Sr. IAG Engineer (Sailpoint)

About the Job

Company Description:

Secured Identity Technologies is a leading global provider In Identity & Access Management Systems, consulting, risk advisory services. With strong leadership and a highly cohesive team, we have achieved exponential growth since our inception in 2018. Our client base is comprised of some of the world’s most recognized brands in a wide range of industries including banking & finance, commercial & retail, healthcare, higher education, government agencies, transportation & utilities. Our team is at the top of their game, and we are committed to keeping them there. We heavily invest in training and resources to maintain the highest level of certification for deployment and support of all of the leading technology stacks.

About The Division:

The Secured Identity Technologies Advisory Practice is comprised of our IAM subject matter experts that have the expertise to align your organization’s core competencies and its information security requirements with best practice IAM processes and procedures.

 

Secured Identity Technologies IAM Integration Practice is comprised of implementation experts in vendor, legacy and custom Identity & Access management applications. We have dedicated integration teams for each of the leading IAM technology vendor solutions. Each team includes IAM professionals in project and program management, architecture, engineering and development, analysis and support engineering. IAM implementation team members have a minimum of 5 years in the IAM space, and many have more than 10 years in the IT world.


Job Description:

Secured Identity Technologies is a leader in information security consulting with a focus on identity and access management, governance solutions and compliance services. We work with some of the world's leading organizations and government agencies to ensure the safety of their information and their compliance with applicable regulations.

 

The IAM senior consultant role is responsible for performing assessments, system implementation and integration. The senior consultant role is the face of client delivery and is critical to the delivery of services and managing client expectations day-to-day. The position reports to [African Head] and works closely with other practice teams in delivering best in class security engagements for our clients.

Specialised Technical Capabilities:
Supports the Development and Implementation of IAM Solutions:
 

  • Ability to develop and execute strategies, architectures, and roadmaps to provide the client with need-based, value-adding, and cost-effective IAM solutions

  • Ability to analyse the client’s cyber security infrastructures to enable targeted and data-driven enhancements

  • Keeps in mind the client’s business needs when developing assessment frameworks to ensure effectively, targeted, and actionable analyses

  • Applies multiple security testing methodologies and techniques to assess client’s security infrastructures and identify/evaluate vulnerabilities

  • Gathers data and determines priority criteria to build an integrated roadmap that addresses all facets of an IAM Assessment or implementation

  • Assesses cyber security policies and procedures to analyse compliance with regulatory requirements and evaluate overall operational efficiency; provides clients with mitigating solutions

  • Is proficient with multiple domain-specific cyber security technology solutions and can effectively integrate them to meet and exceed client’s needs

  • Enables sustainability and continuous improvement of cyber security solutions by assessing and enhancing client’s cyber security governance infrastructures

  • Understands and applies cyber threat intelligence and profiling to the design and assessment of client systems

  • Tests the effectiveness of the client’s cyber security technologies to identify and articulate opportunities for improvement across the digital, physical, and social elements of the client

  • Conducts complex business process assessments to help clients identify, analyse, and prioritize gaps and risks; applies findings to make recommended upgrades aligned to the overall strategy

  • Develops effective and sustainable technology and Cyber risk management strategies by tailoring leading Cyber frameworks on key clients’ business and technology needs

  • Understands the interaction of business and technology processes/risks and can explain it in business terms to both technical and non-technical audiences

  • Deliver consultant services in a direct capacity on client engagements

  • Perform system implementation through installation, configuration, coding and testing

  • Integrate the IAM platform into customer's enterprise systems and directory services

  • Observe project delivery protocol and ensure the timely escalation of issues to the appropriate lead

  • As needed, product architecture and design documents

  • Attend relevant technical training and conferences to further develop technical skills

  •  Coach & mentor junior level associates

  • Perform other duties as assigned by management.

Technical competencies:
 

  • Technical expert in one or more specific Cyber sub-offering area

  • Demonstrated project management skill

  • Consulting skills

  • Experience in drafting and presenting to clients

  • Good report writing skills

  • Sound financial knowledge and understanding

  • Business acumen

  • Bring technical and industry experience in Cyber Application sub offering (domain) to engage with clients and key stakeholders pragmatically.

  • Understands technical complexity at Network, Application, Database, Infrastructure and the Cloud level.

  • Knowledge and appreciation of the wider IAM Security issues and opportunities beyond the specific domain specialisation.

  • Able to scope IAM engagements effectively and assign and manage an appropriate team to deliver against the engagement requirements.

  • Deep knowledge and hands-on technical experience with SailPoint suite including:

  • Experience in Ruleset Customization, Remediation and Mitigation of Risks.

  • Experience in: Lifecycle Manager, Compliance Manager, Access Request, Automated Provisioning, Password Management

  • Ability to give viewpoints on Sizing / Cloud Hosting / Integration with other applications.

  • On-premises and in Cloud deployment experience.

Behavioural Competencies:
 

  • Excellent communication skills, both written and verbal

  • Effective engagement management

  • Able to deliver engagements on time and within budget

  • Proven ability to make decisions and the right judgement calls

  • Ability to provide leadership and guidance/coaching to a junior member of the team

  • Ability to inspire and enthuse others to commitment and involvement taking accountability for larger engagements

  • Manages large engagement / multiple engagement deadlines holistically, identifying risks and escalating.

  • Able to work under pressure

  • Ownership of deliverables driving team quality and risk management.

Qualifications:

Minimum qualifications:

Relevant Degree, Honours or postgraduate diploma, professional qualifications e.g. B.Sc, BCom, or B.Ing/Eng or M.Sc. Or one or more major industry / cyber certifications, diplomas, professional certifications

Desired qualifications:

Bachelor’s degree/postgraduate degree (Engineering/Computer Science/IT), relevant Cyber specific certifications are advantageous. Examples include:
 

  • Any SailPoint Certified Identity Professional Program Certificates

  • Any other IAM vendor-related Certificates (Saviynt, OKTA, BeyondTrust, Micro Focus CyberArk, One Identity etc

  • CISM (Certified Information Security Manager)

  • CISSP (Certified Information Systems Security Professional)

  • ISO27001 Lead Auditor/Implementer Certificate

  • ISMP (Information Security Management Principles)

  • CCSP (Certified Cloud Security Professional)

  • Certified Ethical Hacker (CEH) – EC Council

  • ITIL – IT Infrastructure Library Foundation

Experience:

5+ years of progressive experience with role(s) in professional, consulting services (including Boutique Security Firm), public and/or private sector organizations is required. Working experience within one or more of the Cyber Risk Domains (Sub-Offering) or professional services environment. Demonstrate strong understanding and experience in the delivery of IAM engagements across key industries.
 

Apply For Current Opening or Submit For Review
arrow&v

Thanks for submitting!