Deloitte Jobs

Job Information

Deloitte Senior/Lead Identity Access Management Analyst in Dallas, Texas

Are you passionate about technology and interested in joining a community of collaborative colleagues who respectfully and courageously seek to challenge the status quo? If so, read on to learn more about an exciting opportunity with Deloitte's Information Technology Services (ITS). We are curious and life-long learners focused on technology and innovation.

Work you'll do

As an IAM Sr. Analyst you will support service line initiatives within the Identity and Access Management (IAM) team. With limited supervision, provide analysis and development knowledge for Identity Governance and Administration (IGA), Privilege Access Management (PAM), Single Sign-on (SSO), and/or Multi-Factor Authentication (MFA).

Assist in the review and design of new IAM security technologies and support to ensure that the appropriate controls and tools are selected and operationalized. Work closely with team leads, peers, development teams, business analysts, and end users to ensure Deloitte systems have appropriate controls and protection.

Regularly participate in new projects to learn new technologies and perform detailed feature and usability analysis based on vendor's offerings and Deloitte business needs. Support Information Security programs which include governance (policy & standards), security enhancements, new security technology evaluation and testing, project requirement gathering, internal client communications, documentation, and security awareness.

  • Support Identity and Access Management (IAM) operational team(s); including Identity Governance and Administration (IGA), Privilege Access Management (PAM), Single Sign-on (SSO), or Multi-Factor Authentication (MFA) platforms.

  • Work with stakeholders to gather requirements needed for system and application integration with all Identity and Access Management (IAM) platforms.

  • Participate and/or lead the execution of aligning applications and systems to Deloitte's IAM Governance framework.

  • Participate and/or lead the installation, integration, deployment, and support of IAM tools and products.

  • Deliver process improvements utilizing Identity and Access Management platforms.

  • Communicate aspects of both the product and the implementation at the technical and functional level appropriate for the solution.

  • Participate in operations and tactical planning within a team environment.

  • Provide scripting experience/knowledge to automate critical privileged account maintenance processes and/or other IAM related activities.

  • Serve as an escalation of IAM services and related incidents.

The team

Information Technology Services (ITS) helps power Deloitte's success. ITS drives Deloitte, which serves many of the world's largest, most respected organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.

The 3,000 professionals in ITS deliver services including:

  • Cyber Security

  • Technology Support

  • Technology & Infrastructure

  • Applications

  • Relationship Management

  • Strategy & Communications

  • Project Management

  • Financials

Cyber Security

Cyber Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand.

Areas of focus include:

  • Risk & Compliance

  • Identity & Access Management

  • Data Protection

  • Cyber Design

  • Incident Response

  • Security Architecture

  • Business Partnership


  • Have the ability to work with minimal supervision with wide latitude for independent judgement to continuously improve the IAM posture at Deloitte from a technical and functional perspective. Determines methods and procedures on new assignments with limited instruction.

  • Ability to solicit and document detailed business requirements.

  • Ability to create traceability documentation to illustrate business and technical implementations.

  • With assistance from peers, team leads, and managers have ability to install, integrate and deploy technology products. Security and/or IAM would be a plus.

  • Identity Management familiarity in one or more of the following areas:

  • Access Certification

  • Provisioning/De- Provisioning

  • Application On-boarding

  • Single Sign On

  • Identity Federation

  • Privileged Access Management

  • Multi-factor authentication

  • Using both technical and non-technical skills to handle day-to-day operations with the following: role based access control, access request, certification, or privileged identity management

  • Intermediate level of experience/knowledge: Java, JavaScript, JSP/Servlets, SQL.

  • Intermediate level of experience/knowledge with Unix/Linux Shell, .Net, PowerShell and Web Services.

  • Intermediate level of experience/knowledge with REST APIs and XML parsing.


  • 5 years of experience required, which should include a combination of the following:

  • 2+ years' experience in documenting, developing, or implementing IAM systems.

  • 2+ years' experience with technical experience integrating identity management, access management, access governance, or privileged access management software into clients' infrastructure and applications.

  • At least one year experience in implementing enhanced security for elevated accounts in Active Directory.

  • At least one year of experience in Identity Management Systems and/or Privileged Access Management Systems.

  • BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business. An advanced degree is also preferred.

  • Position can sit anywhere in the US

  • Limited Sponsorship available


  • Certifications such as: CISSP, CISM, or CISA certification a plus.



    All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.