Job Description
The Advanced Security Architect will be a key contributor to the IAM Architecture and Governance team, responsible for the strategy, design, development, and implementing the Company’s enterprise IAM program. This role will focus on governance of the IAM program in Access Management (SSO/MFA), Directory Services, IAM Governance, and Privileged access management areas. This role contributes to security best practices by developing modern IAM solutions that improve access processes, reducing friction, and ensure the organization’s accounts have the appropriate access at the right time.
Requirements:
- Minimum 3 years of experience in identity and access management, with a focus on PingOne and privileged access management.
- Proficiency in PingOne, Ping Access, and Ping Federate, including DaVinci.
- Strong knowledge of Entra and identity governance solutions.
- Experience with directory services and familiarity with IGA providers (e.g., SailPoint, Saviynt, Radiant, AD, LDAP, Entra).
- Expertise in at least two IAM areas, such as Identity Governance & Administration (IGA), Directory Services (Azure, AD, LDAP Oracle), Access Management (SSO, Federations), and Privileged Access Management (PAM).
- Subject Matter Expert in SAML, OAuth, and OIDC,.
- Collaborative approach, with strong problem-solving and documentation skills to support various stakeholders and expertise levels.
- This role contributes to security best practices by developing modern IAM solutions that improve access processes, reduce friction, and ensure the organization’s accounts adhere to zero trust model
Key Responsibilities
- Design and optimization of IAM solutions, strategies, and technologies including In-house developed solutions, PingOne, Entra, Radiant Logic, SailPoint, Saviynt, etc.
- Design and maintain software systems that protect sensitive information.
- Identify, evaluate, and mitigate complex IAM and technology risks.
- Provide technical guidance and training to implementation teams.
- Collaborate with cross-functional teams to gather requirements and design tailored IAM solutions that align with security best practices.
- Document and maintain IAM architectures, including creating flow charts, diagrams, and related documentation.
- Analyze and optimize the IAM environment, identifying areas for automation and streamlining access processes, such as onboarding and offboarding.
- Enhance security posture through automation in access reviews and compliance, reducing friction in IAM processes to enable secure, timely access across accounts.