Job Description
...
The Technical IAM Program Lead is a senior, cross-functional role responsible for defining the technical and functional requirements for a large-scale enterprise Identity & Access Management (IAM) program and ensuring that vendor-delivered IAM solutions align with those requirements. This role provides the technical leadership, architectural expertise, and subject-matter expertise across key IAM domains, including Governance, Privileged Access Management (PAM), Identity Governance & Administration (IGA), Technical Access for IT and Operational Technology (OT), and Identity Analytics. You will partner with internal stakeholders to define target architecture, articulate an IAM roadmap, prepare comprehensive RFP documentation, participate in vendor evaluation and selection, and oversee the technical design and implementation performed by vendor-supplied teams. This role ensures technical correctness, alignment, and quality throughout the program lifecycle, and is explicitly focused on oversight, not hands-on configuration or implementation.
Location: Toronto (Hybrid Model: 2 to 3 days per week in the office)
Duration: 24 months
Advantages
- Long-Term Contract: Secure a substantial 104-week contract in a highly visible and critical enterprise program.
- Hybrid Flexibility: Benefit from a flexible work arrangement, spending 2 to 3 days per week in the downtown Toronto office.
- Strategic Impact: Lead and define the technical roadmap and target architecture for a new Identity & Access Management program.
- Senior Oversight Role: Focus on technical leadership, governance, and quality assurance, without the requirement for hands-on configuration or implementation.
Responsibilities
Requirements Definition & RFP Leadership
Lead technical and functional requirements gathering workshops with IT, OT, HR, Cybersecurity, Compliance, and Business stakeholders.
Translate business needs and enterprise risk into actionable functional, non-functional, and architectural requirements.
Develop high-quality RFP documentation for all IAM domains, including governance, PAM functional needs, IGA requirements, technical access modernization, identity analytics, and controls.
Define evaluation criteria, scoring matrices, and vendor response templates.
Collaborate with Procurement and Legal through the entire RFP lifecycle and support vendor Q&A, solution demonstrations, technical scoring, and selection.
Technical Governance & Architecture Oversight
Act as the enterprise technical authority for IAM throughout the program.
Maintain alignment with enterprise IT/OT architecture, Zero Trust principles, cybersecurity requirements, and compliance obligations.
Review and approve solution designs, architecture diagrams, configuration plans, data flows, and integration approaches provided by vendor teams.
Ensure solutions remain consistent with RFP requirements and internal architectural standards, and escalate technical risks and design deviations for remediation.
Oversight of Vendor Implementation Teams
Serve as the technical oversight point during PAM, IGA, Access Management, OT access modernization, and Identity Analytics deployments.
Work closely with vendor-supplied Identity Architects, PAM Leads & Engineers, IGA Leads & Engineers, and Analytics/UEBA/SOAR specialists.
Validate solution design decisions, configuration approaches, and integration patterns, ensuring deliverables meet defined requirements and quality standards.
Coordinate design reviews, technical checkpoints, and solution validation sessions.
Collaboration & Engagement
Provide technical direction, risk mitigation support, and subject matter expertise to the Project Manager throughout the project lifecycle, supporting key milestone planning and risk/issue tracking.
Facilitate alignment between Cybersecurity, IT, OT, HR, Application Owners, Compliance, and Architecture teams.
Communicate technical impacts, options, and constraints in business-friendly language and support operational teams during knowledge transfer and transition activities.
Quality Assurance & Acceptance
Define technical acceptance criteria for RFP responses, solution designs, and implementation deliverables.
Validate vendor solutions through design reviews, testing strategies, and security assessments.
Ensure all documentation, runbooks, diagrams, and handover materials meet enterprise standards.
Deliverables include: IAM RFP & Requirements Package, IAM Target Architecture & Governance Framework, Vendor Design Validation & Oversight Artifacts, and IAM Governance & Operational Readiness Package.
Qualifications
Mandatory Requirements/Skills/Certifications:
University degree in Computer Science, Information Security, Information Technology, Engineering, Cybersecurity, or a related field, or the equivalent combination of education and considerable IAM experience.
10+ years of progressive experience in Identity & Access Management (IAM), covering IAM architecture, Privileged Access Management (PAM), and Identity Governance & Administration (IGA).
