Key Responsibilities ; - Architectural Design: Define design and implement enterprise IAM strategies frameworks and reference architectures.
- Solution Implementation: Lead end-to-end implementation of IAM solutions including authentication authorization provisioning and governance.
- Technology Leadership: Evaluate recommend and integrate IAM tools (Okta Ping Identity SailPoint ForgeRock Azure AD CyberArk etc.).
- Access Governance: Establish policies for role-based access control (RBAC) attribute-based access control (ABAC) privileged access management (PAM) and single sign-on (SSO).
- Security & Compliance: Ensure IAM architecture meets regulatory standards (ISO 27001 GDPR SOX HIPAA etc.) and aligns with Zero Trust principles.
- Collaboration: Partner with cross-functional teams (security infrastructure cloud application teams) to integrate IAM solutions across hybrid environments.
- Continuous Improvement: Conduct security assessments identify risks and recommend improvements for IAM maturity.
- Mentorship: Guide development and operations teams in implementing IAM best practices and secure coding guidelines.
Key Responsibilities ; Architectural Design: Define design and implement enterprise IAM strategies frameworks and reference architectures. Solution Implementation: Lead end-to-end implementation of IAM solutions including authentication authorization provisioning and governance. Technology Lead...
Key Responsibilities ; - Architectural Design: Define design and implement enterprise IAM strategies frameworks and reference architectures.
- Solution Implementation: Lead end-to-end implementation of IAM solutions including authentication authorization provisioning and governance.
- Technology Leadership: Evaluate recommend and integrate IAM tools (Okta Ping Identity SailPoint ForgeRock Azure AD CyberArk etc.).
- Access Governance: Establish policies for role-based access control (RBAC) attribute-based access control (ABAC) privileged access management (PAM) and single sign-on (SSO).
- Security & Compliance: Ensure IAM architecture meets regulatory standards (ISO 27001 GDPR SOX HIPAA etc.) and aligns with Zero Trust principles.
- Collaboration: Partner with cross-functional teams (security infrastructure cloud application teams) to integrate IAM solutions across hybrid environments.
- Continuous Improvement: Conduct security assessments identify risks and recommend improvements for IAM maturity.
- Mentorship: Guide development and operations teams in implementing IAM best practices and secure coding guidelines.
View more
View less