IDAM Solution Architect
Key responsibilities and accountabilities
- Review, develop and maintain the overall identity and access management architecture, ensuring alignment with industry best practices and company objectives.
- Research different possible design solutions and features, based on best practice solutions and industry trends, to best suite GNM requirements.
- Refine and enforce user access provisioning and deprovisioning processes, including user lifecycle management, access request workflows, and role-based access controls (RBAC).
- Lead and deliver the strategic solution for all elements relating to identity management and its integration with other technology platforms and applications.
- Providing support and advice on integrating with IDAM solutions, including principles of authentication, role-based access control and privileged access management.
- Continuously assess and improve access control mechanisms, authentication methods, and authorization frameworks.
- Create comprehensive technical documentation, including system architecture diagrams, configuration guides, and standard operating procedures
- Act as SME for all IDAM principles such as Authentication, Authorisation, federation, role-based access control, etc.
- Collaborate with internal teams and external vendors to integrate identity and access management systems with existing infrastructure, applications, and services.
- Source and share knowledge pertaining to governance and compliance associated with IDAM. When necessary, provide training and guidance to IT teams and end-users on identity and access management best practices, tools, and processes.
Knowledge & experience
Proven experience as an Identity and Access Management Solutions Architect, preferably in a large-scale enterprise environment.Experience of successfully implementing CyberArk PAM in a hybrid cloud and on-prem environmentExpert knowledge and experience of working with Active Directory and Azure Active DirectoryExperience of working with Identity Governance and Administration solutions such as SailPoint, NetIQ, MIM or similarDeep understanding of SAML, OAuth, OpenID Connect and LDAP protocolsKnowledge of Google and Microsoft SSO solutionsKnowledge of password management technologiesKnowledge and experience of system integration techniquesDeep understanding of the implications of IDAM on Information SecurityExperience of automation and scripting (particularly in PowerShell) would be beneficialProven expertise in Identity & Access Management and expertise in on boarding and off boarding processes (JML) and implementing related solutions.Skills and behaviours
The ability to communicate clearly in speech and in writing and translate complex technical concepts for end users of all levels of technical competenceThe ability to work effectively in a team environment, sharing knowledge and skills and developing productive working relationshipsExcellent analytical and problem-solving skills, with the ability to translate business requirements into technical solutions.Making sense of complex issues even when information is incompletePersonality characteristics
Strong negotiation skills and is able to develop mutually agreeable outcomes with people at varying levels within the organisation