Lead Consultant, IAM/IGA

Yesterday

Apply Now
Logo of Saviynt

Saviynt

The #1 Converged Identity Platform with Intelligent Access Governance for Employees, Third Parties & Machines.

Data Access Governance • SoD Monitoring & Remediation • Continuous Controls Monitoring • RBAC / ABAC Policy Management • Infrastructure Access Security

501 - 1000

💰 $130M Private Equity Round on 2021-09

Description

• Saviynt is an identity authority platform built to power and protect the world at work. • The IAM Lead Technical Consultant will design, deploy, configure, and implement solutions based on customer requirements. • This role requires managing teams, hands-on development, customization, and solution experience on Identity Management. • The Lead Consultant will lead projects across EMEA and ensure high-quality delivery.

Requirements

• Bachelor’s degree or an equivalent experience • 6+ years of industry experience in design, development, customization, configuration, deployment of any Identity Management and Governance products • Thorough domain knowledge on User Lifecycle Management, Provisioning, and Reconciliation • Auditing, Reporting and user activity Monitoring • Access Certification • SOD • Cloud Security • Hands on experience with one or more programming languages like Java/J2EE and strong knowledge of RDBMS, SQL and Elastic Search • Knowledge of Web Services (REST/SOAP), Directories, etc. • Experience in Unix Shell/Perl scripting, Batch Jobs • Direct customer interaction and management skills • Experience with RFP responses and proposals • Strong technical presentation and communication skills, both verbal and written • Must be able to thrive in a fast-paced, high energy environment • Ability to work independently, adapt quickly, and maintain a positive attitude • Knowledge of security/authorization model of popular enterprise and SaaS applications like SAP, Oracle EBS, Salesforce, Box, etc. is good to have • Startup/ Consulting Experience is good to have

Benefits

• Complete security & privacy literacy and awareness training during onboarding and annually thereafter • Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): • Data Classification, Retention & Handling Policy • Incident Response Policy/Procedures • Business Continuity/Disaster Recovery Policy/Procedures • Mobile Device Policy • Account Management Policy • Access Control Policy • Personnel Security Policy • Privacy Policy

Apply Now
Built by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or lior@remoterocketship.com

Join our Facebook group

👉 Remote Jobs Network