Notice Period: Immediate -15 days
Number of Openings: 3
Job Summary
We are looking for a Solutions Architect with specialist knowledge of Identity Governance and Administration. Our clients are exasperated by the slow drawl of applications onboarding the preponderance of poor identity data and directory architecture that impede the delivery of identity governance. Our clients are dealing with mergers and acquisitions and complex migration patterns of their applications to PaaS and IaaS platforms. The successful candidate for this role will have the vision,foresight, technical calibre and the temperament to guide our clients through this complexity.
To be successful in this role, you would typically have the following mix of experiences and skills:
- You will have delivered at least two identity governance programmes as aTechnical or Solutions Architect either as a part of the client-side team or as a consultancy working for a client. Hands on Saviynt development, deployment experience preferred.
- You will have an in-depth understanding of directory services infrastructure, Microsoft Entra Identity Governance capabilities and would have integrated third party and employee authoritative sources like Fieldglass, Workday or SuccessFactors.
- You will have a good business understanding of Third-Party Access controls required and their impact on Identity and Access Governance and solutions design.
- Expertise in managing mergers and acquisitions, as well as the subsequent integration or division of Identity Infrastructure, will be highly valued for this position.
- Previous experience of building access models for IaaS and PaaS platforms, Just in time Access and or experience in Access Governance for AWS, GCP and Microsoft Cloud based services, applications and infrastructure will behighly valuable for this position.
- Effective communicator, active listener, patient interlocutor and collaborative team player all in one.
- You will have published point of views in professional publications related to Identity Governance or Identity Management. You share your knowledge empathetically and participatively.
- Strong grounding in Cyber Security concepts, including resilience, data governance, network security, supported by certifications like CISSP or CISM.
- Enterprise Architecture credentials –TOGAF, Zachman, DoDAF desired but not essential
- Although it is given, you are at home troubleshooting configuration on at least two of the following Identity Governance solutions – Saviynt, SailPoint, Omada, One Identity, Microsoft Entra, Okta.