Jobs
My ads
My job alerts
Sign in
Find a job Career Tips Companies
Find

Identity and access management senior architect

London
Deloitte
Manager
Posted: 26 February
Offer description

Connect to your Industry
Cyber security plays a vital role across all industries, protecting businesses from the growing threat landscape and ensuring the confidentiality, integrity, and availability of their critical data and services.
Our mission in Cyber at Deloitte is to support our clients across industries navigate this ever-changing threat landscape by deploying powerful solutions and providing robust managed services. We simplify complexity, protect and enable our clients, accelerate innovation, and improve profitability.

Connect to your career at Deloitte
Deloitte drives progress. Using our vast range of expertise, we help our clients' become leaders wherever they choose to compete. To do this, we invest in outstanding people. We build teams of future thinkers, with diverse talents and backgrounds, and empower them all to reach for and achieve more.
What brings us all together at Deloitte? It's how we approach the thousands of decisions we make every day. How we behave, our beliefs and our attitudes. In other words: our values. Whatever we do, wherever we are in the world, we lead the way, serve with integrity, take care of each other, foster inclusion, and collaborate for measurable impact. These five shared values lead every decision we make and action we take, guiding us to deliver impact how and where it matters most.

Connect to your opportunity
We are seeking experienced Identity and Access Management professionals with a strong background in architecture and engineering. The ideal candidate will be proficient in designing, implementing and testing identity and access management solutions. The ability to maintain and operate the technology is considered a strong asset.
This role will involve working closely with cross-functional teams to ensure seamless deployment and integration of identity solutions, as well as contributing to the ongoing operation and maintenance of IAM technologies across our clients. As part of this role, you will be expected to:
Define IAM use cases, functional and non-functional solution requirements, and technical specifications, such as those for user authentication, access control, integration, performance and scalability requirements and specifications.
Design and architect IAM solutions by creating high-level and low-level designs that align with business objectives and comply with industry cybersecurity standards (e.g., NIST). For example, this includes:
Creating high-level and low-level system architecture diagrams with technical descriptions of each component.
Defining the dependencies to implement the solution, e.g., network rules, server resources, storage requirements.
Defining the system specifications to support optimal performance.
Integrating workflows with third-party systems and security tools, such as Security Information and Event Management (SIEM) solutions, multi-factor authentication solutions, and cloud platforms like Amazon Web Services (AWS) and Azure.
Defining the Responsible, Accountable, Consulted, and Informed (RACI) matrix to operate and maintain the solution's infrastructure components.
Develop technical documentation for IAM implementations including process documentation to enable solution operation (e.g., defining processes for user onboarding, access requests, identity governance, approval workflows, authentication workflows, and provisioning/deprovisioning tasks).
Implement IAM solutions:
Install solution components in on-premise environments where relevant, or configuration of cloud components (and scripting / coding of plug-ins / extensions for cloud solutions)
Work with IT infrastructure teams to ensure pre-requisites and dependencies have been met and are in place.
Integrate IAM solutions with existing enterprise applications/systems such as directories, cloud applications, HR systems and third-party identity providers.
Execute unit, integration, functional and non-functional testing for IAM solutions. As part of this, troubleshoot and resolve issues (e.g., authentication failures, access policy conflicts, and user provisioning errors) by working with vendors.
Delivery services post-implementation, from hyper-care support, resolving additional issues in production through advanced troubleshooting and debugging to ensure smooth operation.
Conduct knowledge transfer to client IAM teams through technical training sessions on operating and maintaining the solution, empowering clients to effectively manage and support the IAM environment.
Contribute to the development of compelling Identity and Access Management (IAM) solution definitions for client proposals and bids, ensuring alignment with client requirements and Deloitte's strategic capabilities.

