22 Access Management jobs in Singapore
Solution Architect – Identity & Access Management
Posted 9 days ago
Job Viewed
Job Description
Overview
Solution Architect – Identity & Access Management plays a crucial role in designing secure, scalable, and integrated IAM platforms and solutions that address complex business and compliance requirements. This role collaborates with cross-functional teams to define, develop, and guide the implementation of IAM systems that support authentication, authorization, user lifecycle management, and regulatory compliance. The architect ensures that IAM solutions align with the organization’s technology strategy, business goals, and security frameworks.
HOYA Group : Founded in 1941 in Tokyo, Japan, HOYA Corporation is a global technology and med-tech company and a leading supplier of innovative high-tech and medical products. HOYA’s divisions and business units research and develop products utilized in the healthcare and information technology fields. With over 150 offices and subsidiaries worldwide, HOYA currently employs a multinational workforce of 37,000 people.
Responsibilities- Platform and Solution Design and Strategy
- Develop and maintain the organization's IAM architecture and solution design.
- Collaborate with stakeholders to understand business requirements and translate them into effective IAM solutions.
- Create detailed IAM solution designs, considering architecture principles, scalability, security, and performance.
- Stay updated with emerging IAM technologies and industry trends.
- Evaluate and recommend IAM technologies and tools that enhance solution effectiveness.
- Technical Leadership
- Provide technical leadership and guidance to IAM development teams throughout the project lifecycle.
- Ensure that IAM designs align with established architecture standards.
- Integration and Compatibility
- Ensure that IAM solutions integrate seamlessly with existing systems and applications.
- Verify the compatibility of proposed IAM solutions with hardware, software, and network environments.
- Security and Compliance
- Incorporate security best practices into IAM solution designs.
- Ensure compliance with relevant regulatory frameworks (e.g., GDPR, SOX, HIPAA).
- Documentation and Communication
- Document IAM designs, architecture decisions, and implementation guidelines.
- Communicate IAM solution designs effectively to both technical and non-technical stakeholders.
- Quality Assurance
- Collaborate with quality assurance teams to define testing strategies and validate IAM solution functionality.
- Troubleshoot and resolve technical issues as they arise during implementation.
- Technical Direction and Coordination
- Help define the technical direction for IAM solutions and coordinate across product teams.
- Requirements Transformation
- Govern the technical design against approved architectural standards and make final decisions on any technology changes or exceptions.
- Business Alignment and Integration
- Align IAM platforms with evolving business processes, ensuring secure and efficient access management.
- Integrate identity services with HR systems, customer portals, and third-party ecosystems.
- Scalability, Reliability, and Adaptability
- Ensure the IAM platform is scalable, reliable, and adaptable to changing business needs.
- Quantitative KPIs
- Number of IAM solution designs delivered within project timelines.
- Qualitative KPIs
- Alignment of IAM solutions with business objectives.
- Scalability and capacity of IAM solutions to serve future business needs.
- Effectiveness of technical leadership and guidance.
- Bachelor's degree in Computer Science or a related field.
- Certifications preferred: TOGAF, CISSP, CISM, Azure/AWS IAM specializations.
- Experience
- 5-8 years of experience in solution architecture with a strong focus on IAM.
- Proven track record in designing and delivering complex IAM solutions.
- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Information Technology
- Industries: Manufacturing and Semiconductor Manufacturing
Notes: Referrals increase your chances of interviewing at HOYA by 2x. This description excludes non-essential boilerplate and focuses on the core responsibilities and qualifications of the role.
#J-18808-LjbffrSolution Architect - Identity & Access Management
Posted today
Job Viewed
Job Description
Overview
Solution Architect – Identity & Access Management plays a crucial role in designing secure, scalable, and integrated IAM platforms and solutions that address complex business and compliance requirements. This role collaborates with cross-functional teams to define, develop, and guide the implementation of IAM systems that support authentication, authorization, user lifecycle management, and regulatory compliance. The architect ensures that IAM solutions align with the organization’s technology strategy, business goals, and security frameworks.
