What is the opportunity? This is a deep technical role with a focus on IAM architecture in both On-Prem and Cloud environments.
The IAM Architect works across multiple technical and business functions to deliver secure systems for our staff and clients.
What will you do? Define enterprise security architecture for internal and external IAM capabilities Serve as IAM expert, educator and trusted advisor to key business and technology partners Support solution architects designing in alignment to the enterprise IAM architecture Partner with stakeholders within business units, Governance, Risk, the EA Community of Practice, and teams in key related capability areas.
Bring together the organization to solve big IAM problems and gaps What do you need to succeed? Must-have : Proven track record of increasing responsibility for positioning and delivering Security Architecture and IAM related services across large complicated organizations Proven experience understanding current state, desired capabilities and documenting target architectures, gaps, roadmaps and architectural patterns Particular focus on authentication and authorization : customer, employee, APIs, federation, SSO, risk based, policy driven, continuous, biometrics, mobile and understanding of JWT, OIDC, OAuth2, SAMLv2, XACML Experience performing security design reviews to assess security implications for introduction of new or differing technologies within the environment Willingness and ability to work with teams and influence Senior leaders, including ability to build relationships using an open and respectful communication and collaboration style Demonstrated effective and strong written and verbal communication skills Nice-
to-have : In-depth experience and proven track record with architecting and maturing enterprise and customer IAM capabilities Experience with service-
oriented architecture particularly for Cloud-based services Solid and practical understanding of the end-to-end information technology (IT) process, including architecture, design, engineering, implementation, and operations Ability to provide direction and guidance on architectural use cases and requirements for security related efforts Knowledge of information security standards (e.
g., ISO 17799 / 27002, NIST 800-63, etc.), Zero Trust, rules and regulations related to information security, data protection and privacy Strong vendor management, with experience holding vendors to account, working with them to improve their products, services and overall security