Deloitte IBM Security Access Manager(ISAM) in Gilbert, Arizona
Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS Cyber Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber minded culture and become stronger, faster, and more innovative. You will become part of a team that advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security. Our dynamic team offers opportunities to work with cutting-edge cyber security tools, and grow both vertically and horizontally at an accelerated rate. Join our cyber team and elevate your career.
Work you'll do
1)Leads/Manages/Assists in the support of the overall design, strategy, and delivery, support and maintenance of Access Management Solutions
2)Develops and implements IAM best practices and mitigation procedures
3)Assesses existing security technologies to engineer creative success-driven solutions that align to client business goals and provide the desired outcomes.
4)Creates and maintains documentation and network flows.
Utilize IAM (Identity and Access Management) programs to enable federal clients to protect against digital identity risks.
Provide appropriate access to applications, systems, and data with advanced authentication.
Oversee the spread of information with privileged access management.
Verify identity utilizing a wide range of IAM solutions including HSPD-12, PIV, and advanced authentication methods.
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
At Deloitte, we believe cyber is about starting things-not stopping them-and enabling the freedom to create a more secure future. Cyber Identity leverages methodologies and a digital identity platform to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. Cyber Identity also focuses on the integrations of cutting-edge technologies and cloud providers. Our team is dedicated to enhancing IAM programs so our clients can mitigate risk, reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems, or identity governance then Cyber Identity is for you.
1)Experience designing and implementing vendor products such as: IBM ISAM
2)Experience designing and implementing MFA technologies
3)Experience with standard SSO protocols (SAML, WS-Fed, OpenID, Oauth)
4)Experience with domain bridging solutions such as (Centrify, Authentication Services)
5)Experience with policy and user credential management
6)Working knowledge on the TCP/IP stack and networking protocols
7)Experience supporting IAM security operations and threat response, or security architecture
8)Knowledge of local, cloud and hybrid Directory Service architectures
9)Ability to work independently as well as on a team
10)Ability to identify key issues, barriers to success and proactively resolve them
11)Ability to obtain and maintain a security clearance
12)Excellent oral and written communication skills
13)Ability to understand and communicate technical issues and processes to both technical/non-technical users
Prior professional services or federal consulting experience
Previous identity analytics experience
Experience in consumer identity and directory services
Certifications (e.g., CompTIA Security+, CEH, CISSP)
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.