Infocomm TechnologyInformation and communications technology professionalsISCO 2514
cloud identity manager
Cloud identity managers work with identity access management's applications. Collaborate with senior management to address key risks in the identity governance. Plan strategies to comply with professional standards.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (14)
cloud security and compliancecloud security and complianceCloud security and compliance concepts, including shared responsibility model, cloud access management capabilities, and resources for security support.information governance complianceinformation governance complianceThe policies regarding processes and procedures for use of information, the balance between information availability and information security and IPR (Intellectual Property Rights) and personal data p...cloud technologiescloud technologiesThe technologies which enable access to hardware, software, data and services through remote servers and software networks irrespective of their location and architecture.follow work proceduresfollow work proceduresAdhere to procedures at work in a structured and systematic manner.adhere to organisational guidelinesadhere to organisational guidelinesAdhere to organisational or department specific standards and guidelines. Understand the motives of the organisation and the common agreements and act accordingly.maintain ICT identity managementmaintain ICT identity managementAdminister identification, authentication and authorisation of individuals within a system and control their access to resources by associating user rights and restrictions with the established identi...manage digital identitymanage digital identityCreate and manage one or multiple digital identities, be able to protect one's own reputation, deal with the data that one produces through several digital tools, environments and services.implement cloud security and complianceimplement cloud security and complianceImplement and manage security policies and access controls on cloud. Differentiate between the roles and responsibilities within the shared responsibility model.automate cloud tasksautomate cloud tasksAutomate manual or repeatable processes to minimize management overhead. Evaluate cloud automation alternatives for network deployments and tool-based alternatives for network operations and managemen...manage cloud data and storagemanage cloud data and storageCreate and manage cloud data retention. Identify and implement data protection, encryption, and capacity planning needs.protect ICT devicesprotect ICT devicesProtect devices and digital content, and understand risks and threats in digital environments. Know about safety and security measures and have due regard to reliability and privacy. Make use of tools...design for organisational complexitydesign for organisational complexityDetermine cross-account authentication and access strategy for complex organizations (for example, an organization with varying compliance requirements, multiple business units, and varying scalabilit...liaise with managersliaise with managersLiaise with managers of other departments ensuring effective service and communication, i.e. sales, planning, purchasing, trading, distribution and technical.follow company standardsfollow company standardsLead and manage according to the organisation's code of conduct.
Optional (8)
internal risk management policyinternal risk management policyThe internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous ev...DB2DB2The computer program IBM DB2 is a tool for creating, updating and managing databases, developed by the software company IBM.cloud monitoring and reportingcloud monitoring and reportingThe metrics and alarms utilizing cloud monitoring services, in particular performance and availability metrics.manage IT security compliancesmanage IT security compliancesGuide application and fulfilment of relevant industry standards, best practices and legal requirements for information security.design cloud architecturedesign cloud architectureDesign a multi-tier cloud architecture solution, which tolerates faults and is fit for the workload and other business needs. Identify elastic and scalable computing solutions, select high-performing ...design cloud networksdesign cloud networksApply cloud networking concepts and implement connectivity services of cloud. Given customer requirements, define network architectures on cloud, propose optimized designs based on the evaluation of a...develop with cloud servicesdevelop with cloud servicesWrite code that interacts with cloud services by using APIs, SDKs, and cloud CLI. Write code for serverless applications, translate functional requirements into application design, implement applicati...design database in the clouddesign database in the cloudApply design principles for an adaptive, elastic, automated, loosely coupled databases making use of cloud infrastructure. Aim to remove any single point of failure through distributed database design...
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
82/ 100
Very High Risk
Low riskHigh risk