Deloitte & Touche LLP seeks a Solution Senior Consultant in Lake Mary, FL.
Work You’ll Do
Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement. Assist in the selection and tailoring of approaches, methods, and tools to support service offerings or industry projects. Use technology-based tools or methodologies to review, design, and/or implement products and services. Construct and assess high-level and detailed security programs translating business needs and regulatory requirements into cost effective and risk appropriate controls. Identify opportunities to improve engagement profitability. Understand clients’ business environment and basic risk management approaches. Develop information security strategies and plans based upon generally accepted security standards. Utilize knowledge of business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management. Build and nurture strong client relationships.
#LI-DNI
Requirements
- Bachelor's (or higher) degree in Computer Science, Information Systems, Computer Engineering, Electronic Engineering or related field (willing to accept foreign education equivalent).
- Eighteen months of IAM experience utilizing SailPoint.
- Experience must include eighteen months of:
- Designing and implementing Identity and Access Management solutions;
- Installing SailPoint (IdentityIQ), IQ Service, Java, Apache Tomcat, Eclipse, Linux, SQL Server Management Studio, Core Ftp, MobaXterm, SourceTree, and Bit Bucket appliance setups on cloud infrastructure;
- Identifying and evaluating complex business and technology risks, and developing solutions to mitigate risks and improve security infrastructure;
- Utilizing programming and scripting languages, including Java, JavaScript, and Python, to develop customized solutions to clients' security requirements;
- Automating user administration and reporting tasks utilizing Selenium IDE, Junit, and Jenkins per client requirements;
- Implementing secured federation partnerships with 3rd-party applications using SSO Federated Single Sign On;
- Automating monitoring of IAM appliances to detect issues;
- Supporting annual system disaster recovery activities; and
- Actively monitoring and mitigating identified security vulnerabilities on IAM appliances.