Cyber
Deloitte Cyber understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful insights to help our clients navigate the ever-changing threat landscape. Through powerful insights and managed services that simplify complexity, we enable businesses to operate with resilience, grow with confidence, and proactively manage to secure achievements.
Digital Trust & Privacy
Digital Trust & Privacy—IAM practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The cyber identity services—IAM team delivers service to clients through following key areas of IAM:
• Application Onboarding
• Lifecycle Manager
• Compliance Manager
• Password Management
• Automated Provisioning
• Roles Management
• ITSM tools Integration
• Advanced Authentication Methods
• Strategy and Road Map
Work you’ll do
The key job responsibilities will be to:
• Architect, design, and implement large-scale identity and access management (IAM) solutions.
• Post design configurations, Advanced debugging and troubleshooting of issues, including interacting with technology vendors.
• Contribute to eminence activities, such as whitepapers pertaining to IAM technologies.
• Lead requirements gathering, design documentation by conducting workshops in onsite/offshore delivery model for multiple projects.
• Customize, configure, and develop IAM solution integrations using requirements and design and independently manage project deliverables to successful completion.
• Lead IAM strategy engagements (IAM road map, vendor selection, etc.)
• Enabling business development by assisting in request for proposal and sales processes
• Lead process compliance activities by identifying and driving initiatives that are relevant for the project delivery and help factor reusability and related benefits.
• Adhere to and implement security best practices across multiple engagements.
Qualifications and Experience
Required:
• Experience—5 years to 7 years
• Experience in implementing at least two IAM engagements, including requirements gathering, analysis, design, development, testing, deployment, and application support (Sailpoint/CyberArk)
• Experience in carrying out advanced application integration with the IAM solution dealing with advanced provisioning (e.g., multilevel workflows), single sign-on (WIA, Forms, HTTP), and PKI concepts
• Experience in technologies, such as Java, LDAP, SSL RDBMS, and Linux
• Good knowledge of Web/application servers (IIS, WebSphere, WebLogic, JBoss, and Apache)
• Experience in development/configuration of standard/custom IAM integrations using Java, .Net, or other major scripting languages
• Experience in hands-on development, estimations, sizing, and custom IAM integrations
• Advanced documentation and presentation skills and well-versed with software development life cycle processes
• Ability to create, plan, and execute advanced IAM trainings and independently drive proof of concepts involving emerging IAM technologies
• Exposure to process frameworks and methodologies
• Excellent verbal and written communication
Preferred:
Understanding of skills like – OAUTH, JSON, REST, SOAP and Network Protocols (SSL, SSH, FTP, SMTP, HTTP and HTTPS etc.)
• IAM technology certifications
• PMP, CISSP certification, and exposure to other security domains
Qualifications
• B.Tech/M.Tech/MS/MBA