HOYA Group : Founded in 1941 in Tokyo, Japan, HOYA Corporation is a global technology and med-tech company and a leading supplier of innovative high-tech and medical products. HOYA’s divisions and business units research and develop products utilized in the healthcare and information technology fields. With over 150 offices and subsidiaries worldwide, HOYA currently employs a multinational workforce of 37,000 people.
Responsibilities
- Platform and Solution Design and Strategy
- Develop and maintain the organization's IAM architecture and solution design.
- Collaborate with stakeholders to understand business requirements and translate them into effective IAM solutions.
- Create detailed IAM solution designs, considering architecture principles, scalability, security, and performance.
- Stay updated with emerging IAM technologies and industry trends.
- Evaluate and recommend IAM technologies and tools that enhance solution effectiveness.
- Technical Leadership
- Provide technical leadership and guidance to IAM development teams throughout the project lifecycle.
- Ensure that IAM designs align with established architecture standards.
- Integration and Compatibility
- Ensure that IAM solutions integrate seamlessly with existing systems and applications.
- Verify the compatibility of proposed IAM solutions with hardware, software, and network environments.
- Security and Compliance
- Incorporate security best practices into IAM solution designs.
- Ensure compliance with relevant regulatory frameworks (e.g., GDPR, SOX, HIPAA).
- Documentation and Communication
- Document IAM designs, architecture decisions, and implementation guidelines.
- Communicate IAM solution designs effectively to both technical and non-technical stakeholders.
- Quality Assurance
- Collaborate with quality assurance teams to define testing strategies and validate IAM solution functionality.
- Troubleshoot and resolve technical issues as they arise during implementation.
- Technical Direction and Coordination
- Help define the technical direction for IAM solutions and coordinate across product teams.
- Requirements Transformation
- Govern the technical design against approved architectural standards and make final decisions on any technology changes or exceptions.
- Business Alignment and Integration
- Align IAM platforms with evolving business processes, ensuring secure and efficient access management.
- Integrate identity services with HR systems, customer portals, and third-party ecosystems.
- Scalability, Reliability, and Adaptability
- Ensure the IAM platform is scalable, reliable, and adaptable to changing business needs.
- Quantitative KPIs
- Number of IAM solution designs delivered within project timelines.
- Qualitative KPIs
- Alignment of IAM solutions with business objectives.
- Scalability and capacity of IAM solutions to serve future business needs.
- Effectiveness of technical leadership and guidance.
Qualifications
- Bachelor's degree in Computer Science or a related field.
- Certifications preferred: TOGAF, CISSP, CISM, Azure/AWS IAM specializations.
- Experience
- 5-8 years of experience in solution architecture with a strong focus on IAM.
- Proven track record in designing and delivering complex IAM solutions.
Details
- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Information Technology
- Industries: Manufacturing and Semiconductor Manufacturing
Notes: Referrals increase your chances of interviewing at HOYA by 2x. This description excludes non-essential boilerplate and focuses on the core responsibilities and qualifications of the role.
#J-18808-LjbffrCyber Access Management Engineer
Posted today
Job Viewed
Job Description
NCS is a leading technology services firm that operates across the Asia Pacific region in over 20 cities, providing consulting, digital services, technology solutions, and more. We believe in harnessing the power of technology to achieve extraordinary things, creating lasting value and impact for our communities, partners, and people. Our diverse workforce of 13,000 has delivered large-scale, mission-critical, and multi-platform projects for governments and enterprises in Singapore and the APAC region.
As an Implementation Engineer in our Cybersecurity team, you will be specializing in deploying and integrating Privileged Access Management (PAM) and Secrets Management solutions such as CyberArk, BeyondTrust, or HashiCorp Vault. The ideal candidate will have hands-on experience in implementing enterprise-grade security solutions, working closely with clients and internal teams to ensure successful delivery and operationalization.
What will you do?
- Lead and support the implementation of CyberArk, BeyondTrust, or HashiCorp Vault solutions across client environments.
- Perform system integration, configuration, and customization based on business and security requirements.
- Collaborate with cross-functional teams including infrastructure, application, and security teams to ensure seamless deployment.
- Conduct technical workshops, requirement gathering sessions, and solution design discussions.
