ID DE POSTE:
703310BR
CATÉGORIE D’EMPLOI:
Consultant
TYPE D’EMPLOI:
Full-Time
POSTE ADMISSIBLE À UNE PRIME DE RECOMMANDATION:
Yes
DESCRIPTION DE L’EMPLOI
Introduction
The IAM Security professional will be responsible for providing expertise and guidance to clients regarding the implementation, configuration, and usage of IBM Security Verify Access (ISVA) and manage operations support for large IAM implementation. As a IAM Security professional, it will be required work closely with clients to understand their business requirements, assess their existing systems, and recommend optimal solutions utilizing IBM IAM products. The role will involve collaborating with cross-functional teams, conducting workshops and training sessions, and providing ongoing support to ensure successful implementation and adoption of IBM IAM products.
Your Role and Responsibilities
The IAM Security professional will be responsible for providing expertise and guidance to clients regarding the implementation, configuration, and usage of IBM Security Verify Access (ISVA) and manage operations support for large IAM implementation. As a IAM Security professional, it will be required work closely with clients to understand their business requirements, assess their existing systems, and recommend optimal solutions utilizing IBM IAM products. The role will involve collaborating with cross-functional teams, conducting workshops and training sessions, and providing ongoing support to ensure successful implementation and adoption of IBM IAM products.
The IAM Security professional will be responsible for providing expertise and guidance to clients regarding the implementation, configuration, and usage of IBM Security Verify Access (ISVA) and manage operations support for large IAM implementation. As a IAM Security professional, it will be required work closely with clients to understand their business requirements, assess their existing systems, and recommend optimal solutions utilizing IBM IAM products. The role will involve collaborating with cross-functional teams, conducting workshops and training sessions, and providing ongoing support to ensure successful implementation and adoption of IBM IAM products.
Your Role and Responsibilities
The IAM Security professional will be responsible for providing expertise and guidance to clients regarding the implementation, configuration, and usage of IBM Security Verify Access (ISVA) and manage operations support for large IAM implementation. As a IAM Security professional, it will be required work closely with clients to understand their business requirements, assess their existing systems, and recommend optimal solutions utilizing IBM IAM products. The role will involve collaborating with cross-functional teams, conducting workshops and training sessions, and providing ongoing support to ensure successful implementation and adoption of IBM IAM products.
Responsibilities & Duties:
- Engage with clients to understand their business needs and objectives related to identity and access management.
- Assess clients’ existing systems, processes, and infrastructure to identify gaps and opportunities for ISVA integration
- Design and architect IAM solutions tailored to meet clients’ requirements.
- Collaborate with technical teams to ensure successful implementation, configuration, and customization of IAM products.
- Conduct workshops and training sessions for clients’ stakeholders to educate them on IAM functionalities and best practices.
- Provide guidance and support to clients throughout the project lifecycle, including troubleshooting, issue resolution, and ongoing maintenance.
- Document project requirements, specifications, and deliverables.
- Coordinate, collate and validate artefacts related to Audit queries based on this provide remediation of identified gaps
- Manage operations support for IAM environment that involves but not limited to
- Incident Management
- Problem Management
- Minor security patches
- Defect fixes for recurrent incidents
- IAM vendor co-ordination
- Application On-boarding
- Audit Support
- Operations Management
Required Technical and Professional Expertise
- Degree in Information Technology or Computer Science or Network / Telecommunications Engineer B.Tech., B.E, MCA, M.Sc. IT.(Mandatory either of these)
- ISVA Certification
- 10+ years of experience in IAM Architecture Design, IAM Consulting, Identity and Access Governance experience
- Specialized on: IBM IAM Products IBM Security Verify Access (ISVA) (also known as ISAM – IBM Security access manager)
- Proven experience as a IAM security professional in client-facing role, preferably in the field of identity and access management.
- Strong knowledge of IBM Verify products, including IBM Verify Access and IBM Verify Directory.
- Familiarity with related technologies such as SSO (Single Sign-On), multi-factor authentication (MFA), and identity federation.
- Experience with identity and access management (IAM) frameworks, protocols, and standards (e.g., OAuth, OpenID Connect, SAML).
- Proficiency in designing and implementing IAM solutions in complex enterprise environments.
- Experience in managing operations in large IAM implementations with ISVA
- Strong problem-solving and analytical skills to identify and resolve technical issues.
- Degree in Information Technology or Computer Science or Network / Telecommunications Engineer B.Tech., B.E, MCA, M.Sc. IT.(Mandatory either of these)
- ISVA Certification
- Professional Qualifications – Desired – Any Certification in cyber security like CISSP, CISP.
Preferred Technical and Professional Expertise
- Degree in Information Technology or Computer Science or Network / Telecommunications Engineer B.Tech., B.E, MCA, M.Sc. IT.(Mandatory either of these)
- ISVA Certification
- Professional Qualifications – Desired – Any Certification in cyber security like CISSP, CISP.