Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Identity and Access Management (IAM) SME image - Rise Careers
Job details

Identity and Access Management (IAM) SME

Identity and Access Management (IAM) SME
Principals, Senior Principals, Senior Consultants

You want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients' most important challenges? We are growing and are looking for people to join our team. You'll be part of an entrepreneurial, high-growth environment of 300.000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?

About your role

We are seeking an experienced Identity and Access Management (IAM) SME to join our dynamic consultancy team. The successful candidate will have over 5 years of experience in IAM, with a strong technical background and a deep understanding of identity management solutions and best practices. This individual will be responsible for designing, implementing, and managing IAM solutions across various industries, ensuring secure and efficient access to systems and data.

The IAM SME will also be expected to provide expert advice on IAM strategies, mentor junior team members, and ensure that IAM solutions align with business goals and regulatory requirements.

As an IAM SME, you will be at the forefront of securing the identities and access of our clients, shaping the future of IAM, and working alongside some of the brightest minds in the industry. This is a highly technical role, ideal for a passionate IAM professional looking to have a tangible impact on real-world security challenges.

Key Responsibilities:

  • Collaborate with senior stakeholders and technical teams to identify and address IAM requirements across multiple sectors.
  • Design and implement robust IAM solutions, ensuring systems are secure, scalable, and compliant with regulatory frameworks.
  • Develop and maintain the strategic vision and technical roadmap for IAM, ensuring alignment with evolving technologies, business needs, and industry best practices.
  • Serve as the technical authority on all IAM decisions, providing guidance and escalation support for lower-level IAM specialists.
  • Implement and manage identity governance and administration (IGA) solutions, including user provisioning, role-based access control (RBAC), and access certification.
  • Proactively assess and mitigate risks related to identity and access management by applying risk-based methodologies and providing expert advice on the trade-offs between security, cost, and performance.
  • Ensure the integration of IAM considerations into the broader enterprise architecture, influencing organizational policies, technology selection, and development methodologies.
  • Drive the adoption of Secure by Design principles, ensuring that IAM is an integral part of the system development lifecycle from inception through deployment.
  • Perform access reviews, identity lifecycle management, and security testing across IAM solutions, guiding teams on best practices for secure design and development.
  • Engage with industry bodies and regulatory frameworks to ensure alignment with security standards such as ISO/IEC 27001, NIST, and GDPR.
  • Conduct technical reviews of third-party IAM solutions and vendor offerings, ensuring that external products meet internal security standards.
  • Act as a subject matter expert (SME) in IAM technologies, advising on advanced areas such as multi-factor authentication (MFA), single sign-on (SSO), and privileged access management (PAM).
  • Monitor and analyse emerging IAM threats, vulnerabilities, and risks, ensuring that IAM solutions evolve to counter new attack vectors and threats.
  • Have a broad business skill set including stakeholder management, problem-solving, and resilience
  • Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences
  • Have excellent interpersonal skills and strong written and verbal communication skills in country’s official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel

Essential Skills and Experience:

  • Deep expertise in IAM, with hands-on experience in designing and implementing IAM solutions, including cloud environments (AWS, Azure, or GCP).
  • Proficient in securing identities, managing access controls, and protecting data, with a solid understanding of modern cryptography, PKI, and IAM best practices.
  •  Comprehensive knowledge of emerging IAM technologies and trends, including Zero Trust architectures, DevSecOps, and microservices.
  • Extensive experience in identity governance, access management, and advanced threat mitigation techniques.
  • Expert-level understanding of IAM frameworks and regulations (e.g., ISO/IEC 27001/27002, NIST, NIS2, GDPR, PCI-DSS).
  • Proven experience managing IAM projects, balancing security objectives with business and operational needs.
  • Strong leadership skills, with experience leading and mentoring technical teams across diverse IAM disciplines.
  • Experience with IAM automation and orchestration tools, including the integration of IAM tools in CI/CD pipelines (DevSecOps).
  • Excellent understanding of cloud IAM architecture, particularly for securing hybrid and multi-cloud environments, and cloud-native applications.
  • Strong knowledge of IAM incident management and response strategies, with experience supporting SOC teams in investigating IAM-related security breaches and coordinating responses.

Qualifications:

  • Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) certification.
  • Additional certifications in IAM or cloud security (e.g., AWS Certified Security Specialty, Azure Security Engineer, Certified Identity and Access Manager (CIAM)).
  • Experience in pre-sales and bid writing for IAM engagements.
  • Experience leading IAM programs in complex environments, working with a variety of sectors such as Financial Services, Energy & Utilities, Consumer, Retail, and Logistics.
  • Expertise in IAM standards, policies, and regulatory requirements.

