Jobs

Cyber Protection and Identity: Senior Consultant - IAM Advisory Services | Remote, USA

Minneapolis, MNMinneapolisMinnesotaUnited StatesNorth AmericaApril 26, 2024

At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest-growing companies in a truly essential industry. Join us.Who we are looking for:The Senior Consultant – IAM Advisory Services requires an understanding of Identity and Access Management and strong experience in business analysis. This position is for a Sr-level consultative resource that will be expected to be equally successful and skilled in both IAM subject matters and soft skills. This resource will be expected to execute on IAM engagements from the business perspective in a billable capacity and provide overall strategic, tactical, and thought leader type responsibilities for each project assigned, primarily focused on business analysis and guiding principals.IAM Advisory Services Senior Consultants also carry the first line of client delivery interactions and are responsible for defining, developing, and presenting solution specifications, parameters, and roadmaps during IAM engagements in line with project scope and product functionality. This is not a sales or implementation position. This position requires heavy client face-time, excellent communication and organization skills, and significant, detailed documentation.

How you will make an impact:

    • Perform confidently and authoritatively in the role of Senior Consultant on the IAM Advisory Services team, as the IAM subject matter expert, providing IAM thought leadership, strategic and tactical contributions on all IAM-related assessments, and/or deployment engagements involving an IAM technology solution.
    • Lead day-to-day billable operations within a client project – ability to fulfill project needs and build client relationships, while acting independently or as part of a larger team.
    • Demonstrate understanding and expertise on relevant facets of the security and IAM spaces.
    • Act as the “strategic/tactical advisor” to the customer through IAM-related guiding principles and industry standard trends and recommendations.
    • Create excellent, comprehensive documentation detailing requirements, use cases, diagrams, presentations, and more as required by the specific engagement. Proficiency in Word, Excel, PowerPoint, and Visio are required.
    • Contribute to internal team building, knowledge transfer, and training activities within this IAM Advisory Services team.
    • Effectively provide subject matter expertise and lead the discovery and analysis phase of any project you are assigned to from a strategic business perspective standpoint.
    • Perform work successfully with moderate supervisory oversight; candidate must be an independent contributor able to perform a variety of IAM-related advisory activities him/herself as well as be able to guide other resources and engage customer resources effectively.
    • Remain current on IAM market-related and emerging trends, tools, and methodologies.
    • Travel as needed to customer locations to lead and participate in IAM workshops, assessments and/or deployments (Please note that during this COVID period, any business-related travel is being handled on a case-by-case basis with management approval).
    • Adhere to policies, procedures, and security practices of the IAM Advisory Services Practice.
    • Resolve internal problems maturely and independently, and understand escalation procedures within the IAM Advisory Services Practice.
    • Demonstrate strong, proactive communication with all levels of the IAM Advisory Services Practice.
    • Perform public speaking and eminence-related activities for the team and respective subject matter, as needed.
    • Participate in advanced projects; including projects that require on-the-fly research and assessment process development and/or lie outside of core group of offerings.
    • Perform other duties as assigned.

Qualifications for success:

    • A minimum of five years of security-related consulting and/or business analyst experience is required, preference to IAM-related experience.
    • Experience preferred for consulting/analyst activities associated with IAM vendors, including but not limited to SailPoint, Saviynt, RSA, CyberArk, Microsoft, Okta, and Ping Identity.
    • Experience with various project management methodologies (waterfall, Agile, iterative, etc.) is preferred.
    • Strong written and verbal communication skills are required. Must be able to communicate details in a clear, understandable manner to multiple levels of an organization, and follow templates and other requirements, as applicable.
    • A customer-oriented focus is required, with a strong interest in client satisfaction.
    • Solid understanding of information security in general.
    • Demonstrated ability to learn new technology or concepts very quickly when required.
    • Demonstrated outstanding time management, independent work, and organizational skills required.
    • Self-starter, with a strong interest in technology and a desire to learn and grow in the IAM and security spectrum.
    • Knowledge of key information security compliance-related government regulations (including SoX, PCI-DSS, GLBA, and/or HIPAA) is preferred.
    • Ability to effectively present information in one-on-one, small, and large group situations to customers, clients, and other employees of the organization, including a range of audiences from technical, business, and C-level.
    • Ability to distill advanced IAM and core IAM technology concepts down to principles that can be understood and applied by all audiences, and the ability to determine those audiences, preferred.
    • Ability to clearly communicate verbally and in writing to all levels of an organization.
    • Strong problem-solving aptitude with the ability to think clearly under pressure and in hostile environments.
    • Ability to identify and understand how system and tool concepts work in the absence of instructions or training.
    • Bachelor’s Degree in Computer Science, Electrical Engineering, Computer Engineering, or Management Information Systems or a related area of study; or four or more years of related experience and/or training; or equivalent combination of education and experience preferred.
    • #LI-GN1
With Optiv you can expect:• A company committed to championing Diversity, Equality, and Inclusion through our Affinity groups including, Black Employee Network, Disabled Employee Network, Latino Employee Network, Optiv Pride (LGBTQIA+), Veterans Support Network, and Women's Network.• Work/life balance. We offer “Recharge” a flexible, time-off program that encourages eligible employees to take the time they need to recharge • Professional training resources, including tuition reimbursement• Creative problem-solving and the ability to tackle unique, complex projects• Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. • The ability and technology necessary to productively work remote/from home (where applicable)If you are seeking a culture that supports growth, fosters success, and moves the industry forward, find your place at Optiv! As a market-leading provider of cyber security solutions, Optiv has the most comprehensive ecosystem of security products and partners to deliver unparalleled services. Our rich and successful history with our clients is based on trust, serving more than 12,000 clients of varying sizes and industries, including commercial, government, and education. We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations - Managed Services, and Identity and Data Management.Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law.

Cyber Security Jobs by Category

Cyber Security Jobs by Location

Cyber Security Salaries