10x.Team

Identity & Access Management Specialist – AI Trainer, Freelance

10x.Team

contract

Posted on:

Location Type: Remote

Location: Netherlands

Visit company website

Explore more

AI Apply
Apply

Salary

💰 €90 - €158 per hour

Tech Stack

About the role

  • Review and refine AI-generated responses related to identity and access management, authentication protocols, and security compliance
  • Evaluate outputs for technical accuracy, best-practice alignment, risk mitigation, and regulatory compliance
  • Draft realistic IAM scenarios, including user provisioning, role-based access, multi-factor authentication, identity lifecycle management, and incident response
  • Assess AI reasoning around security frameworks, access control policies, and vulnerability management
  • Identify methodological gaps, misunderstandings, or unrealistic assumptions in AI-generated content
  • Create scenario variations from different stakeholder perspectives, such as IT admin, end user, auditor, or compliance officer

Requirements

  • An IAM specialist, security consultant, or IT professional with in-depth knowledge of identity and access management
  • Based in the EU or UK
  • Experienced with IAM frameworks, tools (e.g., Okta, Azure AD, LDAP), authentication protocols, and regulatory environments (GDPR, ISO/IEC 27001, etc.)
  • Comfortable identifying process gaps, misconfigurations, or compliance flaws in IAM scenarios
  • Available 8 to 20 hours per week
  • Able to start in the coming weeks
Benefits
  • Flexible hours
  • Fully remote
  • Apply your IAM expertise to advance AI
  • Help improve widely used AI products
  • Clear project scope and structured onboarding
  • Potential for longer-term collaboration based on performance
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
identity and access managementauthentication protocolssecurity compliancerisk mitigationuser provisioningrole-based accessmulti-factor authenticationidentity lifecycle managementincident responsevulnerability management
Soft Skills
evaluating technical accuracybest-practice alignmentidentifying process gapsassessing misunderstandingscreating scenario variations
Certifications
GDPRISO/IEC 27001