAP

    , including its role in directory services and user authentication management.
  • Knowledge of authentication protocols

    like

    OAuth 2.0

    ,

    OpenID Connect (OIDC)

    , and

    SAML 2.0

    , and the ability to implement these protocols in IAM environments.
  • Experience with

    API security

    and integration using

    JSON

    ,

    REST

    , and

    web services

    .
  • Java development experience

    for customizations and enhancements of IAM systems, including writing secure, maintainable code to support authentication and authorization workflows.
  • Knowledge of

    IAM solutions in Cloud environments

    (AWS, Azure, or GCP) and how IAM integrates within those platforms.
  • Excellent written and verbal communication skills, with the ability to document technical processes and contribute to knowledge sharing.

Preferred Qualifications:

  • Master s degree in computer science, Cybersecurity, Business Administration, or a related field.
  • Experience with development life cycles (SDLC)

    and working on projects involving IAM system implementations.
  • Relevant certifications

    such as

    CISSP

    ,

    CISM

    ,

    CEH

    ,

    CISA

    ,

    OSCP

    ,

    CompTIA Security+

    or equivalent IAM/security certifications.
  • Hands-on experience analyzing cybersecurity tools

    (e.g., vulnerability scanners, SIEM tools) and identifying remediation actions to reduce risk.
  • Advanced understanding of

    information security practices

    , policies, and standards related to IAM.
  • Experience with ITIL or other IT service management frameworks.
  • Experience with multi-cloud IAM deployments

    or hybrid environments, ensuring security and access management are consistent across on-prem and cloud infrastructures.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

trivandrum, kerala, india

bangalore urban, karnataka, india

hyderabad, telangana, india

pune, maharashtra, india

pune, maharashtra, india