Connect to your skills and professional experience
Whilst a bachelor's degree (or equivalent) in Computer Science or Engineering is desirable, we are more interested in your real-world professional experience and your ability to turn this into impactful client outcomes.
Key skills – not every candidate requires all of these but should be familiar and/or have experience with a majority of these:
Technical Skills:
Broad enterprise identity experience across IGA, PAM, AM, AD, CIAM, with demonstrable ability to build identity strategies which integrate into client enterprise architectures and beyond.
Experience in working with IGA, PAM, AM, AD, CIAM solutions such as SailPoint, Saviynt, etc.
Experience working in a digital transformation environment supporting the definition of Identity architecture leveraging cloud native and/or other IAM solutions.
Advanced, practical experience of cloud hosting services including, Amazon Web Services, Microsoft Azure, Google Cloud Platform.
Hands-on experience of Microsoft Active Directory/Azure AD Domain Services, Federation Services, Certificate Services, DNS and DHCP.
Understanding of decentralised identity, verifiable credentials, microservices and Trust over IP architecture stack.
In addition to the above the following are desirable:
Understanding of malware and the modern threat landscape
Relevant certifications (e.g. CIAM, CISSP, CAMS, etc.)
Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.)
Role based access control (RBAC) design
Practical experience with Linux operating systems
Experience with Modern Authentication concepts e.g. Self-Service Identity, Bring your own Identity, SCIM, SAML, WS-Federation, OAuth, Open ID Connect
Soft Skills:
Experience with waterfall and agile type methodologies, often working within client specified frameworks.
Managing teams across a mix of locations, cultures, and experience levels.
Strong interpersonal and relationship skills to manage a variety of client stakeholders from CISO to Developer.
Detail oriented and strong problem-solving skills.
Excellent oral and written communication skills including concisely communicating status and creating customer reports and presentations.

Connect to your business - Technology and Transformation
Distinctive thinking, deep expertise, innovation and collaborative working. That's what connects us. That's what makes us Deloitte. If you want to help solve some of the biggest tech and transformational challenges around, join us. Together, we'll make an impact that matters.
Cyber
The modern world is more complex than ever before, and we are navigating an ever-changing landscape. We help clients to operate with resilience and grow with confidence to secure success and minimise risk.

Personal independence
Regulation and controls are standard practice in our industry and Deloitte is no exception. These controls provide important legal protection for both you and the firm. We are subject to a number of audit regulations, one of which requires that certain colleagues abide by specific personal independence constraints (e.g., in relation to any financial interests and employment relationships). This can mean that you and your "Immediate Family Members" are not permitted to hold certain financial interests (shares, funds, bonds etc.) with audit clients of the firm, and also prohibitions on certain employment relationships (e.g., you are not permitted to hold a secondary employment role with SEC audit clients of the firm whilst being employed by the firm). The recruitment team will provide further detail as you progress through the recruitment process or you can contact the Independence team upon request.

Connect with your colleagues
"What attracted me to Deloitte were the endless opportunities and the collective experience of other like-minded individuals. Deloitte's clients include many of the world's largest organisations; I wanted to be part of a team that made a difference that I could be proud of." -Dan, Technology & Transformation

For a full job description, please visit our online Deloitte Careers portal.

Apply
Create E-mail Alert
Job alert activated
Saved
Save
Similar job
Home manager
Oxted
Permanent
Barchester Healthcare
Manager
Similar job
Registered manager - camden, greater london
London
First for Support
Manager
Similar job
Home manager
Upminster
Permanent
Barchester Healthcare
Manager
See more jobs
Similar jobs
Deloitte recruitment
Deloitte jobs in London
Management jobs in London
jobs London
jobs Greater London
jobs England
Home > Jobs > Management jobs > Manager jobs > Manager jobs in London > Identity and Access Management Senior Architect

About Jobijoba

  • Career Advice
  • Company Reviews

Search for jobs

  • Jobs by Job Title
  • Jobs by Industry
  • Jobs by Company
  • Jobs by Location
  • Jobs by Keywords

Contact / Partnership

  • Contact
  • Publish your job offers on Jobijoba

Legal notice - Terms of Service - Privacy Policy - Manage my cookies - Accessibility: Not compliant

© 2026 Jobijoba - All Rights Reserved

Apply
Create E-mail Alert
Job alert activated
Saved
Save