- Develop and maintain technical documentation including design specs, implementation guides, and operational runbooks.
- Provide post-implementation support, troubleshooting, and optimization.
- Stay updated on product features, security trends, and best practices in PAM and secrets management.
The ideal candidate should possess:
- Bachelor's degree in Computer Science, Information Security, or related field.
- 3+ years of experience in implementing PAM or secrets management solutions.
- Hands-on experience with at least one of the following:CyberArk (Core PAS, EPM, CPM, PVWA, Vault, PTA)
BeyondTrust (Password Safe, Privilege Management for Windows/Unix)
HashiCorp Vault (Enterprise or OSS, secrets engines, authentication methods) - Strong understanding of identity and access management principles, privileged account lifecycle, and security controls.
- Experience with scripting (PowerShell, Python, Bash) and automation tools.
- Familiarity with cloud platforms (AWS, Azure, GCP) and hybrid environments.
- Excellent communication and client-facing skills.
- Preferred Certifications:
- CyberArk Defender / Sentry / Guardian
- BeyondTrust Certified Implementation Specialist
- HashiCorp Vault Associate / Vault Operations Professional
- CISSP, CISM, or other relevant security certifications
We are driven by our AEIOU beliefs—Adventure, Excellence, Integrity, Ownership, and Unity—and we seek individuals who embody these values in both their professional and personal lives. We are committed to our Impact: Valuing our clients, Growing our people, and Creating our future.
Together, we make the extraordinary happen .
Learn more about us at ncs.co and visit our LinkedIn career site.
Tell employers what skills you haveSecurity Controls
Information Security
Technical Documentation
Troubleshooting
Azure
System Integration
Automation Tools
Scripting
Technology Solutions
CyberArk
Python
Authentication
Consulting
CISSP
System Administrator - Physical Identity Access Management
Posted 4 days ago
Job Viewed
Job Description
Responsibilities
System Administrator - Physical Identity Access Management
Card Administration: Support in managing the regional card access system.
Badge Production: Support creation of personal Photo ID Badge for Associates and generic Contractor/Temporary/Visitor Badge.
Application Procedures: Support in the management of access rights applications from the Alert Enterprise Guardian.
Generation & Dissemination of Reports: Support in the management of access rights provisioning for New Hires, Staff Transfer, and de-provisioning for Departing Associates.
Any other instructions as directed by the clients or its representative. Which includes: a. Responsible for answering phone calls related to emergencies, life safety, asset protection, security or criminal issues and assist employees and vendors with general information requests. b. Incidents reported to SOACC may result in impact to the employees, customers, or facilities to mitigate immediate threats by providing swift engagement of appropriate local resources. c. Adhere to procedures while monitoring and reacting to life safety and burglar alarms activation the client's facilities equipped with alarm and DVR CCTV equipment. d. Provides investigative support on security / safety incidents as directed by PSMs / RSMs. e. Provides input to SOACC Intelligence & Analysis team as events/incidents are reported in. Conducts additional SOACC operational support as directed.
IT Support Engineer - Identity & Access Management
Posted today
Job Viewed
Job Description
Overview
We are seeking a meticulous and proactive IT Engineer, specializing in Identity and Access Management (IAM) to support and enhance our IAM processes and application landscape.
Mandatory Skill-set
- Diploma or Degree in Information Technology, Computer Science;
- Has 1–3 years of experience in IT support related work;
- Must have prior experience in IT administration, such as user access management, identity and access management ( IAM ), or related areas;
- Must have experience with Active Directory and user provisioning tools;
- Basic understanding of IT security and access control best practices;
- Participate in standby/on-call support including weekends, to address urgent ID-related issues;
- Good communication and problem-solving skills.
Desired Skill-set
- Knowledge of Microsoft Active Directory and Entra ID.
