IAM KeyCloak Engineer (m/w/d) auth/authz protocols Remote und Berlin

Startdatum:

05.01.2026

Enddatum:

Juni 2026 + Option

Beschäftigungsart:

Freiberuflich

Region:

Remote und Berlin


Beschreibung:

Für unseren Kunden in Berlin suchen wir ab dem 05.01.2026 einen IAM KeyCloak Engineer (m/w/d) für die voraussichtliche Dauer bis Juni 2026 mit der Option auf Verlängerung.

 

 

Ihre Aufgaben:

 

- Implementation of RBAC/ABAC policies and multi-realm setups.

- Give recommendations on mapping Kerberos/IPA identities and groups into Keycloak realms, roles, and clients.

- Consulting on the configuration SSO flows, MFA, and identity federation

- Deployment of Keycloak on VMs, Docker, or Kubernetes (OpenShift or bare-metal K8s).

- Configuration of Keycloak for OIDC, OAuth2, SAML, Kerberos/LDAP federation.

- Providing integration with IPA/LDAP/AD for identity sync and federation.

- Give recommendations on securing Keycloak with TLS (Vault-issued or enterprise CA certificates)

- Deployment of Keycloak on GKE with Helm/Operators, handling Ingress, SSL termination, and HA scaling.

- Integratation of Keycloak with Google Identity as an IdP or broker.

- Mapping Keycloak roles to GCP IAM roles for workload access control.

- Configuration of multi-realm, multi-tenant setups for hybrid cloud and on-prem workloads

- Configuration of Vault for securing Keycloak’s operational secrets (DB passwords, admin credentials, service accounts).

- Implementation of dynamic secrets for Keycloak DB backends (e.g., Postgres via Vault).

- Integration of Vault Agent or Sidecar injector for secret injection into Keycloak pods (on GKE or K8s on-prem).

- Applying rotation policies to minimize secret sprawl and human error

- Deployment and automation of Keycloak and Vault with Terraform, Helm, or Ansible.

- Consulting on securing Keycloak with Vault-issued certificates and secrets.

- Use Keycloak REST API or Terraform provider to automate realm/client configuration.

- Integration of IAM + Vault into CI/CD pipelines for consistent app onboarding

- Troubleshooting of token flows, federation errors, and expired certs.

- Monitoring of both platforms with Prometheus, Grafana.

- Management of incident response: expired certs, Vault unseal failures, migration issues with IPA

 

Ihre Anforderungen:

 

- Experience in the usage of auth protocols (OIDC, OAuth2, SAML, Kerberos, LDAP).

- Experience with Keycloak deployment (VM, K8s, GCP optional).

- Experience with Vault integration for secret

- Experience with Terraform/Helm/ArgoCD automation.

- Expertise with Troubleshooting hybrid IAM flows.

- Experienced with auth/authz protocols, basic federation strategies and automation tools

- Language: Fluent English – C1

 

Preferred experience

- Experience with cloud services and their configuration

- Knowledge about IAM solutions based on OpenID Connect (OIDC), such as Keycloak, for auth backends

- Fluent in German

- Working with Scrum and general experience in agile frameworks