Cybersecurity Consultant focusing on IAM solutions for clients, leveraging extensive IT experience and expertise. Join Datacom to impact technology innovations while ensuring security and access management.
Responsibilities
Design, implement, and support enterprise-class IAM solutions across multiple technologies.
Lead IAM solution delivery with a focus on platforms such as Okta, Microsoft Entra ID, RSA SecurID, Delinea, CyberArk, BeyondTrust, OneIdentity and Yubico.
Engage directly with customers to understand business needs, translate them into IAM requirements, and deliver high-quality solutions.
Influence and guide customers on IAM best practices, roadmaps, and security architecture.
Deliver integrations for workforce and customer identity, including identity governance, SSO, MFA, passwordless, and privileged access management.
Support the full lifecycle of IAM, including Joiner-Mover-Leaver (JML) processes, access governance, privileged access, and federation.
Produce design documentation, technical standards, and contribute to IAM architecture patterns.
Stay across IAM trends and emerging standards (e.g. Passkeys, FIDO2, Zero Trust), bringing forward innovative approaches.
Provide input into security assessments and IAM strategy development.
Mentor and support junior security specialists in IAM.
Requirements
7+ years of IT experience, with at least 5+ years hands-on in Identity & Access Management.
Proven experience with one or more enterprise IAM platforms (Okta, Entra ID, CyberArk, BeyondTrust, Delinea, RSA SecurID, OneIdentity).
Strong knowledge of IAM concepts such as authentication, authorisation, federation, directory services, SAML, OIDC, OAuth, SCIM, and lifecycle automation.
Experience with Privileged Access Management and Identity Governance & Administration (IGA).
Hands-on experience implementing and integrating IAM solutions into complex enterprise environments.
Ability to engage with business stakeholders to align IAM solutions to business outcomes.
Strong written and verbal communication skills, including the ability to create architecture/design documents and present to customers.
A collaborative mindset with the ability to influence and guide others, including customers and peers.
Understanding of broader cybersecurity concepts and how IAM underpins Zero Trust security.
Desirable: Knowledge of passwordless, passkeys, biometrics, and adaptive authentication.
Security Engineer designing and deploying agentic AI systems that operate within enterprise environments for Capgemini. Collaborating on security engineering and applied AI system development.
Security Officer tasked with ensuring safety and access control at Sutter Health facilities. Providing assistance and investigating incidents, while ensuring a safe environment.
Mid - Level Security Design & Development Specialist at Boeing providing architecture and consultation expertise for enterprise directory services. Collaborating with senior technical experts in a fast - paced environment.
Delivery Lead responsible for end - to - end product delivery in the Physical Security Product Team at Wells Fargo. Collaborating with product managers and teams to foster high performance and customer value within agile frameworks.
Compliance professional managing global regulatory changes and providing advisory support. Joining a dedicated team within State Street, the role offers flexible hybrid work arrangements.
Focus Sales role at api GmbH, engaging clients and supporting Cloud business growth. Collaborate with teams for optimal client service and success in IT products.
Security Engineering Manager leading Detection & Response team at Snap. Overseeing security monitoring and team collaboration on high - impact initiatives.
Mid - Level Security Design & Development Specialist at Boeing involved in directory services infrastructure. Collaborating with a team of senior technical experts in a fast - paced environment.
Application Security Specialist conducting SAST and DAST analyses at TEHORA to enhance digital healthcare security. Responsible for code reviews, OWASP recommendations, and participation in intrusion tests.