IAM Technical Architect, Manager/ Associate Director - Singapore - KPMG SERVICES PTE. LTD.

    KPMG SERVICES PTE. LTD.
    KPMG SERVICES PTE. LTD. Singapore

    Found in: Talent SG 2A C2 - 2 weeks ago

    Default job background
    Description
    Roles & Responsibilities

    At KPMG, your long-term future is every bit as important to us as it is to you. That's why our aim is to give you experiences that will stay with you for a lifetime. Whether it's great training and development, working across functional sectors, mobility opportunities or corporate responsibility volunteering activities – you'll gain a wealth of experiences on which to build a rewarding career. We're proud of our culture – it's one that recognises hard work, encourages new ways of thinking and embraces diversity and inclusion. We have an innovative spirit which inspires what we do and how we do it – striving to be better lies at the heart of who we are.

    KPMG Cybersecurity professionals assist clients to address their concerns around Confidentiality, Integrity, Availability and Privacy of their technology, business systems, and information assets. Using a holistic view of how Technology and Business integrate, the Cyber team performs technology-risk focused assessments, technology compliance, IT/operational process reviews, and design of information risk & cyber security solutions.

    Cyber team members regularly interact with C-Suite clients, such as Chief Executive Officer (CEO), Chief Information Security Officer (CISO), Chief Information Officer (CIO), Chief Operating Officer (COO), Chief Risk Officer (CRO) and their direct reports. Hence, a client centric mind-set, understanding of IT within a Business context, and well-developed communication skills are desirable.

    The role involves:

    • Engage with client stakeholders on Identity and Access Management Projects.
    • Providing in-depth expertise of Identity and Access Management.
    • Working with KPMG Project and Customer resources to continue design and deployment activities and further enhance Identity Management solutions for our customers.
    • Working with customers and leading Identity and Access Management vendors to design and build creative solutions.
    • Working with team members, you will design and/or build solutions within large transformations and you will perform reviews, assessments and build strategies for organisations looking to invest in IAM.
    • Assisting the engagement manager with the planning and delivery phases of engagements.
    • Being comfortable with associated disciplines of Security Policy and Governance

    The ideal candidate should possess:

    • Bachelor's degree in Computer Science, Computer/Electrical Engineering, Information Technology or equivalent.
    • A highly motivated individual in information security and excellent communicator with strong analytical and good problem-solving skills.
    • Minimum 8-15 years of relevant experience working on IAM technologies: SailPoint, CyberArk, IBM, Saviynt, Okta, ForgeRock, MSFT Entra.
    • In depth knowledge in Security strategy, assessment, and design and implementation and governance frameworks over processes, controls, organisation and infrastructure.
    • Proven technical knowledge in Identity Governance, Access Management, Privileged Access Management and/or Consumer Identity and detailed implementation on Identity and Access Management solutions.
    • Excellent understanding of Identity and Access Management concepts Provisioning, SSO, Federation and knowledge of Authentication, Authorisation, and Accounting implementation and governance.
    • Excellent business analysis experience in requirements gathering, modeling use cases and experience in business development in supporting new business offerings.
    • Any relevant industry related certification will be preferred (e.g. CISSP, AWS , AZURE , IAM products like SailPoint, Saviynt etc.).
    Tell employers what skills you have

    Information Security
    Requirements Gathering
    MS Access
    Modeling
    Azure
    Cyber Security
    AWS
    Identity Management
    Business Analysis
    Wealth
    Information Technology
    Mobility
    Access Control
    CyberArk
    Security Strategy
    Accounting
    Authentication
    Business Development
    CISSP