Descrição do trabalho
Do you want to join one of the largest professional services organizations on the market?
Then Deloitte is for you. Here, you'll have the opportunity to boost your career and strengthen your skills within our technological ecosystem.
We are an international Tech Hub looking for the best Cybersecurity specialists to join our centers of excellence and community. At Deloitte, you’ll help transform the world as we know it and develop unique and innovative solutions in complex and diverse transformation projects — from Portugal to the world. We’re expanding our Cyber area and looking for experienced professionals who enjoy teamwork and thrive in multi-project environments. You’ll discover the roles aligned with your profile and take your career to the next level.
Will you join us? We're waiting for you.
- Your Day-to-Day Responsibilities:
- Participate in defining and developing cybersecurity strategies and architectures;
- Analyze security requirements resulting from business strategies, performing risk and vulnerability assessments of information systems;
- Identify risks related to business processes, operations, and technology projects within the scope of Identity and Access Management (IAM);
- Design and propose measures to mitigate emerging threats, ensuring integration with the overall security architecture;
- Identify security gaps in existing architectures and suggest improvements or changes;
- Implement and manage access control policies, including RBAC (Role-Based Access Control), ABAC (Attribute-Based Access Control), and MFA (Multi-Factor Authentication);
- Provide technical support for the implementation, configuration, and integration of IAM solutions;
- Integrate applications with IAM platforms, ensuring secure access management, authentication, and authorization processes, including connector implementation or platform functionalities;
- Automate identity and access management processes using scripts and workflows to improve efficiency, reduce manual errors, and enhance the user lifecycle (onboarding, role changes, offboarding);
- Work with IT teams on incident, change, configuration, and problem management processes, based on ITIL or equivalent practices;
- Support in defining incident response and recovery strategies in the event of security breaches (e.g., identity compromise, unauthorized access);
- Conduct compliance assessments based on frameworks such as NIST, CIS, ISO 27001, among others;
- Collaborate with security, compliance, and audit teams to ensure compliance with GDPR, DORA, PSD2, and other relevant regulations;
- Stay up to date with IAM-related technology trends and propose innovative solutions tailored to the client’s ecosystem.
- Are you the one we’re looking for?
- 3 to 5 years of experience in developing IAM solutions, focusing on integration, customization, and automation — experience limited to support roles will not be considered;
- Proven experience implementing Identity & Access Management platforms, including integration with enterprise systems;
- Experience in designing and implementing identity management and governance processes, including user lifecycle, access policies, and role-based segregation;
- Proficiency in programming languages relevant to IAM such as Java, Beanshell, JavaScript, XML, SQL, and scripting (e.g., PowerShell, Python) for integration, connector development, and process automation;
- Knowledge of integration with directories such as LDAP, Active Directory, and Microsoft Entra ID (Azure AD);
- Familiarity with modern authentication protocols like SAML, OAuth 2.0, and OpenID Connect;
- Familiarity with IAM tools and solutions (e.g., SailPoint, Ping Identity, Entra ID);
- Knowledge of security frameworks such as NIST, ISO 27001, and CIS Controls;
- Certifications in IAM solutions such as SailPoint and Ping Identity;
- Advanced experience in developing custom applications and connectors for SailPoint IdentityIQ and/or Ping Identity;
- Experience defining and implementing identity governance workflows and processes;
- Certifications in Privileged Access Management (PAM) solutions like CyberArk;
- Experience in designing and implementing PAM solutions.
- Build a Career Tailored to You
- In a diverse work environment that promotes continuous learning and development;
- With a personalized career development plan (technical/functional skills and opportunities), aligned with your current stage, needs, and goals;
- Participating in national and international projects with significant impact in this area of expertise;
- Unlimited access to the leading online learning platforms (LinkedIn Learning and Udemy);
- Opportunities for training and certification in the latest technolo