Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
An established industry player seeks a Senior IAM Specialist to enhance their cyber security program. This pivotal role involves managing user identity processes, integrating IAM tools, and ensuring compliance with regulatory standards. The ideal candidate will possess extensive experience in IAM principles and technologies, with a focus on zero trust architecture. Join a forward-thinking team dedicated to protecting sensitive assets and improving user experience. If you are passionate about cyber security and eager to make a significant impact, this opportunity is perfect for you.
Join to apply for the Identity Access Management Specialist 0307-0517 role at Foilcon
2 days ago Be among the first 25 applicants
Join to apply for the Identity Access Management Specialist 0307-0517 role at Foilcon
Get AI-powered advice on this job and more exclusive features.
HM Note: This hybrid contract role requires three (3) days in the office. Candidates' resumes must include their first and last names.
Project Overview: Supply Ontario is implementing a modern cyber security program to strengthen our defenses and manage digital risk. A core pillar of this program is the development of a secure and scalable Identity and Access Management (IAM) framework that supports zero trust principles, enhances user experience, and protects sensitive assets.
The Senior IAM Specialist will be responsible for establishing and managing user identity lifecycle processes, access governance, privileged access controls, and integration of IAM tools across the agency's platforms.
The Senior IAM Specialist is expected to play a pivotal role in the successful execution of a robust IAM practice. Their responsibilities include designing and implementing IAM strategies aligned with the organization's risk profile, supporting IAM architecture evolution, managing identity lifecycle processes, developing access control policies, integrating IAM solutions, implementing MFA, SSO, and PAM solutions, monitoring access events, conducting access reviews, collaborating across teams, and developing documentation. They will also support governance, compliance, and incident response efforts as needed.