Identity Architect

at  endeavour group

Richmond VIC 3121, Victoria, Australia -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate27 Apr, 2025Not Specified28 Jan, 2025N/AGood communication skillsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

LET’S CREATE A MORE SOCIABLE FUTURE TOGETHER

At Endeavour, we’re totally into what we do. With a portfolio that includes Dan Murphy’s, BWS, ALH Hotels, Pinnacle Drinks and more, we love to bring people together. Together we share our passion for our products and industry; it’s what inspires us to dream big, and continue to create new experiences for our customers and teams across Australia. If you thrive on positive energy, we want to meet you!
Job Description
-

Bring your passion and feel the energy

  • This is just the start, so dream big
  • Flexible Location - Melbourne/ Sydney/ Brisbane
  • Flexible/ Hybrid working

The Identity Architect plays a critical role in designing, implementing, and maintaining identity and access management (IAM) solutions within an organisation. This role encompasses a broad range of responsibilities, from understanding business requirements to architecting secure and scalable identity solutions. The Identity Architect collaborates with various stakeholders across the organization to ensure that IAM solutions meet both current and future needs while adhering to industry standards and best practices.
Sound good? Read on.

Here is a taster of what you can expect in this role:

  • Architect IAM Solutions: Design and architect identity and access management solutions based on business requirements, security standards, and industry best practices.
  • Identity Lifecycle Management: Develop strategies and processes for managing the entire identity lifecycle, including provisioning, deprovisioning, and access governance.
  • Access Control Policies: Define access control policies and mechanisms to enforce least privilege access principles and ensure data confidentiality, integrity, and availability.
  • Integration and Interoperability: Integrate IAM solutions with existing systems, applications, and directories while ensuring interoperability and seamless user experience.
  • Security Compliance: Ensure IAM solutions comply with relevant security standards, regulations, and compliance requirements such as GDPR, HIPAA, PCI-DSS, etc.
  • Identity Federation: Implement identity federation and single sign-on (SSO) solutions to enable seamless access to multiple applications and services.
  • Authentication and Authorization Mechanisms: Design authentication and authorization mechanisms, including multi-factor authentication (MFA), role-based access control (RBAC), and attribute-based access control (ABAC).
  • Risk Management: Assess risks related to identity and access management and implement mitigating controls to address identified risks effectively.
  • Identity Governance: Establish identity governance frameworks and processes to ensure proper oversight of identities, access rights, and compliance.
  • IAM Platform Evaluation: Research, evaluate, and recommend IAM products, technologies, and solutions that align with organizational needs and objectives.
  • Documentation and Training: Create documentation, guidelines, and training materials for IAM processes, procedures, and best practices.
  • Define and develop a long-term IAM strategy and roadmap, aligning IAM goals with business objectivesand the overall security strategy.
  • Provide expert-level guidance in IAM-related security incidents, helping to troubleshoot and resolve critical IAM issues when required.

Qualifications

Now let’s talk about you:

  • Bachelor’s or Master’s degree in Computer Science, Information Technology, or a related field.
  • Proven experience (5+ years) in architecting and implementing identity and access management solutions.
  • In-depth knowledge of IAM concepts, principles, and best practices.
  • Hands-on experience with IAM technologies such as identity providers, directory services, authentication protocols (e.g., OAuth, SAML), and access management systems.
  • Strong understanding of security frameworks, compliance requirements, and regulatory standards.
  • Experience in strategic IAM roadmap development, including aligning IAM goals with broader business and security objectives.
  • Excellent communication and collaboration skills to work effectively with cross-functional teams and stakeholders.
  • Experience with cloud identity solutions (e.g., SailPoint IdentityNow, EntraID/Azure AD, AWS IAM) is highly desirable.
  • Ability to translate business requirements into technical IAM solutions, ensuring scalability, security, and efficiency.

Good to have

  • Certifications in IAM or Security: Certifications such as Certified Information Systems Security Professional (CISSP), Certified Identity and Access Manager (CIAM), Certified Information Security Manager (CISM), or similar are highly desirable.
  • Experience with Identity Governance and Administration (IGA): Familiarity with IGA platforms such as SailPoint, Okta, or Saviynt, and their implementation at scale.
  • Experience with Privileged Access Management (PAM): Knowledge and hands-on experience with PAM solutions like CyberArk, BeyondTrust, or similar.
  • Experience with Enterprise Architecture Frameworks: Familiarity with frameworks such as TOGAF or SABSA, with specific application to IAM architecture.

Responsibilities:

  • Architect IAM Solutions: Design and architect identity and access management solutions based on business requirements, security standards, and industry best practices.
  • Identity Lifecycle Management: Develop strategies and processes for managing the entire identity lifecycle, including provisioning, deprovisioning, and access governance.
  • Access Control Policies: Define access control policies and mechanisms to enforce least privilege access principles and ensure data confidentiality, integrity, and availability.
  • Integration and Interoperability: Integrate IAM solutions with existing systems, applications, and directories while ensuring interoperability and seamless user experience.
  • Security Compliance: Ensure IAM solutions comply with relevant security standards, regulations, and compliance requirements such as GDPR, HIPAA, PCI-DSS, etc.
  • Identity Federation: Implement identity federation and single sign-on (SSO) solutions to enable seamless access to multiple applications and services.
  • Authentication and Authorization Mechanisms: Design authentication and authorization mechanisms, including multi-factor authentication (MFA), role-based access control (RBAC), and attribute-based access control (ABAC).
  • Risk Management: Assess risks related to identity and access management and implement mitigating controls to address identified risks effectively.
  • Identity Governance: Establish identity governance frameworks and processes to ensure proper oversight of identities, access rights, and compliance.
  • IAM Platform Evaluation: Research, evaluate, and recommend IAM products, technologies, and solutions that align with organizational needs and objectives.
  • Documentation and Training: Create documentation, guidelines, and training materials for IAM processes, procedures, and best practices.
  • Define and develop a long-term IAM strategy and roadmap, aligning IAM goals with business objectivesand the overall security strategy.
  • Provide expert-level guidance in IAM-related security incidents, helping to troubleshoot and resolve critical IAM issues when required


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Information Technology

Graduate

Proficient

1

Richmond VIC 3121, Australia