Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailConvatec is exploring the need for adding an Architect in the existing Architecture team who would focus on providing strength and skills in Digital Work place and Identity management
The architecture would support projects and initiatives
Act as an bridge between Solution Architecture Platform Architecture IT Delivery (Engineering) and IT Operations
Understanding IAM Principles: Knowledge of fundamental IAM concepts such as authentication authorization user provisioning and de-provisioning is crucial.
Implementation of IAM Solutions: Proficiency in implementing IAM solutions using tools like Okta Microsoft Azure AD Azure B2C and SailPoint.
Implementation of Privilege Access Management Solutions: Proficiency in implementing PAM solutions using tools like Okta Microsoft Azure AD Delinea Salesforce or Omada
Expertise in Directory Services: Experience with directory services like Active Directory Active Directory Federation Services Entra AD Azure B2C and LDAP including their integration and management.
Schema Management: Ability to design and manage directory schema to support business requirements.
Role Based Access: Knowledge of fundamental Role Based Access concepts and best practices is crucial.
Familiarity with Security Protocols: Knowledge of protocols like SAML OAuth OpenID Connect LDAP DMARC DKIM SPF and RADIUS is essential for securing communications.
Private Key Infrastructure: Knowledge of Microsoft PKI services both on premise and on Azure Cloud.
Compliance and Standards: Understanding of industry standards and compliance requirements such as GDPR HIPAA and NIST.
MS Exchange: Proficiency in Microsoft Exchange and Exchange online on hybrid environments.
Transactional email: Knowledge of transactional email concepts and platforms like Postfix Postmark and Mailchimp.
Teams Voice and Collaboration: Knowledge of Office 365 services such as Copilot SharePoint OneDrive Teams services and endpoint devices Teams voice services protocols and hybrid infrastructure architecture.
Knowledge of MECM: Proficiency in SCCM and Intune service deployments and integrations such as Patch My PC.
Mobile Device Management: Knowledge mobile device management tools such as Microsoft Intune Apple Business Manager or MaaS360.
Programming Languages: Proficiency in languages such as Java Python and C# for developing customized identity solutions.
Scripting Skills: Knowledge of scripting for automation and integration using tools like PowerShell and Batch.
Analytical Thinking: Ability to analyse complex problems related to identity and access management and develop effective solutions.
Root Cause Analysis: Proficiency in identifying the root causes of issues and implementing corrective measures.
Risk Analysis: Evaluating potential risks to identity systems and developing strategies to mitigate these risks.
Security Audits: Conducting regular audits to ensure compliance with security policies and standards.
Project Planning: Ability to plan and manage IAM projects ensuring they are completed on time and within budget.
Team Coordination: Coordinating with cross-functional teams to achieve project goals and objectives.
Effective Communication: Ability to communicate complex technical concepts to non-technical stakeholders.
Documentation Skills: Proficiency in creating clear and concise documentation for identity systems and processes.
Team Collaboration: Working effectively with other IT professionals including network engineers security analysts and software developers.
Stakeholder Engagement: Engaging with stakeholders to understand their requirements and ensure their needs are met.
Learning Agility: Ability to quickly learn and adapt to new technologies and industry trends.
Flexibility: Being flexible and open to change in a dynamic and fast-paced environment.
AI Integration: Leveraging AI and machine learning to enhance identity verification and fraud detection.
Behavioural Analytics: Using behavioural analytics to identify and respond to unusual access patterns.
Zero Trust Principles: Implementing Zero Trust principles to ensure secure access to resources regardless of the location of the user.
Micro-Segmentation: Dividing networks into micro-segments to limit the lateral movement of threats.
#LI-Hybrid
#LI-AR2
Beware of scams online or from individuals claiming to represent Convatec
A formal recruitment process is required for all our opportunities prior to any offer of employment. This will include an interview confirmed by an official Convatec email address.
If you receive a suspicious approach over social media text message email or phone call about recruitment at Convatec do not disclose any personal information or pay any fees whatsoever. If youre unsure please contact us at .
Equal opportunities
Convatec provides equal employment opportunities for all current employees and applicants for employment. This policy means that no one will be discriminated against because of race religion creed color national origin nationality citizenship ancestry sex age marital status physical or mental disability affectional or sexual orientation gender identity military or veteran status genetic predisposing characteristics or any other basis prohibited by law.
Notice to Agency and Search Firm Representatives
Convatec is not accepting unsolicited resumes from agencies and/or search firms for this job posting. Resumes submitted to any Convatec employee by a third party agency and/or search firm without a valid written and signed search agreement will become the sole property of Convatec. No fee will be paid if a candidate is hired for this position as a result of an unsolicited agency or search firm referral. Thank you.
Already a Convatec employee
If you are an active employee at Convatec please do not apply here. Go to the Career Worklet on your Workday home page and View Convatec Internal Career Site - Find Jobs. Thank you!
Full-Time