IntroductionInformation and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Your Role and ResponsibilitiesThe IAM Solution Architect will assist clients in developing overall Identity and Access Management security architectures and blueprints based on IT environment and overall business, technology and security objectives at the strategic and operational level, with the ability to define the structures of solutions and architectures, will be focused on delivering a business outcome and can include systems, applications and process components.
Engage clients and work to understand their business needs, works in levels of abstraction, applies industry knowledge, and leverages appropriate business elements and information technology to address those needs. In addition, advise clients in understanding the desired future IAM framework and work collaboratively with them to develop a roadmap to achieve this goal and become a trusted advisor.
This includes working as a team member with client personnel to identify functional and non-functional requirements and subsequently working on the identification, justification and design of the client's solution. Act as lead Security Architect where necessary to guide project teams in developing & executing on actionable roadmaps to deliver on defined architectures & blue prints.
Support the development of colleagues and pro-actively share their experience, reusable reference material and assets. They act as part of a team at all levels within IBM, taking responsibility for helping to expand the capabilities of our rapidly growing security organisation. Thereby, enabling business growth beyond their immediate work on individual security opportunities.
Are you passionate about keeping current and open to new ideas? To develop your knowledge, along with the cooperative nature of the team, you will be encouraged to constantly learn and improve by visiting industry events and workshops. You will also have access to the global IBM education portal which you are also encouraged to explore as we believe that education and development should not be exclusively security based. Making time to think and explore leads us to develop new ideas and to be better able to help our clients. We are focused on developing talent and industry leading skills. IBM believes in career growth and flexibility. If your desire is to help empower people with unmatched security while working in a supportive and engaging environment, your career and your future will be made with IBM.
General responsibilities:
Responsible for managing all the activities related to delivering a security led IAM solution for the duration of their engagement, including but not limited to:- Leadership - managing all aspects of the solution, the technical team, managing client requirements and linking those requirements to IBM's solution
- Create architectural designs that translate in to solution requirements
- Creating & delivering the solution element of security proposals, this could be administrative, operational, technical or physical
- Cost solutioning - ensure all elements of cost are accurately reflected in the solution, and relevant backup documentation is available
- Assisting Sales with responding to requests for proposals and plan the strategy for a given client
- Defining and creating a solution that meets the client’s requirements, is deliverable and commercially viable
- Responsible for ensuring the solution links to the cost case - proposal and contract
- Understanding the IAM Posture of the client, including their drivers and appetite, risk, legal, regulatory and compliance drivers for the client
- Understanding the functional and non-functional requirements of the system
- Refining the Security architecture to support the functional design
Required Technical and Professional ExpertiseAs a minimum, you will have the following:- Experience developing Technical Requirements and Solution Proposals for IAM Architectures
- Can perform Requirement gathering, definition and refinement whilst ensuring traceability throughout the lifecycle of delivery.
- Experience of conducting IAM Maturity assessments and making recommendations
- Presentation skills for C-Level clients
- At least 5 years’ experience as IAM Security Architect, defining and delivering security architectures in complex multi-platform (Cloud, Hybrid, On-prem) and multi-technology environments.
- Knowledge of top (analysts) quadrant IAM Technologies
- The Application of security Architecture frameworks (e.g. TOGAF, NIST Cyber Security Framework, ISF Standard, SABSA)
- Experience Delivering Architectures for at least two of the following IAM Domains: Identity Governance; identity life-cycle, provisioning/provisioning, workflow automation, self-service, request and approval workflow, Role Based Access Control, Segregation of duties, application integration techniques, Related business and security standards, policies processes and procedures
- Privileged Access Management; Vaulting, Session Recording, Access Controls methods such as Sudo. Hard coded password approaches, Operating System, Database, Application integration and methods. Related business and security standards, policies processes and procedures
- Access Management; Single-Sign-on, Access Federation, Desktop Single Sign-on, Advanced and Multi Factor Authorization, RBAC/ABAC, Application Integration.
- Cloud Entitlement Management: Cloud Native IAM: Azure, AWS or others and Identity Analytics: User Behaviors, AI, Analytics
- Directory Services; LDAP, Active Directory, Azure, Integration, replication/synchronisation,
- Other: JAVA, API / Rest / XML, XACML, RACF, ADFS
- Experience working with at least two of the following IAM Technologies: Sailpoint, BeyondTrust, Microsoft Azure IAM technologies.
Preferred Technical and Professional ExpertiseWhile not prerequisites, the following will be advantageous:- Stakeholder and scope management
- Assessment, Strategy and roadmap development
- Experience Delivering IAM Programmes
- A recognized certification in security appropriate to the role for example: CISSP, CISMP, CompTIA Security +, ITIL qualification etc.
- Experience working with following IAM Technologies: Thycotic, Okta, Microsoft, OneIdentity, CyberArk, IBM IAM suite (ISIM, ISAM, Verify, IGI)
- Awareness of penetration testing methods and technologies