5+ years of Information Technology experience.
Strong background in enterprise IT and Security Architecture, including cloud, hybrid, and OT/industrial environments.
Deep knowledge of IAM standards and technologies (e.g., SAML, OIDC, OAuth2, SCIM, AD/Azure AD, HRIS integrations).
Must hold one of the following certifications:
Certified Identity and Access Manager (CIAM)
Certified Access Management Specialist (CAMS)
Certified Information Systems Security Professional (CISSP)
Required Technical & Professional Skills
Demonstrated experience defining functional and non-functional requirements for large-scale IAM initiatives.
Experience preparing or contributing to public sector RFPs, vendor evaluations, and technical scoring.
Ability to provide technical oversight of vendor Identity Architects, PAM Leads, and IGA Leads without performing hands-on implementation.
Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP, SAMLv2, OAuth, and SSL/TLS.
In-depth knowledge of technologies and architecture principles required to secure sophisticated network environments (e.g., Endpoint Security, DLP, NGFW, Zero Trust, VPN, VLANs, IDS, IPS, ACLs, SOAR).
Strong skills in technical presentations, solution walkthroughs, and architecture review sessions with engineering teams.
Proven ability to prepare and deliver executive-level presentations, including clear articulation of risks, dependencies, timelines, and architectural decisions.
Strong decision-making capabilities and demonstrated ability to work collaboratively across various teams in a public sector organization.
Nice to Have Skills
Extensive experience in IT and Network Infrastructure.
Proven experience conducting Cybersecurity Risk Assessments, control gap analysis, and risk-based prioritization.
Experience with identity analytics, UEBA, and SOAR integrations.
Experience in regulated industries or critical infrastructure environments.
Vendor-specific IAM certifications.
Summary
If you're interested in the Technical Analyst role based in Toronto, we encourage you to apply online at www.randstad.ca.
Only qualified candidates will be contacted for the next steps. We look forward to hearing from you!
Randstad Canada is committed to fostering a workforce reflective of all peoples of Canada. As a result, we are committed to developing and implementing strategies to increase the equity, diversity and inclusion within the workplace by examining our internal policies, practices, and systems throughout the entire lifecycle of our workforce, including its recruitment, retention and advancement for all employees. In addition to our deep commitment to respecting human rights, we are dedicated to positive actions to affect change to ensure everyone has full participation in the workforce free from any barriers, systemic or otherwise, especially equity-seeking groups who are usually underrepresented in Canada's workforce, including those who identify as women or non-binary/gender non-conforming; Indigenous or Aboriginal Peoples; persons with disabilities (visible or invisible) and; members of visible minorities, racialized groups and the LGBTQ2+ community.
Randstad Canada is committed to creating and maintaining an inclusive and accessible workplace for all its candidates and employees by supporting their accessibility and accommodation needs throughout the employment lifecycle. We ask that all job applications please identify any accommodation requirements by sending an email to accessibility@randstad.ca to ensure their ability to fully participate in the interview process.
This posting is for existing and upcoming vacancies.
show more
Job Description
The Technical IAM Program Lead is a senior, cross-functional role responsible for defining the technical and functional requirements for a large-scale enterprise Identity & Access Management (IAM) program and ensuring that vendor-delivered IAM solutions align with those requirements. This role provides the technical leadership, architectural expertise, and subject-matter expertise across key IAM domains, including Governance, Privileged Access Management (PAM), Identity Governance & Administration (IGA), Technical Access for IT and Operational Technology (OT), and Identity Analytics. You will partner with internal stakeholders to define target architecture, articulate an IAM roadmap, prepare comprehensive RFP documentation, participate in vendor evaluation and selection, and oversee the technical design and implementation performed by vendor-supplied teams. This role ensures technical correctness, alignment, and quality throughout the program lifecycle, and is explicitly focused on oversight, not hands-on configuration or implementation.
Location: Toronto (Hybrid Model: 2 to 3 days per week in the office)
Duration: 24 months
Advantages
...
- Long-Term Contract: Secure a substantial 104-week contract in a highly visible and critical enterprise program.
- Hybrid Flexibility: Benefit from a flexible work arrangement, spending 2 to 3 days per week in the downtown Toronto office.
