IAM Saviynt IGA Consultant

AI overview

Enhance identity lifecycle processes and optimize Saviynt IGA systems while leading integration of new target systems and improving access governance reporting.

Exciting IAM Saviynt IGA SME, 11 months, contract opportunity in Dallas, TX.

Requirements

  • 8 plus years overall in IAM including 4 plus years hands-on experience with Saviynt IGA (EIC preferred; SSM beneficial).

Experience in the following:

  • Saviynt workflows, rules engine, tasks, analytics, roles, SoD
  • Application onboarding using OOTB and custom connector
  • Identity lifecycle automation (JML)
  • Certification campaign configurations
  • RBAC/ABAC design and role mining concepts
  • Troubleshooting provisioning, connectors, Saviynt IGA issues, and adoption issues
  • REST/SOAP API integration patterns
  • SQL, JSON, Groovy scripting for Saviynt logic
  • Maintain and optimize Saviynt objects (SoD, workflows, roles, rules, analytics, controls, task definitions, connections).
  • Lead onboarding of new target systems using connectors or custom integration patterns (REST, JDBC, SCIM, SOAP).
  • Enhance identity lifecycle processes (Joiner–Mover–Leaver), birthright provisioning, and policy-driven automation, and improve certification campaigns, risk controls, SoD ruleset, and access governance reporting.

Certifications (Preferred)

  • Saviynt Professional Certification (EIC).
  • Saviynt Advanced Configuration or Engineer Certification (if available).
  • Nice to have - Certifications in IAM & Security:
    • CIAM/IAM certifications (CISM, CISSP, CCSP, Security+).
    • Azure/AWS cloud certifications (AZ-900, AZ-104, AWS Cloud Practitioner).
  • Nice to have -ITIL Foundation Certification

Founded in 2001, WaveStrong is an industry leader in enterprise and cloud information security consulting services. We pride ourselves on our best of breed security solutions and services that span a myriad of government, education and business verticals. Our staff is comprised of both certified technical and business professionals who can help you successfully navigate complexities of planning, design, implementation and management of securing data. Our approach is vendor agnostic giving our customers the freedom to choose the best customized security model for their business.

View all jobs
Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Consultant Q&A's
Report this job
Apply for this job