Job Details

ID #52798429
Estado Pennsylvania
Ciudad Mechanicsburg
Fuente Deloitte
Showed 2024-10-31
Fecha 2024-10-31
Fecha tope 2024-12-29
Categoría Etcétera
Crear un currículum vítae

Advisory - Cyber & Strategic Risk - Cyber Identity - CIAM Senior Consultant

Pennsylvania, Mechanicsburg
Aplica ya

Cyber Digital Identity and Access Management CIAM Sr. ConsultantAre you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. This is an unparalleled time of change with new information security challenges arising each day. Our team of Cyber risk professionals bring industry experience, confidence, and technical knowledge to help our clients tackle those unique challenges.Identity and Access Management (IAM) solutions leverage Deloitte IAM Methods 2.0 methodology to help clients control which employees, customers, partners and suppliers access sensitive corporate resources, and streamline the process of managing the explosion in digital identities.The recruiting for this role ends on 30 th November, 2024.Work you will do:As Identity and Access Management (IAM) solutions team Sr. Consultant, you will

Identify and evaluate business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement to address the growing challenges of cyber threats and other information technology risks.

Develop and deliver tailored Customer Identity & Access Management (CIAM) solutions aligned to Client's digital transformation strategy. Manage operations for client's needs across multiple security domains specializing in identity and access management (customer and enterprise, federation, privileged identity management, provisioning, compliance (i.e. PCI, SOX, etc.), role based access controls, etc.)

Solution and develop customer focused security offerings to secure identities, data, and privacy, focusing on the security experience across multiple digital access channels (e.g., mobile, Web, ATM, branch, etc.) and leverage next-generation multifactor authentication modalities (e.g. biometrics)

Design and implement CIAM solutions for multiple clients and vendors using identity management tool Transmit Security, Ping Federate, Okta and ForgeRock.

Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services.

Apply business and application knowledge towards building Self-service tools that increase productivity and decrease process execution time significantly.

Develop and maintain Cyber client relationships, ensure client satisfaction, expand existing Cyber engagements.

Experience in implementing CIAM engagements that includes requirement gathering, analysis, design, development, testing, deployment, and maintenance.

Communicate to clients and partners aspects of both the product and the implementation at the technical and functional level appropriate for the situation.

The TeamDeloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory's Cyber Risk Services practice.QualificationsRequired:

BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business, or relevant fields

4+ years of industry experience

4+ years of experience within Identity and Access Management

2+ years of hands-on experience with customization of Transmit Security and Ping Identity tools is a must.

Ability to travel 25-50%, on average, based on the work you do and the clients and industries/sectors you serve

Limited immigration sponsorship may be available.

Preferred:

Previous Consulting or Big 4 Project Management experience preferred.

Certifications such as: Ping Identity/Transmit Security certifications, CISSP, CISM, or CISA certification a plus

Design, develop, and implement secure and scalable solutions to support our Customer identity and access management (CIAM) infrastructure.

Troubleshoot and resolve access-related issues and incidents efficiently.

Integrate Identity solutions such as Transmit Security, Ping Identity with diverse applications, directories, and identity sources.

Foster close collaboration with application owners and teams to ensure seamless integration.

Demonstrate a comprehensive understanding of advanced authentication protocols, including SAML, OAuth, and WS-Fed.

Collaborate effectively with cross-functional teams to gather requirements, design, and implement appropriate, scalable IAM solutions.

Document configurations, processes, and procedures for effective maintenance and future reference.

Identify and resolve performance bottlenecks and system issues proactively.

Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.htmlThe wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,529 - 197,863.You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any depends on various factors, including, without limitation, individual and organizational performance. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

Aplica ya Suscribir Reportar trabajo