Security Consultant II - IAM
Vancouver, British Columbia, CA Saskatoon, SK, CA Edmonton, AB, CA Halifax, Nova Scotia, CA Ottawa, ON, CA Calgary, AB, CA Burnaby, British Columbia, CA Toronto, ON, CA
Be a part of a transformational journey with innovative talent and leading edge technologies.
Join our team and what we'll accomplish together
We live in a fast-paced world where protecting information assets and who has access to them is an essential priority for consumers, businesses, and Canada. At TELUS Security, we strive to tackle the toughest security challenges head-on with top talent and cutting edge technology.
As a Security Consultant on the Identity Access Management Team, you will be a key player in the evolution of Role Based Access (RBAC) management. Demonstrate your strategic thinking and Access Management, Identity Management and Role Based Access Management technology skillset. Work with different areas of the business in the creation of roles and efficiencies related to user access provisioning through automation all while ensuring access governance is implemented throughout employees’ lifecycles. If the idea of tackling the complex and important matter of information assets protection, who has access to it and how we can accelerate the business via automation efforts, this might be the right role for you!
Drive, lead and collaborate on the technical aspect of our Identity Access Management strategy and use your innovative thinking, technical and mentoring skills to play the vital role of growing and continuously improving TELUS’ Identity Management practices and its approach to it. Use your security and governance skills and mindset to help the team make strategic and tactical decisions on the matter all while collaborating with internal business partners to drive our Role Based Access (RBAC) program forward and help build the next generation for on-boarding practices.
What you will do
- Build strong relationships with your partners and internal stakeholders in the organization and collaborate on their strategic plans for enhancements on access management
- Work with our external vendors to drive further value, innovation and automation within our role management tool set and processes.
- Demonstrates strength in communication, relationship-building and negotiation skills to gather role management requirements
- Appreciated for your continued efforts towards prioritization skills to thrive in our fast-paced, highly engaged and demanding operations-heavy setting
- Use your technical and analytical skills to support role mining and the building of technical documentation and processes.
What you bring
- Post-secondary Degree in Computer Sciences or similar field
- You are able and available to work an on call rotation
- Experienced with Access Management and Identity Management methodologies and are aware of and can conform to Change Management best practices
- Previous administration experience in Identity and Access Management and are knowledgeable about Identity Life Cycle Management through Role Management
- Understand Identity Governance & Administration (IGA), Policy-Based Orchestration of Identity Management and Access Control
- Familiar with Role Base Access (RBAC) theory and principles and have knowledge of Data and RBAC Analytics tools, such as the Saviynt Role Mining platform
- Experience with the configuration of attestation controls within Identity Manager
- Well versed in the use of intelligent analytics for role mining.
- Good Understanding of architectures that support access provisioning, specifically on-boarding of users
- Strong aptitude to drive automation and innovative solutions for manual processes for Access Management.
- Excellent communicator, troubleshooter and analytical thinker
- Basic SQL knowledge (querying and joining tables, etc)
Great to haves
- CISSP Certification
- Government of Canada Clearance
- Identity Access Management accreditations or certifications
- Cyber Security education, accreditations or certifications
- Experience in transitioning from manual provisioning to automation through role management