Job Description :
General Security Architect & Identity & Access Management Description:
At least 5 years relevant experience as a Security Architect.
Maintains expertise as SME in security, and defines architectural standards and best practices within this discipline
Interacts with senior management to effect solutions for enterprise business requirements
Guides architectural focus group as prime subject matter expert for security
Mentors Team members on new technologies in security
Prepares and maintains documents including architecture diagrams, data models, and navigation maps
Presents recommendations to address issues and risks in technology and processes across the organization
Compile, develop, deliver, and evangelize security reference architectures and best practices that address critical security challenges and provide commercially responsible security guardrails for technology
Influence stakeholders and ensure alignment with security strategy and architecture principles by driving collaboration across the enterprise’s technology architecture functions, the inclusion of security strategy roadmaps into enterprise technology roadmaps, and the adoption of security reference architectures and best practices
Strong understanding and experience within large Enterprise Identity & Access Management (IAM) capabilities and technologies
Deep understanding of IAM capabilities tied to a framework approach
Direct hands on experience with large scale IAM projects and large scale transformational initiatives
Experience with Enterprise IAM platforms a plus (Oracle, Microsoft Azure AD, Okta, CyberArk)




Required Qualifications:


Microsoft Azure AD & Cloud Authentication
Hands on experience with Microsoft Azure AD and implementation of SSO apps and Azure MFA
Experience/Understanding of Active Directory Domain Services (AD DS)
Experience/Understanding of Active Directory Federation Services (AD FS)
Experience/Understanding of Active Directory synchronization mechanisms (AAD Connect)
Firm understanding of authentication and authorization technologies and protocols such as Kerberos, certificate, basic, forms-based and multi-factor authentication etc.
             

Similar Jobs you may be interested in ..