Deloitte Jobs

Job Information

Deloitte Identity Access Management (IAM) - Solution Delivery Lead in Houston, Texas

Are you interested in improving the cyber and organizational risk profiles of leading companies? If your response is yes, consider joining Deloitte & Touche LLP's growing Cyber Risk practice. Our WAM specialists assist our clients with the design and implementation of holistic and targeted solutions needed to meet and exceed the requirements of best practice, ethical operations, and regulation?

We collaborate with teams from across our organization in order to bring the full breadth of Deloitte, its commercial and public sector expertise, to best support our clients. Our aspiration is to be the premier integrated services provider in helping to transform the cyber security services marketplace. Our team is client focused and mission driven. As a WAM expert, you will work with our diverse teams of passionate and expert professionals to help solve for some of today's toughest cybersecurity and organizational challenges to enable or clients to enable business growth and continue to manage evolving risk.

Work you'll do

  • Perform periodic health monitoring and maintenance of the WAM tool(s), specifically:

  • Monitor logs for issues and perform/confirm solution backup as per schedule

  • Manage, monitor, and maintain solution components availability

  • Monitor license expiry for the instances of the in-scope tools

  • Monitor and renew certificates for the in-scope tools

  • Coordinate with solution vendor for product upgrades/security patches, and troubleshooting product-related defects and issues

  • Perform upgrades and deploy patches in non-production and production environment in accordance with the change management protocol

  • Work with/support infrastructure team for any hardware/operating system (OS) related upgrades and issues impacting the solution

  • Identify and recommend operational improvements to the client, drawing on deep experience and industry specific knowledge of risks

  • Analyze complex issues to determine client impact and to suggest alternative solutions based on client needs and objectives

  • Responsible for compliance with all Deloitte firm engagement management requirements

  • Resolve operational IT incident tickets (P1/P2/P3) related to platform/solution administration as per the agreed upon service level objectives (SLOs)

  • Provide resolution, coordinate with respective application teams to assist in fulfillment of failed/unfulfilled requests, as required

  • Initiate action to prevent occurrence of similar incident(s) in the future

  • Document and update the known issue list

  • Monitor tickets in bug and change request tracking tool for bugs, service requests (e.g. renew SSL certificates, off-board decommissioned application, review and approve security exceptions), and change requests (e.g., new component deployment such as repeaters, on-board new applications, enhance existing configurations, deploy patches or fixes in production)

  • Assist business or application teams in implementing enhancements related in accordance to SDLC and change management process

  • Perform production deployment (application integration, infrastructure, or solution changes)

  • Work with application teams to support application enhancement (rules, policy, adapter changes) and maintenance



  • Bachelor's degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology

  • 5+ years of relevant and strong web access management skill and experience in architecting a Web Access Management solution

  • Hands-on on COTS product such as Ping Access, Ping Federate, PingID, CA SiteMinder, CA Secure Proxy Server (preferred)

  • Hand-on on RSA SecurID, RSA Adaptive Authentication (preferred in this order)

  • Clear understanding of the working of PKI Infrastructure, SAML, OAuth and OpenID

  • Strong troubleshooting skill of Web Access Management related issue

  • Should have experience working in a support as well development project

  • Should have understanding on SLAs and deliver tasks with quality and within the timelines

  • Should have good knowledge on all ITSM concepts such as Incident Management, Change Management, Problem Management, etc.

  • Demonstrated ability to identify and address internal and external client needs, including:

  • Demonstrated problem solving and critical thinking skills

  • Working collaboratively with clients to design and implement process and technology solutions

  • Able to build solid, trust - based relationships with stakeholders

  • Able to plan, schedule, track and report on simple project timelines/milestones using collaboration tools such as ServiceNow / JIRA

  • Excellent interpersonal/communication, presentation, and writing skills

  • Demonstrating strong domain expertise and thought leadership to clients in the cyber security space

  • Travel on the project is minimal (up to 25%) and may be needed only for important business meetings and collaboration activities


  • Certified Information Systems Security Professional (CISSP), or equivalent

  • Ping or Identity product related certifications

  • Ability to work independently and manage the team

  • Should be proactive in analyzing and raising risks and issues

The team

Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory, implementation, and operate services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.