top of page

Jr. Engineer - Identity Security

Dhaka, Bangladesh

Job Type

Full Time

Workspace

Hybrid

Requirements

About Eitekh

Founded in 2013, Eitekh is a North America–based technology consulting firm that helps organizations navigate complex enterprise technology landscapes and maximize the value of their digital investments.

We partner with clients to design, implement, and operate technology solutions that strengthen operational performance, enhance security, and enable sustainable growth. Our services span technology advisory, implementation, and managed support across critical enterprise platforms including ERP, CRM, Identity Security, and Cloud Infrastructure.

Modern enterprise environments consist of highly interconnected systems that power mission-critical business processes. Eitekh brings the expertise required to architect, integrate, and optimize these systems—ensuring they operate securely, efficiently, and in alignment with each client’s strategic objectives.

Our team brings deep domain expertise across leading technology platforms including SAP, Salesforce, CyberArk, SailPoint, AWS, and Microsoft Azure. We work with organizations across industries such as Manufacturing, Logistics, Mining, Oil & Gas, Financial Services, and the Public Sector, helping them modernize core systems, strengthen identity and access governance, and accelerate their cloud transformation initiatives.

At Eitekh, we combine technical excellence with a client-first mindset. Our consultants work closely with stakeholders to translate complex technology challenges into practical, scalable solutions that deliver measurable business value. We pride ourselves on building long-term partnerships grounded in trust, expertise, and consistent delivery.

As part of our Identity and Access Management (IAM) practice, you will:


  • Utilize IAM (Identity and Access Management) programs to enable North American clients to protect against digital identity risks.

  • Provide appropriate access to applications, systems, and data with advanced authentication.

  • Oversee the spread of information with privileged access management.

  • Responsible to design, install, implement, architect, configure and maintain one or more Identity & Access Management products such as Saviynt, SailPoint, ISIM/ISAM, or CyberArk in a client environment.

  • Communicate the IAM aspects of both the production support and maintenance at the technical and functional level to maintain or resolve a technical situation.

  • Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services.

  • Work in a distributed team environment where team members are spread across numerous locations and often communicate virtually to support clients IAM applications.


Required Qualifications

  • Bachelor's degree in Computer Science, or Computer Engineering

  • Good verbal and written English communication skills

  • 1-4 years of experience with:

    • Installation, integration, and deployment of enterprise applications.

    • Technical architecture experience integrating software into clients' infrastructure and applications.

    • Fluency in more than one technology stack and expertise in several of the following: Java, J2EE, JSP, Servlet, EJB, Application (Client/Server), LDAP, RMI, WAS, Web Services, WS-Security, SAML, HTML, XML, XSLT, SOAP, MQ Series, LDAP / Active Directory, Federation Protocols such as OpenID

    • Work experience with the following programming languages: Java, JavaScript, Python, Bash, SQL.

    • Experience with DB2, SQL Server, Oracle, or another enterprise-class RDBMS


Preferred but Not Required

  • Understanding of Identity & Access Governance including Role based access control, access request and certification

  • Understanding of Privileged Access Management

  • Product knowledge: CyberArk, SailPoint, ForgeRock, Saviynt

  • Certifications from the following authorities are preferred:

  • Identity as a Service

  • Mutual Auth for Service -Service

  • PIM methodologies REST and REST Security

  • Experience with DB2, SQL Server, Oracle, or another enterprise-class RDBMS

  • Operating Systems like Windows, AIX, and Linux.

  • SOX audit controls and applicability to IAM services architecture, design, and processes

  • Java Application Interface Development and Object Models

  • Enterprise Service Bus (ESB) technologies / JMS Advanced systems design

  • Hands on experience with IBM Security Identity Manager (ISIM) is a plus

Connect on LinkedIn

  • LinkedIn Social Icon
bottom of page