Personal Attributes:

  • A proactive problem-solver with a passion for IAM and a commitment to excellence.
  • Strong ability to communicate complex IAM concepts to both technical and non-technical stakeholders.
  • A mentor and leader who can inspire, motivate, and guide a team of IAM specialists.
  • Able to handle pressure in high-stakes situations, maintaining a focus on delivering secure and effective IAM solutions.
  • Customer-focused, with a proven ability to build relationships and trust across a wide range of stakeholders.
  • Flexible and adaptable, with the ability to thrive in fast-paced, dynamic environments

Given that this is just a short snapshot of the role we encourage you to apply even if you don't meet all the requirements listed above. We are looking for team members who strive to make an impact and are eager to learn. If this sounds like you and you feel you have the skills and experience required, then please apply now.

About your team

At the Tech Transformation practice, we help CIOs overcome their biggest challenges such as geopolitical and macroeconomic uncertainty, cybersecurity, digital transformation, and budget constraints; enabling them to leverage technology to deliver value to their business. We have a team of business analysts, enterprise architects and cybersecurity specialists with business, operational, strategic, analytical and innovation skills. that come together to drive business IT alignment, Transform IT governance, IT Cost containment, operating efficiency improvements, Innovation enablement and cybersecurity risk, governance, and compliance.

About Infosys Consulting

Be part of a globally renowned management consulting firm on the front-line of industry disruption and at the cutting edge of technology.  We work with market leading brands across sectors. Our culture is inclusive and entrepreneurial. Being a mid-size consultancy within the scale of Infosys gives us the global reach to partner with our clients throughout their transformation journey.

Our core values, IC-LIFE, form a common code that helps us move forward. IC-LIFE stands for Inclusion, Equity and Diversity, Client, Leadership, Integrity, Fairness, and Excellence. To learn more about Infosys Consulting and our values, please visit our careers page.

Within Europe, we are recognized as one of the UK’s top firms by the Financial Times and Forbes due to our client innovations, our cultural diversity and dedicated training and career paths. Infosys is on the Germany’s top employers list for 2023. Management Consulting Magazine named us on their list of Best Firms to Work for. Furthermore, Infosys has been recognized by the Top Employers Institute, a global certification company, for its exceptional standards in employee conditions across Europe for five years in a row.

We offer industry-leading compensation and benefits, along with top training and development opportunities so that you can grow your career and achieve your personal goals. Curious to learn more? We’d love to hear from you.... Apply today!

Average salary estimate

$125000 / YEARLY (est.)
min
max
$100000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Identity and Access Management (IAM) SME, Infosys Consulting - Europe

Are you ready to advance your career as an Identity and Access Management (IAM) SME at Infosys Consulting? We’re on the lookout for passionate professionals like you to join our dynamic consultancy team. If you have over five years of experience in IAM and a solid technical background, you could be the perfect fit for this role. Here, you’ll design, implement, and manage IAM solutions across diverse industries, providing our clients with secure access to their systems and data. As an IAM SME, you’ll collaborate with senior stakeholders and technical teams to address IAM requirements, ensuring compliance with the latest regulatory frameworks. In this role, your insights will guide junior team members and shape the future of IAM strategies. You will engage deeply in risk assessments, user provisioning, and the integration of IAM in enterprise architecture while proactively addressing emerging threats. Whether you’re implementing identity governance solutions or driving the adoption of best practices, your contributions will have a tangible impact on our clients' security. This is an exciting opportunity to work alongside industry experts in an environment that encourages diverse thinking and innovative problem-solving. If you’re eager to tackle real-world security challenges and play a pivotal role in driving technological transformation, apply today to join us at Infosys Consulting, where we value inclusion, growth, and excellence across our teams.

Frequently Asked Questions (FAQs) for Identity and Access Management (IAM) SME Role at Infosys Consulting - Europe
What are the responsibilities of an Identity and Access Management (IAM) SME at Infosys Consulting?

As an Identity and Access Management (IAM) SME at Infosys Consulting, your primary responsibilities will include designing and implementing IAM solutions, collaborating with stakeholders to address IAM requirements across various sectors, mentoring junior team members, and ensuring compliance with industry regulations. Your expertise will guide our strategies in identity governance, risk management, and integrating IAM into enterprise architecture.

Join Rise to see the full answer
What qualifications are needed for the Identity and Access Management (IAM) SME role at Infosys Consulting?