Responsibilities
- Part of the IT Support to administer and manager IT user accounts;
- Support onboarding and offboarding processes by creating, updating, and deactivating user accounts;
- Create and maintain Active Directory (AD) and application-level user accounts;
- Support development and implementation of system-independent role concepts to better improve authorization management;
- Document user requirements and drive enhancements in the assigned applications;
- Assist in troubleshooting and resolving account-related issues;
- Assist in compiling and executing periodic reviews of user accounts to ensure accuracy and compliance;
- Conduct account reviews to identify any discrepancies or issues;
- Communicate findings and follow-up actions clearly and effectively to relevant stakeholders;
- Support and coordinate user training on assigned applications;
- Collaborate with business departments to support process improvement, error reduction, and cost optimization projects.
Should you be interested in this career opportunity, please send in your updated resume to at the earliest.
When you apply, you voluntarily consent to the disclosure, collection and use of your personal data for employment/recruitment and related purposes in accordance with the SCIENTE Group Privacy Policy, a copy of which is published at SCIENTE’s website (
Confidentiality is assured, and only shortlisted candidates will be notified for interviews.
EA Licence No. 07C5639
Seniority level
- Associate
Employment type
- Contract
Job function
- Information Technology, Engineering, and Other
Industries
- IT Services and IT Consulting, Engineering Services, and Manufacturing
System Administrator - Physical Identity Access Management
Posted today
Job Viewed
Job Description
Responsibilities
System Administrator - Physical Identity Access Management
Card Administration: Support in managing the regional card access system.
Badge Production: Support creation of personal Photo ID Badge for Associates and generic Contractor/Temporary/Visitor Badge.
Application Procedures: Support in the management of access rights applications from the Alert Enterprise Guardian.
Generation & Dissemination of Reports: Support in the management of access rights provisioning for New Hires, Staff Transfer, and de-provisioning for Departing Associates.
Any other instructions as directed by the clients or its representative. Which includes: a. Responsible for answering phone calls related to emergencies, life safety, asset protection, security or criminal issues and assist employees and vendors with general information requests. b. Incidents reported to SOACC may result in impact to the employees, customers, or facilities to mitigate immediate threats by providing swift engagement of appropriate local resources. c. Adhere to procedures while monitoring and reacting to life safety and burglar alarms activation the client's facilities equipped with alarm and DVR CCTV equipment. d. Provides investigative support on security / safety incidents as directed by PSMs / RSMs. e. Provides input to SOACC Intelligence & Analysis team as events/incidents are reported in. Conducts additional SOACC operational support as directed.
Senior Privileged Access Management Specialist
Posted today
Job Viewed
Job Description
We are seeking a skilled CyberArk Engineer to join our team. In this role, you will be responsible for designing, implementing, and supporting privileged access management (PAM) solutions using CyberArk, ensuring the highest levels of security, compliance, and operational efficiency.
Key Responsibilities:
Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
Troubleshoot and remediate CyberArk Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
Perform health checks and tuning of CPM components to ensure stability and optimal performance.
Required Qualifications:
CyberArk Certified Delivery Engineer (CDE) certification is mandatory.
3+ years of experience implementing and supporting CyberArk solutions in enterprise environments.
Proficiency with CyberArk components and architecture.
Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs.
Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege.
Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals.
Preferred Qualifications:
Experience or certification with Sentry is preferred.
CyberArk Defender or Guardian certification(s) is an advantage.
Familiarity with cloud PAM implementations (AWS, Azure, GCP).
Be The First To Know
About the latest Access management Jobs in Singapore !
Identity and Access Management Operations Analyst
Posted today
Job Viewed
Job Description
Role Overview
Our client, a leading global commodities brokerage and financial services firm, is seeking an IAM Operations Analyst to support and manage identity lifecycle processes, authentication, authorization, and access control across a full stack of business applications. The role will work closely with IT, security, and infrastructure teams to ensure secure and compliant access management.
