Security Architect – Digital Identity Job Opening in Dubai, United Arab Emirates

Full Time

Al Futtaim Private Company LLC

Established in the 1930s as a trading business, Al-Futtaim Group today is one of the most diversified and progressive, privately held regional businesses headquartered in Dubai, United Arab Emirates

Role Overview: Security Architect – Digital Identity

As a key member of the Security Architecture team within the Chief Information Security Office (CISO), the Security Architect – Digital Identity is responsible for shaping the strategy, implementation, and lifecycle management of Identity and Access Management (IAM) solutions across the organization. In an era of rapidly evolving cyber threats, this role is critical in strengthening the organization’s Cybersecurity Resilience by ensuring robust identity controls and access frameworks.


Key Responsibilities

Strategic Leadership

  • Define and maintain the IAM target architecture and multi-year roadmap in alignment with business needs, industry standards, and regulatory frameworks.
  • Develop comprehensive architecture and design documentation for IAM solutions, ensuring alignment with enterprise security standards.
  • Lead architecture governance by participating in committees, risk reviews, and advisory boards for new technologies and programs.
  • Optimize IAM license usage, ensuring cost-effective utilization and maximizing ROI on security investments.
  • Identify and remediate architectural gaps; recommend enhancements to maintain a strong security posture.

Solution Design & Implementation

  • Design and deliver scalable IAM solutions in collaboration with IT, security, and business stakeholders.
  • Oversee the implementation and integration of IAM platforms and tools, working closely with vendors and internal teams.
  • Evaluate and select IAM technologies aligned with enterprise needs and compliance requirements.
  • Drive the development of identity governance strategies—including access provisioning, certification, workflow automation, and role management.
  • Conduct detailed security architecture reviews, identifying vulnerabilities and defining mitigation plans.

Risk & Compliance Management

  • Ensure alignment with relevant regulatory frameworks such as CBUAE ADHIS & DOH by implementing and monitoring appropriate controls.
  • Lead efforts to resolve internal and external audit findings within the IAM domain.
  • Collaborate with Legal, Compliance, Business Units, and IT to ensure secure handling of sensitive data and adherence to data privacy requirements.

Stakeholder Engagement & Support

  • Act as the subject matter expert (SME) for IAM, providing thought leadership, mentorship, and guidance to internal teams.
  • Maintain detailed documentation, including architecture diagrams, design specifications, and implementation guides.
  • Deliver performance, compliance, and security reports for IAM platforms to senior leadership and stakeholders.

People Leadership

  • Lead by example, setting clear goals and performance expectations.
  • Support the development of team members by offering mentorship, training, and regular performance reviews.
  • Inspire and motivate staff to contribute to their highest potential.

What You Bring

Education & Certifications

  • Bachelor’s or Master’s in Science, Information Security, or related discipline.
  • Industry-recognized CISSP, CISM, or IAM-focused certifications (e.g., CIAM, SC-300) are highly preferred.

Experience & Expertise

  • 15+ years of experience in Information Technology, with a strong emphasis on architecture and solution design—preferably within a consulting or systems integrator context.
  • Minimum of 10 years in cybersecurity, including 5+ years focused on Security Architecture.
  • Proven leadership of at least one large-scale IAM program (e.g., 20,000+ users, 100+ applications, including SAP).
  • In-depth understanding of IAM concepts, including identity federation, SSO, MFA (Microsoft Entra ID), Privileged Access Management (e.g., CyberArk), and Identity Governance & Administration (IGA).

Technical Proficiency

  • Experience implementing and managing IGA solutions like SailPoint, Saviynt, or One Identity.
  • Strong command of IAM protocols: SAML, OAuth, OpenID Connect, Kerberos.
  • Familiarity with SAP GRC and its integration with IGA platforms is highly desirable.

Reporting Line

You will report directly to the Enterprise Architect – Digital Security, collaborating closely with peers across the cybersecurity, IT, and business domains.