At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
The opportunity
The Identity & Access Management (IAM) Authentication & Authorization Architect reports to the Domain Architect Lead for IAM Architecture in a hands-on role focused on the security architecture in the authentication, access controls and authorization spaces. The architect works directly with Lead Development, Engineering and Operational resources through collaboration and mentoring to shape the IAM capabilities for the firm.
The Authentication & Authorization Architect is accountable and responsible for the alignment of business, operational and security requirements and translation of those requirements into technical IAM capabilities. IAM services include, but not limited to, Identity Lifecycle Management, authentication and authorization, session management, access requests, access provisioning, access reauthorization, remote access, IAM services API, role and entitlement models, and directory technologies. The IAM Authentication & Authorization Architect will work with other Architects and Service Owners to create a roadmap that meets strategic and current requirements.
Your key responsibilities
• Responsible for designing solutions that control access to application functionality.
• Deliver technical security configuration architecture expertise in implementing cross-organizational information sharing.
• Develop solutions and recommendations for issues caused by process challenges, emerging threats, and technology changes.
• Act as trusted security architecture advisor with extensive evidence of ability to provide strategic direction in leading activities in support of Authentication & Authorization tools & technologies and enterprise security objectives.
• Provide professional knowledge and experience of information systems security identity policies and large enterprise scale practices.
• Develop security architectures, and engineering system specifications implementing centralized authentication and authorization platforms and security controls in development and operational systems.
• Solid understanding of application and systems security architecture and best practices.
Skills and attributes for success
The individual in this role must be well educated in general aspects of Information Security as well as:
• Must have proven experience in providing architecture guidance and advisory services to internal or external clients for various environments and systems, including application/technology blueprints, roadmaps, optimization, and migration strategies.
• Extensive experience working with IAM Technologies including strong experience with Authentication & Authorization technologies and protocols such as OAuth, OIDC, SAML.
• Strong knowledge of and experience implementing Microsoft's Identity solutions in the Entra ID (formerly Azure Active Directory) suite
• Must have experience implementing an enterprise level Authentication & Authorization infrastructure.
• Ability to effectively communicate and advocate key security requirements and controls for implementation by the development team.
• Ability to communicate effectively with all levels of management, both verbally and in writing
To qualify for the role, you must have
Education:
• Bachelor's or Master's degree in Information Assurance, Computer Science, Information Systems or related field of study.
Experience:
• 12+ years of practical experience in the field of IT is required. 8+ years of direct Information Security experience.
• 6+ years' experience in hands-on Identity & Access Management positions
Ideally, you'll also have
• Experience in Authorization technologies based on RBAC, ABAC and/or PBAC, especially PlainID.
• Experience designing Authorization frameworks and policies.
• Experience with Auth0 and/or Ping Identity authentication products.
• Experience architecting solutions with cloud technologies such as container orchestration, microservice architecture, etc
What we offer
As part of this role, you'll work in a highly integrated, global team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here's a snapshot of what we offer:
• Continuous learning: You'll develop the mindset and skills to navigate whatever comes next.
• Success as defined by you: We'll provide the tools and flexibility, so you can make a meaningful impact, your way.
• Transformative leadership: We'll give you the insights, coaching and confidence to be the leader the world needs.
• Diverse and inclusive culture: You'll be embraced for who you are and empowered to use your voice to help others find theirs.
EY | Building a better working world
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.