Key Responsibilities
- Design and implement IAM frameworks aligned with security best practices and business needs
- Manage user provisioning, deprovisioning, and role-based access control across multiple systems
- Ensure compliance with regulations (e.g., GDPR, SOX) and internal security policies
- Maintain documentation of user access policies and audit logs for reporting purposes
- Conduct role-based access control (RBAC) reviews to minimize excessive or inappropriate permissions
- Collaborate with IT, security, and business stakeholders to align IAM initiatives with organizational goals
- Lead investigations into access-related incidents and recommend remediation measures
- Promote security awareness and train staff on access policies and procedures
- Oversee IAM team activities, including performance appraisals and ensuring SLAs are met
- Monitor and manage Jira queues to ensure timely resolution of requests
Requirements
- Strong knowledge of IAM tools (e.g., Okta, SailPoint, CyberArk, Azure AD) and technologies such as SSO, MFA, and RBAC
- Solid understanding of security principles such as least privilege, identity governance, and privileged access management
- Familiarity with compliance frameworks and regulations such as GDPR, SOX, HIPAA, ISO 27001
- Strong problem-solving, analytical, and communication skills with the ability to work across technical and non-technical teams
- Experience conducting audits, producing reports, and ensuring IAM systems comply with legal and regulatory standards
- Ability to respond effectively to access-related incidents and manage IAM operations in high-pressure situations
- Experience working in regulated industries such as financial services
- Proven ability to engage stakeholders and present IAM risks and performance to senior leadership
Yang Lily, Recruit Avenue Pte. Ltd.
EA License Number: 23C1935 | EA Personnel Number: R
Tell employers what skills you have
Brokerage
Remediation
Azure
Appraisals
ISO
ISO 27001
Access Control
Identity & Access Management
JIRA
Authorization
Communication Skills
Authentication
HIPAA
Security Awareness
Financial Services
Enterprise Identity and Access Management Specialist
Posted today
Job Viewed
Job Description
Senior Identity and Access Management Professional
">Job Description:
This senior-level position involves developing, implementing, and supporting enterprise-level identity and access management solutions using Oracle IAM technologies.
Required Skills and Qualifications:
- Deep expertise in Oracle IAM, ADF, and SOA Suite development with a proven track record of delivering high-quality solutions for financial services organizations.
- Excellent problem-solving and debugging skills with a focus on performance tuning.
- Prior experience working with financial services customers, understanding regulatory and compliance-driven IAM requirements.
- Experience in requirements gathering, solution design, implementation, and collaboration with cross-functional teams.
Benefits:
This role offers an excellent opportunity to work with a highly experienced team, contribute to the development of innovative identity and access management solutions, and grow professionally.
Others:
Interested candidates can submit their applications for further information. Please note that only shortlisted candidates will be notified.
IAM (Identity and Access Management) Operations Analyst
Posted 17 days ago
Job Viewed
Job Description
Marex has unique access across markets with significant share globally both on and off exchange. The depth of knowledge amongst its teams and divisions provides its customers with clear advantage, and its technology-led service provides access to all major exchanges, order-flow management via screen, voice and DMA, plus award-winning data, insights and analytics.
The Technology Department delivers differentiation, scalability, and security for the business. Reporting to the COO, Technology provides digital tools, software services and infrastructure globally to all business groups. Software development and support teams work in agile ‘streams’ aligned to specific business areas. Our other teams work enterprise-wide to provide critical services including our global service desk, network and system infrastructure, IT operations, security, enterprise architecture and design.
Role Summary:
The IAM Operations analyst role is responsible for managing and supporting the systems, processes, and tools used to handle the identity lifecycle, authentication, authorization, and access control within an organization’s IT infrastructure.
The IAM Operations analyst collaborates with multiple teams within IT, including security, infrastructure, and support teams, to manage identity-related processes, troubleshoot access issues, and ensure compliance with internal and external regulatory requirements.
Overall Responsibilities
Role Specific:
- IAM Strategy & Implementation: Design and implement a robust IAM framework aligned with security best practices and business needs.
- User Access Management: Oversee user provisioning, deprovisioning, and role-based access control across multiple systems and regions.
- Security & Compliance: Ensure adherence to regulatory requirements (e.g., GDPR, SOX) and internal security policies.
- Reporting and Documentation: Maintain thorough documentation of user access policies, and audit logs for internal and external reporting purposes.
- Role based Access control assessment (RBAC): Ensure role definitions are clear and users are only assigned the necessary rights to perform their role in the organization in order to minimize risk of excessive or inappropriate permissions.
- Stakeholder Engagement: Work closely with IT, security, and business leaders to align IAM initiatives with organizational goals.
