Key Responsibilities
IAM Strategy & Architecture
· Lead the definition, execution, and continuous improvement of the enterprise IAM strategy aligned with business and technology roadmaps.
· Serve as the senior subject-matter authority for all IAM domains across cloud and on-prem environments.
· Design scalable, reusable, and future-ready IAM architectures supporting evolving business and regulatory needs.
· Establish IAM architectural standards, design patterns, and implementation guidelines to ensure consistency across the enterprise.
Security Leadership & Advisory
· Provide security thought leadership, consulting, and best-practice guidance to Client IT Security stakeholders.
· Champion modern cybersecurity controls across IAM, Application Security (AppSec), and DevSecOps domains.
· Collaborate with Client IT Security to create, review, and update the enterprise security roadmap.
· Continuously assess the existing security architecture and recommend enhancements based on industry best practices and supplier experience.
Platform Evaluation & Technical Governance
· Review and respond to customer requests related to IAM and security platform selection decisions.
· Provide technical guidance on architecture, configuration, and support models for selected platforms.
· Participate in proof-of-concept (PoC) initiatives, advising on industry standards and validation criteria.
Security Infrastructure & Technology Oversight
· Provide architectural oversight and guidance across security technologies, including:
· IAM, PAM, IGA, UAM, UAR
· Firewalls, IPS/IDS, WAFs
· Endpoint protection platforms
· SIEM and log management solutions
· Governance, Risk, and Compliance (GRC) tools
Infrastructure & Systems Knowledge
· Demonstrate strong understanding of enterprise IT infrastructure, including:
· Applications and databases
· Operating systems (Windows, Unix, Linux)
· Virtualization and hypervisors
· IP networking (LAN, WAN)
· Storage, backup networks, and media
Deep experience with authentication and access technologies such as:
· SSO / MFA platforms (Microsoft Entra ID, 1Password)
· Privileged Access Management (PAM)
· Identity Governance and Administration (IGA)
We are proud to be an Equal Employment Opportunity (EEO) and Affirmative Action employer. We at HL Solutions do not discriminate based on Race, Religion, Color, National origin, Sex, Sexual orientation, Gender identity, Gender expression, Age, and Disability status.