Job description
The opportunity
We’re looking for Senior Consultant in the Technology Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team.
In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop.
Your key responsibilities
• Engage and contribute to the Identity & Access Management projects
• Work effectively as a technical lead, sharing responsibility, providing support, coaching juniors in team, maintaining communication and updating stakeholders team members on progress
• Assists customer organizations with planning and implementing complex architecture solutions
• Execute the engagement requirements, along with review of work done by junior team members
• Able to create, plan, and execute advanced IAM trainings and independently drive proof of concepts involving emerging IAM technologies
• Use case design, Solution Requirements Specification, and mapping business requirements to technical requirements (Traceability Matrix).
• Architecture Design (optimising the resources made available – servers and load sharing etc.).
• Involvement in a successful pursuit of a potential client by being part of the RFP response team.
• Should be implementing IAM engagements, including requirements gathering, analysis, design, development, and end-end deployment.
• Develop and maintain productive working relationships with client personnel
• Build strong internal relationships within EY Consulting Services and with other services across the organization
• Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members
• Contribute to people related initiatives including recruiting and retaining IAM professionals
• Maintain an educational program to continually develop personal skills by learning various IAM tools and latest skills
• Automate the manual process in the IAM domain
• Understand and follow workplace policies and procedures
• Building a quality culture at GTH
• Manage the performance management for the direct reportee’s, as per the organization policies
• Foster teamwork and lead by example
• Training and mentoring of project resources
• Participating in the organization-wide people initiatives
Technical Skills
• Hands-on experience in end-to-end implementation of Single Sign On and MFA for enterprise and customer Identity and Access Management using either of the following industry leading products – Ping suite of products (PingFederate, Ping Access, PingONE), Okta, Auth0, ISAM, ForgeRock suite of products (OpenAM, OpenIDM, OpenDJ, OpenDS and ForgeRock Identity cloud).
• Completed at least 2-3 implementations leveraging either of the products listed above or combination of above.
• Strong understanding of access management fundamentals like Authentication, Authorization, MFA, SSO, Federation, and Directory Services concepts.
• Good hands-on experience on SAML 2.0, OAuth 2.0, OIDC, WS-Fed protocols.
• Involved in end-to-end design and implementation of SSO architecture and designed various authentication, authorization, MFA and SSO use cases
• Experience in migration from one tool to another, upgradation of above technologies, application onboarding leveraging tools listed above
• Understanding of agile process
• Have hands-on experience on any of cloud providers – Azure or AWS or GCP
• Experience in scripting language - python, powershell, and bash
• Source control tool -Git or Bitbucket
• Hands-on Core Java development and debugging experience.
• Skilled in mapping business requirements and coordinating in developing and implementing solution in line with the business requirements.
• Experienced in creating Solution Requirements Specification, Design documents like HLD and LLD and mapping business requirements to technical requirements (Traceability Matrix), use case design etc
• Good knowledge of information security, standards, and regulatory compliances.
• Should be flexible to work on new technologies in this domain.
• Good troubleshooting experience in past engagements.