- Incident Management: Lead investigations into access-related security incidents and recommend remediation measures.
- Training and awareness: Ensure staff understand user access policies, procedures and security awareness.
- Ensure high priority requests are handled efficiently and in compliance with the IAM guidelines and SLA’s.
- Manage the IAM Team, carry out annual appraisals ensuring that all team members are meeting their performance targets and delivering high-quality support to clients.
- Close monitoring of the relevant Jira queues, managing and updating of Jira tickets within agreed SLA’s.
Other Responsibilities:
- Ensure compliance with the company’s regulatory requirements under the FCA.
- Adhere to the operational risk framework for your role ensuring that all regulatory or company determined parameters are complied with.
- Role model for demonstrating highest level standards of integrity and conduct and reflecting Company Values.
- At all times comply with the FCA’s Code of Conduct.
- To ensure that you are fully aware of and adhere to internal policies that relate to you, your role or any other activities for which you have any level of responsibility
- To report any breaches of policy to Compliance and/ or your supervisor as required
- To escalate risk events immediately
- To provide input to risk management processes, as required.
Competencies, Skills and Experience
- Technical Expertise: Understanding of IAM tools (e.g., Okta, SailPoint, CyberArk, Azure AD) and technologies such as SSO (Single Sign-On), MFA (MultiFactor Authentication), and role-based access control (RBAC).
- Security Knowledge: In-depth knowledge of security concepts like least privilege, identity governance, and privileged access management (PAM).
- Compliance Awareness: Familiarity with regulations such as GDPR, SOX, HIPAA, and industry standards like ISO 27001.
- Problem-Solving Skills: Ability to identify and address IAM-related security issues and access violations, along with implementing effective solutions.
- Communication Skills: Ability to work with cross-functional teams (IT, security, legal) and communicate complex IAM concepts to both technical and non-technical stakeholders.
- Analytical Skills: Ability to assess and review user access data, audit trails, and IAM configurations to ensure compliance and security.
- Experience working in a regulated environment and knowledge of the risk and compliance requirements associated with this.
- Strategic Vision: Ability to design and implement IAM strategies that align with business goals and security needs, both in the short and long term.
- Problem-Solving: Proficient at identifying complex IAM challenges and developing creative solutions to address them efficiently.
- Stakeholder Engagement: Strong communication skills to interact with senior leadership and other business units, ensuring IAM strategies are aligned with organizational goals and security needs.
- Reporting and Documentation: Ability to clearly present IAM performance, risks, and audit results to senior leadership and regulatory bodies.
- Conflict Resolution: Capable of resolving conflicts related to access management policies or resource allocation with diplomacy and professionalism.
- Auditing and Compliance: Skilled in conducting audits and ensuring IAM systems and practices comply with legal and regulatory requirements.
- Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations.
- Crisis Management: Strong decision-making ability in high-pressure situations, ensuring access management processes remain secure and operational during a crisis.
Company Values
Acting as a role model for the values of the Company:
Respect – Clients are at the heart of our business, with superior execution and superb client service the foundation of the firm. We respect our clients and always treat them fairly.
Integrity – Doing business the right way is the only way. We hold ourselves to a high ethical standard in everything we do – our clients expect this and we demand it of ourselves.
Collaborative – We work in teams – open and direct communication and the willingness to work hard and collaboratively are the basis for effective teamwork. Working well with others is necessary for us to succeed at what we do.
Developing our People – Our people are the basis of our competitive advantage. We look to “grow our own” and make Marex the place ambitious, hardworking, talented people choose to build their careers.
Adaptable and Nimble – Our size and flexibility are an advantage. We are big enough to support our client’s various needs, and adaptable and nimble enough to respond quickly to changing conditions or requirements. A non-bureaucratic, but well controlled environment fosters initiative as well as employee satisfaction.
Conduct Rules
You must:
• Act with integrity
• Act with due skill, care and diligence
• Be open and cooperative with the FCA, the PRA and other regulators
• Pay due regard to the interests of customers and treat them fairly
• Observe proper standard of market conduct
• Act to deliver good outcomes for retail customers