Home
Jobs

Cyber Security Consultant

6 - 8 years

0 Lacs

Posted:18 hours ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

We are seeking a highly skilled Cyber Security Consultant with deep expertise in Identity and Access Management (IAM), especially with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). The ideal candidate will have hands-on experience designing, implementing, and maintaining IAM solutions across enterprise environments, with a strong focus on access governance, system integrations, workflow development, and security best practices. Key Responsibilities Design, implement, and support enterprise-wide IAM solutions using IBM ISAM and ISIM. Conduct current state assessments and develop IAM roadmaps and architecture strategies. Integrate IAM solutions with enterprise applications, directories, and cloud environments. Define and manage user access policies, entitlements, roles, and segregation of duties (SoD) frameworks. Implement and manage identity lifecycle workflows provisioning, de-provisioning, approvals, notifications, and certifications. Ensure compliance with internal policies and external regulatory standards (e.g., GDPR, SOX). Customize connectors, workflows, rules, and policies based on organizational requirements. Design and develop role-based access control (RBAC) and attribute-based access control (ABAC) models. Develop scripts and utilities to support automation and customization using Java, JavaScript, Shell, or other scripting languages. Integrate IAM solutions with web services, APIs, and SOA-based enterprise systems. Troubleshoot issues and optimize performance of IAM components. Provide security consulting to business and IT stakeholders for identity security-related initiatives. Assist in the development and enforcement of IAM governance and operational models. Stay current with emerging IAM trends, threats, and technologies. Required Skills & Qualifications Bachelor's degree in Computer Science, Information Security, or a related technical field. 6- 8 years of relevant experience in Cybersecurity with a focus on IAM. Hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Solid understanding of identity lifecycle management, access governance, SSO, MFA, and RBAC/ABAC models. Proficiency in Java and scripting languages (Shell, Python, JavaScript). Experience working with REST/SOAP APIs, web services, and SOA workflows. Strong analytical, troubleshooting, and documentation skills. Excellent verbal and written communication, client-facing, and stakeholder management abilities. Exposure to Cloud IAM solutions (e.g., Azure AD, Okta, Ping Identity, AWS IAM). IBM Security certifications or equivalent IAM certifications. Experience with containerized deployments (Docker/Kubernetes) and DevSecOps practices. Understanding of Zero Trust Security and modern authentication protocols (OAuth2, SAML, OIDC). Technical Requirements Strong domain expertise in Identity and Access Governance. In-depth, hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Proven background in IAM consulting and solution architecture. Experience in implementing, supporting, and maintaining IAM solutions. Proficiency in workflow design, rules, role definitions, notifications, certifications, connectors, policies, and entitlements. Good working knowledge of Java, scripting languages, web services, and SOA workflows. Experience with Cloud IAM solutions is a strong plus. (ref:hirist.tech) Show more Show less

Mock Interview

Practice Video Interview with JobPe AI

Start Security Interview Now

My Connections RCM Business Solutions

Download Chrome Extension (See your connection in the RCM Business Solutions )

chrome image
Download Now

RecommendedJobs for You