IAM Security Architect, Identity Life Cycle Management
Hoboken, NJ, US, 07030
Full Time Senior-level / Expert USD 123K - 253K
EY
EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.
The opportunity
The Identity & Access Management (IAM) Identity Lifecycle Management (ILM) Architect reports to the Domain Architect Lead for IAM Architecture in a hands-on role focused on the security architecture in the identity lifecycle management and provisioning space. The architect works directly with Lead Development, Engineering and Operational resources through collaboration and mentoring to shape the IAM capabilities for the firm.
Your key responsibilities
The Identity and Access Management (IAM) ILM Architect is accountable and responsible for the alignment of business, operational and security requirements and translation of those requirements into technical IAM capabilities. IAM services include, but not limited to, Identity Lifecycle Management, authentication and authorization, session management, access requests, access provisioning, access reauthorization, remote access, IAM services API, role and entitlement models, and directory technologies. The IAM ILM Architect will work with other Architects and Service Owners to create a roadmap that meets strategic and current requirements
Skills and attributes for success
- Extensive experience working with IAM Technologies including strong experience with Sailpoint and some experience with other identity Lifecycle management products such as FIM, MIM, Azure AD connect/Microsoft Entra Connect
- Must have proven experience in providing architecture guidance and advisory services to clients for various environments and systems, including application/technology blueprints, roadmaps, optimization, and migration strategies.
- Responsible for managing end-user identity, end-user application access, application resource access, directory maintenance, to include the user and application security lifecycle from provisioning to de-provisioning of access rights.
- Deliver technical security configuration architecture expertise in implementing cross-organizational information sharing.
- Develop solutions and recommendations for issues caused by process challenges, emerging threats and technology changes.
- Act as trusted security architecture advisor with extensive evidence of ability to provide strategic direction in leading activities in support of Identity Lifecycle management tools & technologies and enterprise security objectives.
- Provide professional knowledge and experience of information systems security identity policies and large enterprise scale practices.
- Develop security architectures, and engineering system specifications implementing identity management and security controls in development and operational systems.
- Solid understanding application and systems security architecture and best practices.
To qualify for the role you must have
- The individual in this role must be able to understand and interpret identity and access management strategies and direction. Further, the person must be able to bring together key tenets of Information Security to the IAM strategies and develop technical security solutions that properly align.
- The IAM Security Architect will contribute to the overall effort of the IAM direction of the firm. The individual in this role must be well educated in general aspects of Information Security, namely:
- SME knowledge of Sailpoint IdentityIQ (IIQ), Sailpoint File Access Manager (FAM) and Active Directory.
- Strong knowledge of Microsoft Identity Management products (FIM/MIM), Azure AD connect/Microsoft Entra Connect
- Knowledge of Active Role Server, Microsoft Entra access review
- Strong knowledge of Exchange and PowerShell, SQL Server, Microsoft SQL Server Integration Services (SSIS)
- Strong network and host security background in Windows
- 6+ years’ experience in hands-on Identity Management positions
- Must have an experience of implementing an enterprise level IAM (ILM) infrastructure.
- Ability to secure solution architecture solutions
- Ability to effectively communicate and advocate key security requirements and control implementation to the development team
Ideally, you’ll also have
- IT Strategy
- Enterprise Architecture
- Experience in IDM integration across domains
- Significant experience in ADDS, Azure AD/Microsoft Entra Connect
- Ability to communicate effectively with all levels of management, both verbally and in writing
- Significant experience in Oracle DB & Microsoft SQL Server
- Experience with ABAC, RBAC
- Security architecture and engineering experience
- Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
Tags: Active Directory APIs Application security Azure IAM Oracle PowerShell SailPoint SQL SQL Server Strategy Windows
Perks/benefits: Career development Flex hours Flex vacation Health care Team events Transparency
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs