×
Register Here to Apply for Jobs or Post Jobs. X

IAM Security Architect - IBM SVG

Job in Addison, Dallas County, Texas, 75001, USA
Listing for: INSPYR Solutions
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 70 - 75 USD Hourly USD 70.00 75.00 HOUR
Job Description & How to Apply Below

Overview

Title: IAM Security Architect - IBM SVG
Location: Remote
Duration: Contract to hire
Rate: $70 - $75/HR
Work Requirements: US Citizen, GC Holders or Authorized to Work in the U.S. (No sponsorship for this position)

Responsibilities
  • Oversee, act, and report on any security violations related to unwarranted access to corporate data.
  • Ensure that all issues are resolved in a timely and efficient manner.
  • Build team spirit by assisting staff members and promoting a positive workplace.
  • Stay aware of rapidly changing environments and recommend cost-efficient techniques.
  • Identify policy/procedure gaps and recommend updates, especially as the business expands.
  • Design, implement, and maintain Identity Governance & Administration (IGA) solutions using IBM Security Verify Governance (ISVG).
  • Develop and deploy custom integrations with target systems for automated user provisioning/deprovisioning.
  • Create and manage automation workflows for identity lifecycle management.
  • Lead and execute ISVG upgrades, including patches, fix packs, and configuration updates.
  • Administer and optimize ISVG environments on Linux platforms hosted in AWS.
  • Ensure high availability, performance tuning, and disaster recovery readiness of ISVG infrastructure.
  • Collaborate with cross-functional teams to define security requirements and deliver secure identity solutions.
  • Develop and maintain technical documentation (architecture diagrams, configurations, procedures).
  • Conduct system health checks, audit log reviews, and security assessments to ensure compliance.
  • Provide technical leadership and mentoring to junior team members.
  • Advance Information Services strategy through research and implementation of technical solutions.
  • Ensure new projects/initiatives align with the strategic direction of the Information Security department.
  • Responsible for successful integration and implementation of applications, systems, and technologies.
  • Recommend security strategies, policies, and procedures by evaluating outcomes and identifying trends.
  • Coordinate project resources and timelines across functional and technical teams.
  • Maintain professional knowledge (education, workshops, publications, networks).
  • Ensure platform-level compliance through monitoring and security review programs.
  • Report task status and provide required documentation.
  • Stay current on state-of-the-art security technologies and advise teams accordingly.
  • Participate in the creation and monitoring of backup, recovery, and business continuity procedures.
  • Address change/problem management activities to incorporate security considerations.
  • Conduct investigations and forensic analyses of suspected security incidents.
  • Serve as point of contact for standardized system functionality requirements.
  • Create and maintain internal training documentation; conduct training sessions.
  • Act as support contact for coworker questions and issues.
  • Handle user interactions courteously and professionally.
  • Follow proper escalation and vendor interaction procedures for problem resolution.
  • Log and review outstanding issues promptly.
  • Provide on-call support as required.
  • Conduct status meetings with IS staff and provide documentation on tasks/issues/projects.
  • Develop reports using various report-writing tools.
  • Monitor vendor progress on incidents and enhancements; facilitate vendor roadmap discussions.
  • Ensure all application, system, and security-related problems are resolved timely and efficiently.
  • Recommend cost-effective techniques in support of corporate and field systems.
  • Identify enterprise-wide hardware/software problems; strategize remediation plans with IS management.
Qualifications
  • Bachelor’s Degree in Computer Science or Cybersecurity (experience may substitute).
  • Minimum 15 years IT/Security experience, including 5+ years with IBM Security Verify Governance (ISVG).
  • 5 years of project management experience.
  • Proven ISVG expertise (configuration, customization, integration).
  • Strong scripting skills (Perl, Shell, Python, JavaScript).
  • Hands-on experience managing ISVG in AWS and proficiency with Linux systems.
  • Deep understanding of IAM concepts: RBAC, policy-based access control, compliance reporting.
  • Experience with REST/SOAP web services for system…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary