Key Responsibilities * Designing and Architecting IAM Systems: * Create comprehensive, scalable, and secure IAM frameworks, covering core components such as Authentication, Authorization, User Lifecycle Management, Role-Based Access Control (RBAC), Privileged Access Management (PAM), and Single Sign-On (SSO) solutions. * Develop technical designs, architectural blueprints, and strategic roadmaps based on defined business requirements and security policies. * Integration and Implementation: * Oversee and execute the integration of IAM tools (e.g., SailPoint, Okta, CyberArk) with legacy and modern enterprise systems (e.g., Active Directory, Azure AD, LDAP directories, J2EE applications). * Utilize APIs, web services, and other integration methodologies to ensure seamless functionality across multi-tiered environments. * Manage the deployment, rigorous testing, and lifecycle management of all IAM components. * Assessing and Improving Security: * Perform vulnerability analyses, situational testing, and risk assessments on IAM infrastructure, applications, and networks to identify and mitigate security weaknesses. * Develop and implement solutions to protect sensitive data, including PKI (Public Key Infrastructure), advanced encryption methods, and robust certificate management processes. * Collaboration and Stakeholder Engagement: * Act as the primary technical subject matter expert (SME), working closely with business leaders, IT teams, Security Architects, and Project Managers. * Gather requirements, align on technical strategies, and resolve complex cross-functional issues. * Participate in governance processes, contribute to security policy development, and support internal and external audits to enforce standards and best practices. * Innovation and Strategy: * Research, evaluate, and develop enterprise-wide strategies for new and emerging IAM technologies (e.g., Passwordless, Zero Trust). * Drive the adoption of standard reference architectures and contribute to continuous improvement initiatives. * Provide technical expertise as an escalation point for complex IAM-related issues. * Monitoring and Maintenance: * Conduct ongoing system monitoring, performance optimization, break-fix repairs, and platform upgrades. * Generate key performance metrics, review security logs, and ensure continuous compliance with regulatory requirements (e.g., GDPR, HIPAA). Qualifications Required Skills and Experience * Education: Bachelors or Master’s degree in Computer Science, Information Technology, Engineering, or a closely related field. * Experience: * 5–10+ years of progressive experience in Information Technology. * 3–5 years of dedicated experience in IDAM solutions architecture, implementation, and multi-tiered integrations. * Proven experience with leading IAM platforms such as SailPoint, Okta, CyberArk, Oracle IAM, or similar technologies.