Enterprise Security Architect - Identity and Access Management
Job type:Permanent
Town/City:Bonn
Region:Nordrhein-Westfalen
Sector:Cyber Security
Client Company Type:In-House
Job ref:8963
Post Date:April 2, 2026
Meet Our Recruiter
Josh Mooney
Managing Consultant - Cyber Security
About the Role
Senior IAM Architect
Our client is a large international organisation seeking an Enterprise Security Architect to join their Group Information Security function, with a focus on Identity and Access Management.
You will sit within the Security Architecture department, responsible for the domain-specific development and ongoing enhancement of a group-wide security architecture, with the goal of ensuring and continuously improving IT security and cyber resilience across the organisation.
Key Responsibilities:
- Analyse cybersecurity IAM trends relevant to the organisation, including regulatory developments and emerging technologies such as AI, Cloud and Non-Human Identities
- Produce IAM-specific risk assessments as part of technical security architecture design, covering cost, benefit and risk reduction
- Evaluate IAM threat scenarios and design high-level IAM security architectures, including standards, baselines and reusable artefacts such as patterns and blueprints
- Drive stakeholder alignment and steer solution design and implementation as subject matter expert, including presenting in group-wide security forums
- Assess IT security posture against best practices and provide actionable recommendations aligned to ISO and NIST frameworks
Your Profile:
- Degree in Computer Science or a comparable qualification
- Extensive experience in the Identity and Access Management domain, ideally including proven delivery of IAM architecture within large organisations
- Strong background in security architecture roles, covering both technology-specific and enterprise-level architecture including target state definition and roadmaps
- Hands-on experience with IAM platforms and tooling, ideally including:
- IAM: Microsoft Entra ID / Active Directory, Ping Identity, Okta
- PAM: CyberArk / BeyondTrust
- IGA: SailPoint / Oracle OIG
- Zero Trust: NIST 800-207
- Understanding of attacker mindset and offensive security; certifications such as OSCP, CEH or equivalent are advantageous
- Ability to work independently and take ownership of complex technical topics
- Strong problem-solving mindset with a structured, solution-oriented approach
- Fluent in English; German language skills are an advantage