Candidates for the Identity and Access Management (IAM) SME position at Infosys Consulting should have at least 5 years of relevant experience in IAM, hands-on experience with IAM solutions in cloud environments, and certifications such as CISSP or CISM. Comprehensive knowledge of IAM frameworks, regulations, and emerging technologies, alongside strong leadership skills, is also essential for excelling in this role.

Join Rise to see the full answer
Can you describe the work environment for an Identity and Access Management (IAM) SME at Infosys Consulting?

At Infosys Consulting, Identity and Access Management (IAM) SMEs thrive in a collaborative and dynamic environment. Our culture promotes innovation and entrepreneurial spirit, encouraging team members to share their ideas and diverse perspectives. With a strong commitment to professional development and inclusion, you will find yourself working with talented colleagues who are passionate about solving complex security challenges.

Join Rise to see the full answer
What impact does the IAM SME role have on clients at Infosys Consulting?

The IAM SME role at Infosys Consulting is crucial for ensuring that clients have secure and efficient access to their systems and data. By designing robust IAM solutions and implementing best practices, you will help clients mitigate risks and align IAM strategies with their business goals. Your insights into emerging threats and regulatory requirements will empower clients to navigate cybersecurity challenges effectively.

Join Rise to see the full answer
How does Infosys Consulting support the career growth of IAM SMEs?

Infosys Consulting is dedicated to providing industry-leading training and development opportunities for IAM SMEs. By fostering a culture of continuous learning and development, we help our team members expand their skills and advance their careers. Participation in innovative projects and exposure to diverse industries further enhances your professional growth and knowledge in the rapidly evolving IAM landscape.

Join Rise to see the full answer
Common Interview Questions for Identity and Access Management (IAM) SME
What experience do you have with designing IAM solutions?

When answering this question, you should discuss specific projects where you have designed IAM solutions. Highlight any technologies or methods you employed and the impact these solutions had on your organization or client. Be sure to detail your process for incorporating compliance and security standards.

Join Rise to see the full answer
How do you stay current with IAM trends and technologies?

Discuss specific resources you utilize to keep abreast of IAM trends, such as industry publications, professional groups, or webcasts. Highlight any certifications you are pursuing or have completed, emphasizing your commitment to ongoing education and professional development in the IAM field.

Join Rise to see the full answer
Can you explain the role of identity governance in IAM?

I would explain that identity governance involves the policies and processes that ensure secure access to systems while maintaining compliance. Discuss your experiences implementing identity governance frameworks and how they have helped in managing the risk associated with user access across various systems.

Join Rise to see the full answer
Describe a challenging IAM project you’ve worked on.

Share a specific example of a challenging project. Focus on the problem you faced, how you approached it, and the solutions you implemented. Highlight any collaboration with team members or stakeholders to demonstrate your teamwork and problem-solving skills.

Join Rise to see the full answer
How do you balance security and user experience in IAM solutions?

Explain your philosophy of balancing these two important aspects. You might mention your experience with user testing, gathering feedback, and adjusting IAM solutions to ensure they meet security standards without compromising user experience.

Join Rise to see the full answer
What is your approach to mentoring junior IAM team members?

Discuss your mentoring style, perhaps highlighting your belief in leading by example. Mention specific instances where you have successfully guided junior members, outlining how you support their growth and enhance their skills in IAM.

Join Rise to see the full answer
How do you conduct risk assessments related to IAM?

I would outline my systematic approach to risk assessments, which may include identifying potential threats, assessing vulnerabilities, and leveraging risk management frameworks. Share any tools or methodologies you prefer to use during this process.

Join Rise to see the full answer
What are the key elements to consider when implementing IAM solutions?

Key elements to consider include understanding the client's business needs, compliance requirements, user access patterns, technology integration, and ongoing maintenance and support. Emphasize how each of these elements plays a critical role in successful IAM implementation.

Join Rise to see the full answer
Can you explain the principles of zero trust architecture?

I would explain that zero trust architecture is based on the principle of 'never trust, always verify'. This means that no access requests are implicitly trusted, and verification is required at every stage. Discuss how you’ve applied these principles in your previous IAM roles.

Join Rise to see the full answer
What tools have you used for IAM automation?

Share specific IAM automation tools you are familiar with, highlighting how they enhance security and efficiency. Discuss experiences where you've integrated these tools with processes or other technologies to improve IAM workflows.

Join Rise to see the full answer

Infosys is a global provider of next-generation digital services and consulting services. Infosys provides information technology and digital marketing services such as AI and automation, Agile and DevOps, Salesforce, cyber security, data analytic...

21 jobs
MATCH
Calculating your matching score...
FUNDING
DEPARTMENTS
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
December 25, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!