Cyber - CIAM Technical Specialist (Manager or Senior Consultant), Cyber Risk
Role details
Job location
Tech stack
Job description
You will have a passion and curiosity, for cyber and technology, comfortable with operating in a fastpaced environment where you will define and lead the implementation of various identity solutions that enable our clients explore new business opportunities, while reducing the risk of these changes.
As an IAM technical specialist/lead, you will be responsible for:
Engagement Delivery:
- Leading large and complex IAM engagements, you will be well versed in the Identity lifecycle and concepts as well as alignment of requirements to security frameworks like NIST.
- Supporting clients to define and develop their identity projects and programmes, from current state review through to CIAM strategies, roadmap development, and execution of activities to mobilise projects and programmes.
- Project and programme delivery, covering solution requirements definition, solution architecture, high and low-level design development, solution build / configuration / deployment / integration, supported by testing and hand-over to business as usual operational teams.
- Form part of digital transformation and enterprise recovery engagements delivering IAM solutions and remediation activity.
- Deliver broader cyber engagements where needed (across related disciplines like architecture, data security and application security) Market Development:
- Distilling complex technical matters into simple narratives to drive and lead conversations with senior client stakeholders.
- Ongoing client engagement / relationship management - building and maintaining client relationships in support of account targeting.
- Opportunity pursuit - engaging with clients to capture problem statements / solution requirements, developing client propositions / solutions, defining detailed delivery timelines, resource requirements and cost estimates, and supporting client pitch activity.
- Working with FS sector leadership to shape and refine both existing and new IAM market propositions / offerings.
Requirements
Whilst a bachelor's degree (or equivalent) in Computer Science or Engineering is desirable, we are more interested in your real-world professional experience and your ability to turn this into impactful client outcomes.
Technical Skills:
The skills we want you to ultimately have will cover:
- Broad enterprise identity experience across Enterprise and Customer Authentication, with demonstrable ability to build identity strategies which integrate into client enterprise architectures and beyond.
- Experience working in a digital transformation environment supporting the definition of Identity architecture leveraging cloud native and/or other IAM solutions.
- Advanced, practical experience of a variety of CIAM solutions such as ForgeRock, Ping, Microsoft Azure B2C, Okta, and Auth0 or equivalent.
- Advanced, practical experience of cloud hosting services including, Amazon Web Services, Microsoft Azure, Google Cloud Platform.
- Hands-on experience of Microsoft Active Directory/Azure AD Domain Services, Federation Services, Certificate Services, DNS and DHCP or equivalent.
- Hands-on experience of implementation of OAuth, OIDC and JWTs.
- Understanding of decentralised identity, verifiable credentials, microservices and Trust over IP architecture stack.
- Detail oriented and strong problem-solving skills.
- Excellent oral and written communication skills including concisely communicating status and creating customer reports and presentations.
Consulting Skills:
- Project management - Experience with waterfall and agile type methodologies, often working within client specified frameworks.
- Delivery team management: Managing teams across a mix of locations, cultures, and experience levels.
- Client stakeholder management - Strong communication and relationship skills to manage a variety of client stakeholders from CISO to Developer.
In addition to the above the following are desirable:
- Consulting or equivalent background.
- Understanding of malware and the modern threat landscape.
- Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, ECCouncil etc. or equivalent).
- Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.).
- Role based access control (RBAC) design.
- Practical experience with Linux operating systems.
- Experience with Modern Authentication concepts e.g. Self-Service Identity, Bring your own Identity, SCIM, SAML, WS-Federation, OAuth, Open ID Connect or equivalent.
- Ability to hold Security Clearance.
About the company
Deloitte drives progress. Our firms around the world help our clients become market leaders wherever they compete. Deloitte invests in outstanding people with diverse talents and backgrounds, empowering them to achieve more than they can elsewhere. Our work combines consulting with action and integrity. We believe that when our clients and society are stronger, so are we.