Project details
Recommended projects
Fullstack Engineer (m/f/d)
Cyber Security Consultant – Product Security & Regulatory Compliance (m/f/d)
Java IT Architect (m/f/d)
IT Project Manager ISO 27.001 - Gap Closure (m/f/d)
Data Engineer (m/f/d)
Senior Cloud Developer TypeScript (m/f/d)
Cyber Risk Consulting (Senior Level)
Senior Factor 10 Developer (IPS / IPM) (m/f/d)
Senior Project Manager Customer Interaction
Adobe Experience Cloud Consultant (m/f/d)
Freelance Product Manager for Android App (m/f/d)
Infor AS Consultant (m/f/d)
Evaluation Scenario Writer (m/w/d)
Senior Regulatory Compliance Expert (FDA Inspection Preparation) (m/f/d)
Freelance Automotive Engineer (with Python) - Quality Assurance / AI Trainer
ERP Transformation Manager (m/f/d)
Project Manager Brand Guardianship (m/f/d)
Management Consultant (Senior Level) (m/f/d)
Freelance Cybersecurity Consultant for AI Red Teaming
Control System Technician / Control Systems Specialist (m/f/d)
IT Project Manager ServiceNow (Senior)
HSE Specialist – Facilities (M/F/D)
Freelance Product Owner for Point of Sale App
Tax Strategy Consulting
Quality Compliance Auditor (GCP/GCLP/GVP) (M/W/D)
HSE Specialist – Cell Manufacturing
Safety and Health Protection Coordinator (SiGeKo) and Safety Specialist (SiFa) (m/f/d)
TM1 Planning Analytics and Interfaces Development (m/f/d)
Commissioning & Qualification (C&Q) Engineer (m/w/d)
Construction & Contractor Safety Specialist (SigeKo) (M/w/d)
Frontend developer to HR platform with Angular experience
Time's up! We are no longer accepting applications.
Consulting for Data Center Migration of a Linux Environment and IAM Platform (m/f/d)
Project info
- Period10.11.2025 - 09.02.2026
- Capacityfrom 95%
- Daily rate650 - 850€
- LocationKarlsruhe, Germany
- Languages
- German(Advanced),
- English(Advanced)
- German
- Remotefrom 95%
Description
Objective: Reorganization and migration of the existing Linux infrastructure and IAM platform to a hybrid target environment (on-premises + hyperscaler)
Building Blocks:
Analysis & Target Architecture
Survey of existing Linux systems, workloads, and interfaces
Design of a scalable and highly available target infrastructure (incl. network and storage concepts)
Definition of the target architecture considering scalability, security, and availability
Assessment of the existing IAM solution
Survey of the existing IAM platform, workloads, and interfaces
Definition of the new target infrastructure (on-premises & cloud)
Integration of the existing IAM solution
Adoption and integration of the existing IAM structure into the new target infrastructure (e.g., IDM, LDAP, Azure AD)
Architecture for central authentication & authorization across all target environments
SSO and MFA concepts incl. federation with hyperscalers (e.g., SAML, OIDC, SCIM)
Ensuring auditability and compliance requirements (GDPR, ISO27001)
Migration strategy
Definition of migration paths: lift & shift, replatforming
Definition, planning, and orchestration of moves including downtime, fallback, and test concepts
Automation & Standardization
Further development of IaC (e.g., Terraform, Ansible)
Creation of reusable system and security modules
Hybrid/Multi-Cloud Architecture
Design and implementation of cloud connectivity (e.g., AWS, Azure, GCP)
Securing and identity federation of cloud resources with the existing IAM
Introduction of a consistent identity lifecycle
Handover & Documentation
Creation of operational, architecture, and security documentation
Conducting knowledge transfer workshops for operations and security
Requirements
- Architecture and migration of distributed Linux infrastructures in traditional and cloud data centers
- Integration of existing IAM solutions into hybrid and multi-cloud environments
- Ensuring role and rights management across hybrid and multi-cloud environments
- Cloud integration with e.g., AWS IAM, Azure RBAC, GCP IAM, SSO/SAML/OIDC federation
- Access control at system, application, and API levels
- Zero-trust strategies & segmentation of access rights
- Automation (Ansible, Terraform), containerization (Kubernetes), CI/CD pipelines
- Network & security architecture (VPN, MFA, SSH access controls)
- Monitoring, logging & auditing (e.g., Azure Monitor, Prometheus)