IAM Security Architect - The Fountain Group
Dallas/Tampa/Jersey City, FL
About the Job
Hello,
My name is Unni, and I am a Recruiter with The Fountain Group. We are a national staffing firm and are currently seeking an IAM Security Architect for a prominent client of ours. This position can be located at Dallas, TX / Tampa, FL / Jersey City, NJ. Details for the position are as follows:
As an Identity Access Management (IAM) Security Architect for the Cybersecurity Architecture Team, you will focus on existing identity access management controls (on-premise and cloud), design new and efficient security architectures, influence change in control standards, create IT security standards easily consumed by stakeholders, create access specific security patterns & diagrams, and own the Identity & Access Management 3 year roadmap.
Drive the Identity & Access Management and secrets management architecture roadmap and share with AES stakeholders
Participate in discovery workshops to understand client’s & Workforce IAM and security needs and provide best practice recommendations to meet IAM use cases. Develop design and architectural diagrams that clearly communicate the proposed solution and flows
Actively participate in the cross-functional team meeting, developing project plans, implementation, testing, pre / post go-live activities, risk management and issue management.
Architect solutions utilizing Ping Identity Products, PlainID and similar IAM products, such as IGA tools, Virtual Directory, PAM and Secret Management solutions.
Create IT security standards easily consumed by stakeholders. Evaluate the existing application security controls, (on-premise and cloud), identify improvements, and build plans into the application security capability roadmap for implementation
Build access management security patterns (standardizing authentication/authorization flows, single-sign-on/MFA, provisioning, user behavior analytics, access governance system controls, privileged/secrets mgt) and designs as part of initiatives to modernize the Client’ access management security posture
Mentor junior security engineers and architects to enhance their cybersecurity and architecture skills
Maintain professional and technical process knowledge by keeping abreast of the changing security landscape within the technology industry and changes in cybersecurity frameworks
Create white papers and present in industry conferences to display thought leadership in the security field
Align risk and control processes into day-to-day responsibilities to monitor and mitigate risk; escalates appropriately
My name is Unni, and I am a Recruiter with The Fountain Group. We are a national staffing firm and are currently seeking an IAM Security Architect for a prominent client of ours. This position can be located at Dallas, TX / Tampa, FL / Jersey City, NJ. Details for the position are as follows:
As an Identity Access Management (IAM) Security Architect for the Cybersecurity Architecture Team, you will focus on existing identity access management controls (on-premise and cloud), design new and efficient security architectures, influence change in control standards, create IT security standards easily consumed by stakeholders, create access specific security patterns & diagrams, and own the Identity & Access Management 3 year roadmap.
Drive the Identity & Access Management and secrets management architecture roadmap and share with AES stakeholders
Participate in discovery workshops to understand client’s & Workforce IAM and security needs and provide best practice recommendations to meet IAM use cases. Develop design and architectural diagrams that clearly communicate the proposed solution and flows
Actively participate in the cross-functional team meeting, developing project plans, implementation, testing, pre / post go-live activities, risk management and issue management.
Architect solutions utilizing Ping Identity Products, PlainID and similar IAM products, such as IGA tools, Virtual Directory, PAM and Secret Management solutions.
Create IT security standards easily consumed by stakeholders. Evaluate the existing application security controls, (on-premise and cloud), identify improvements, and build plans into the application security capability roadmap for implementation
Build access management security patterns (standardizing authentication/authorization flows, single-sign-on/MFA, provisioning, user behavior analytics, access governance system controls, privileged/secrets mgt) and designs as part of initiatives to modernize the Client’ access management security posture
Mentor junior security engineers and architects to enhance their cybersecurity and architecture skills
Maintain professional and technical process knowledge by keeping abreast of the changing security landscape within the technology industry and changes in cybersecurity frameworks
Create white papers and present in industry conferences to display thought leadership in the security field
Align risk and control processes into day-to-day responsibilities to monitor and mitigate risk; escalates appropriately
Source : The Fountain Group