Description

Job Description:

  • 10+ years of experience in Identity and Access Management or related fields.
  • Strong knowledge of IAM principles, technologies, and best practices.
  • Hands-on experience with IAM tools such as Okta, Azure AD, SailPoint, or Ping Identity.
  • Familiarity with authentication protocols (e.g., SAML, OAuth, OpenID Connect) and standards.
  • Understanding of compliance requirements and regulatory frameworks related to identity and access management.
  • Excellent analytical and problem-solving skills, with the ability to communicate complex concepts clearly.

Preferred Certifications:

  • Certified Identity and Access Manager (CIAM)

Job Responsibilities:

IAM Strategy Development:

  • Develop and implement a comprehensive IAM strategy aligned with organizational goals and regulatory requirements.
  • Assess existing IAM processes and technologies, identifying areas for improvement and enhancements.

Identity Governance and Administration:

  • Design and manage identity governance processes, including user provisioning, de-provisioning, and role-based access control (RBAC).
  • Establish and maintain access control policies, ensuring that users have appropriate access rights based on their roles.

Authentication and Authorization:

  • Implement and manage authentication mechanisms, including multi-factor authentication (MFA) and single sign-on (SSO) solutions.
  • Collaborate with application teams to ensure secure authorization practices are integrated into applications and services.

IAM Technologies:

  • Evaluate, implement, and manage IAM tools and technologies such as Okta, Azure AD, SailPoint, IBM Security Identity Governance and Intelligence, and Ping Identity.
  • Ensure that IAM solutions are scalable, secure, and compliant with industry standards.

Compliance and Risk Management:

  • Ensure IAM practices comply with regulatory frameworks such as GDPR, HIPAA, SOX, and PCI DSS.
  • Conduct regular risk assessments related to identity and access management, implementing controls to mitigate identified risks.

Monitoring and Incident Response:

  • Monitor IAM activities for unusual behavior or policy violations, responding promptly to incidents and breaches.
  • Collaborate with security operations teams to investigate and remediate IAM-related security incidents.

Integration and Automation:

  • Integrate IAM solutions with existing enterprise systems, ensuring seamless workflows for user provisioning and de-provisioning.
  • Leverage automation to streamline IAM processes, enhancing efficiency and reducing manual effort.

User Training and Awareness:

  • Develop training programs and documentation to educate employees about IAM policies and practices.
  • Promote awareness of identity and access management principles across the organization.

Collaboration and Stakeholder Engagement:

  • Work closely with IT, security, and application development teams to align IAM initiatives with overall security strategies.
  • Engage with stakeholders to gather requirements and provide IAM solutions that meet their needs.

Education

Any Graduate