IAM Technical Architect

Gravity IT Resources

To Apply for this Job Click Here

Job Title: Identity and Access Management (IAM) Architect

Location: Deerfield Beach, Florida (Hybrid)

Job-Type: Direct Hire

Employment Eligibility: Gravity cannot transfer nor sponsor a work visa for this position. Applicants must be eligible to work in the U.S. for any employer directly (we are not open to contract or “corp to corp” agreements).

Summary
The Identity and Access Management (IAM) Architect will report to the Identity and Access Management Manager and support Information Security to provide the highest quality service to our clients business units and customers. The IAM Architect performs daily functions required to maintain the standards and controls for Information Security to protect our clients information assets, works with critical and sensitive information, and is relied upon to maintain security and least privileged safeguards. The IAM Architect is accountable for providing day-to-day architectural and administration strategy and tactical direction of Identity Management services, as well as support and provide mentorship for Identity Management project-based activities. The role is required to provide expert-level guidance and application of both real-world experiences and education-based best practices. The IAM Architect will seek to drive value and enhancement in the products and services provided to our businesses and to work closely with the engineers to prioritize alignment of enhancements and lifecycle tasks. Ultimately, the IAM Architect is the Product or Services Owner and is responsible for the quality of the product that is delivered. The ideal candidate has a strong drive and passion for Information Security, specifically the IAM space, and can effectively communicate the value it brings to the business.
The candidate filling this role is expected to take the lead in gaining technical understanding of solutions and platforms, and gain working technical knowledge in enabling capabilities through enhanced product and service offerings. This role will be working hands on to develop proof-of-concepts (POC) to identify viable options for implementing technology capability needs. This role will also define technology-use standards and seek to govern those use standards with peer architects through knowledge sharing and mentoring.  The candidate should be highly organized and analytic, capable of solving business problems through the appropriate use of technology.
Responsibilities:

  • Design and implement reliable, scalable, high performing IAM products and solutions that meet our clients governance, procedures, standards, and processes
  • Drive the technical vision and design to ensure security architecture is compliant with the least privileged model
  • Lead the development of solution designs, roadmaps, and system transition plans to align projects, business, application, data, and integration, and/or infrastructure architecture
  • Partner with product, development, project, engineering, and other architects to resolve and mitigate risks while addressing business requirements
  • Ensure compliance to security architecture standards and processes
  • Work with project teams and business users to create and guide detailed design plans and documentation
  • Define enterprise IAM security standards and policies to comply with governance control framework to ensure compliance and adherence
  • Review, update, and recommend changes to IAM policies, standards, and procedures to mature the IAM program
  • Serve as the technical subject matter expert and a key decision maker for IAM architecture and strategy, including how it relates to cloud security, network security, and other platforms related to security efforts
  • Catalog the current enterprise technology environment and maintain an accurate representation of the ecosystem
  • Write specifications, how-to documentation, test plans and test reports
  • Work with leaders and team members at all levels and across functional areas
  • Design and aid in the creation of Identity Management standards for new projects
  • Work independently and self-directed, while also providing guidance and mentorship to the engineering and support teams within IAM
  • Stay motivated to learn new technologies and continue training to strengthen skills in boosting existing and emerging technologies
  • Direct and manage vendors and contractors to build identity programs and services
  • Own strategy and direction for Identity and Access technical programs and projects
  • Lead efforts to define authentication and authorization strategy, working cross-functionally with Architects, Engineers, Product Owners, and other Security Specialists
  • Work within both on-premises and cloud-based identity and provisioning systems
  • Maintain and further enhance IDM frameworks, models, and tools for delivering IAM services
  • Design, develop, and implement custom identity integration solutions
  • Identify business requirements in business systems implementation projects regarding identity
  • Expert comprehension of project management methods including SAFE, Agile and Scrum frameworks
  • Identify and manage IAM architectural issues of various platforms, applications, and systems, in order to plan and solution to problem resolution according to standardized processes

Knowledge, skills, abilities, and competencies:

  • Strategic and forward-thinking technology leader with deep expertise in technology strategy
  • Must be able to elicit technical requirements with limited information or guidance to architect solutions that meet both business and enterprise needs
  • Identifies deficiencies in technology solutions and works with appropriate technical teams to resolve
  • Can break complex and large technical solutions into manageable activities and priorities
  • Ability to communicate with both business and technical resources, particularly with the skill of expressing complex issues with clarity and simplicity
  • Takes personal ownership for the outcomes of their services and product
  • Speaks up in group situations with clear, helpful, and honest communication to bring solutions to problems
  • Effective in use of listening skills and earning trust of others up, down and across the organization
  • Flexible and responsive; able to perform in a fast-paced, dynamic work environment and meet aggressive deadlines
  • Open to idea exploration with strong analytical abilities
  • Embodies a learning spirit through continuous self-learning and imparting knowledge with others.
  • Leads, motivates, and inspires teams
  • Able to recognize the true meaning of opportunities, situations, and circumstances to provide meaningful mentoring and guidance
  • Teaches by example in daily actions and provides personal feedback and coaching to others
  • Possess executive-level communication and presentation skills
  • Should be self-driven and innovative
  • Ability to work effectively with all levels, both independently and as part of a team
  • Understands how to leverage the organizational structure and using interpersonal relationships can influence others to drive decisions quickly

Qualifications:

  • Bachelor’s degree in computer science, Information Technology, Computer Engineering, and/or 10 years related experience in an IT discipline
  • Ability to work in a matrixed and collaborative environment
  • 5+ years’ experience working in Identity and Access Management
  • 8+ years’ experience in IT Security
  • Expert   knowledge of authentication and authorization standards (i.e., SAML, OAUTH, NTLM, LDAP, etc.)
  • Strong knowledge across the technology stack such as web protocols, multiple operating systems, and distributed systems architecture
  • Strong discipline regarding enforcement of access management principles
  • Experience influencing management on technical or business solutions
  • Experience with Microsoft Azure, Multi-factor authentication, SSO, Identity Governance Solutions, and Privileged Account Management technologies
  • Knowledge and understanding of diverse platforms and operating systems, including current and emerging technologies
  • License/Certifications (any of the following are a plus): CISSP, CISA, CAP, CEH, CSSLP, CHFI, CCSP, GCIH, GCIA, PMP, ITIL v3

 

To Apply for this Job Click Here