KDN IAM Associate Consultant

Hyderabad, Telangana, India

KPMG India

KPMG is a global network of professional firms providing Audit, Tax and Advisory services.

View company page

The Role: The primary responsibilities of Identity and Management consultant role is to develop and implement modern Identity and Access Management solutions ranging from ID lifecycle management and governance, authentication, authorization and privileged identity management. 

 

The Team / The Business: Candidate will be joining a team of highly motivated and professional individuals. The IAM team is responsible for delivering Identity and Access Management solutions to the multiple organizations across the globe. IAM team has complete purview and control over engineering, architecture, development, deployment and support of Identity and Access Management Systems providing key security services like Identity Governance & Administration, Access Management, Privileged Access Control, SSO, SAML, CASB, Secure DevOps and Modern Directory Services. Team is also responsible for innovation and supporting the integration of IAM services with several hundred applications and working closely with our partners, consultants and alliance partners in implementing security policies that control risk for our clients. The Identity and Access Management team is highly visible due to its place at the heart of security functions , cross-application integration that are distributed across multiple platforms , its enforcement of best practices, and a mandate from KPMG  executive management IAM is at the core of firm’s cyber offerings. 

 

 

The right candidate

 

The ideal candidate will be a motivated IAM consultant, who is willing to provide a range of IAM services to our clients across industry verticals. The role requires a combination of the right skills and experience to address the unique needs of businesses in a variety of industries. 

 

What’s in it for you 

 

 We are hiring for experienced IAM consultants for our IAM practice in Bangalore and Pune. Candidates with experience in any of one these tools - SailPoint IIQ and IDN, Saviynt,  can apply. Having a certification will be an added advantage. Our IAM practice is 100+ people strong if you are looking for a promising career with a people focused, diverse and responsible organization we invite you to join us for a long and healthy mutually successful relationship. 

 

 

Responsibilities

 

 

  • Create IAM reference architectures for existing, new and emerging IAM technologies.
  • Create solutions to address complex, global IAM problems.
  • Design and develop IAM solutions for one or more of the following scenarios 
  • Identity governance and administration
  • User provisioning and deprovisioning
  • Modern access management options
  • single sign-on (SSO), federated identities 
  • multi-factor authentication (MFA) 
  • privileged account management 
  • Participate in Identity and Access Management enterprise governance processes and drive global IAM standards. 
  • Develop effective and scalable IAM architecture solutions to meet project requirements.
  • Create and maintain information Security policies and standards with industry best practices 
  • Manage the successful technical delivery of Information Security projects and services for our customers by working directly with key business stakeholders, executives and project teams. Security consultants are often the technical lead on initiatives and as such must drive the vision and alignment of the solution delivery.  
  • Review and management of technical security roadmaps related to cloud security and IAM within a cloud security context.
  • Deliver technical security configuration architecture expertise in implementing cross-organizational information sharing.
  • Develop solutions and recommendations for issues caused by process challenges, emerging threats and technology changes.

 

 

What We are Looking For

 

 

  • Candidate in this role would be a part of the IAM consultant group. As part of this group, the candidate should have 
  • 2 to 5 years of experience in any one of the following IAM tools 
  • Need strong Java development experience.
  • Sailpoint 
  • Saviynt
  • In-depth understanding of Identity lifecycle management, governance, provisioning workflows, SOD and cloud access governance.
  • Intimately familiar with authentication and authorization protocols such as SAML, SPML, XACML, SCIM, OpenID and OAuth.
  • Knowledge of cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies.
  • Strong experience with Directories, SSO, Federation, Delegated administration, API gateways
  • Good understanding of cloud computing architecture, technical design and implementations, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) delivery models.
  • knowledge of scripting languages including modern java scripts (vbscript, powershell, node.js react etc.).
  • Knowledge of regulatory and compliance policies.
  • Experience of working with functional business and technical teams in a large and complex, environments.
  • Must be able to work independently or with a team, under minimum supervision.
  • Excellent customer service and communication (oral / written) skills required.

 

 

Basic Qualifications

 

 

  • Bachelor's degree in Computer Science, Information Technology or MCA.
  • 2 -5 years of experience in Identity and Access Management

 

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APIs CASB Cloud Compliance Computer Science DevOps Governance IaaS IAM Java Node.js OpenID PaaS PowerShell SaaS SailPoint SAML Scripting SSO

Perks/benefits: Career development

Region: Asia/Pacific
Country: India
Job stats:  3  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.