- Strategic Impact: Lead and define the technical roadmap and target architecture for a new Identity & Access Management program.
- Senior Oversight Role: Focus on technical leadership, governance, and quality assurance, without the requirement for hands-on configuration or implementation.
Responsibilities
Requirements Definition & RFP Leadership
Lead technical and functional requirements gathering workshops with IT, OT, HR, Cybersecurity, Compliance, and Business stakeholders.
Translate business needs and enterprise risk into actionable functional, non-functional, and architectural requirements.
Develop high-quality RFP documentation for all IAM domains, including governance, PAM functional needs, IGA requirements, technical access modernization, identity analytics, and controls.
Define evaluation criteria, scoring matrices, and vendor response templates.
Collaborate with Procurement and Legal through the entire RFP lifecycle and support vendor Q&A, solution demonstrations, technical scoring, and selection.
Technical Governance & Architecture Oversight
Act as the enterprise technical authority for IAM throughout the program.
Maintain alignment with enterprise IT/OT architecture, Zero Trust principles, cybersecurity requirements, and compliance obligations.
Review and approve solution designs, architecture diagrams, configuration plans, data flows, and integration approaches provided by vendor teams.
Ensure solutions remain consistent with RFP requirements and internal architectural standards, and escalate technical risks and design deviations for remediation.
Oversight of Vendor Implementation Teams
Serve as the technical oversight point during PAM, IGA, Access Management, OT access modernization, and Identity Analytics deployments.
Work closely with vendor-supplied Identity Architects, PAM Leads & Engineers, IGA Leads & Engineers, and Analytics/UEBA/SOAR specialists.
Validate solution design decisions, configuration approaches, and integration patterns, ensuring deliverables meet defined requirements and quality standards.
Coordinate design reviews, technical checkpoints, and solution validation sessions.
Collaboration & Engagement
Provide technical direction, risk mitigation support, and subject matter expertise to the Project Manager throughout the project lifecycle, supporting key milestone planning and risk/issue tracking.
Facilitate alignment between Cybersecurity, IT, OT, HR, Application Owners, Compliance, and Architecture teams.
Communicate technical impacts, options, and constraints in business-friendly language and support operational teams during knowledge transfer and transition activities.
Quality Assurance & Acceptance
Define technical acceptance criteria for RFP responses, solution designs, and implementation deliverables.
Validate vendor solutions through design reviews, testing strategies, and security assessments.
Ensure all documentation, runbooks, diagrams, and handover materials meet enterprise standards.
Deliverables include: IAM RFP & Requirements Package, IAM Target Architecture & Governance Framework, Vendor Design Validation & Oversight Artifacts, and IAM Governance & Operational Readiness Package.
Qualifications
Mandatory Requirements/Skills/Certifications:
University degree in Computer Science, Information Security, Information Technology, Engineering, Cybersecurity, or a related field, or the equivalent combination of education and considerable IAM experience.
10+ years of progressive experience in Identity & Access Management (IAM), covering IAM architecture, Privileged Access Management (PAM), and Identity Governance & Administration (IGA).
5+ years of Information Technology experience.
Strong background in enterprise IT and Security Architecture, including cloud, hybrid, and OT/industrial environments.
Deep knowledge of IAM standards and technologies (e.g., SAML, OIDC, OAuth2, SCIM, AD/Azure AD, HRIS integrations).
Must hold one of the following certifications:
Certified Identity and Access Manager (CIAM)
Certified Access Management Specialist (CAMS)
Certified Information Systems Security Professional (CISSP)
Required Technical & Professional Skills
Demonstrated experience defining functional and non-functional requirements for large-scale IAM initiatives.
Experience preparing or contributing to public sector RFPs, vendor evaluations, and technical scoring.
Ability to provide technical oversight of vendor Identity Architects, PAM Leads, and IGA Leads without performing hands-on implementation.
Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP, SAMLv2, OAuth, and SSL/TLS.
In-depth knowledge of technologies and architecture principles required to secure sophisticated network environments (e.g., Endpoint Security, DLP, NGFW, Zero Trust, VPN, VLANs, IDS, IPS, ACLs, SOAR).
Strong skills in technical presentations, solution walkthroughs, and architecture review sessions with engineering teams.
Proven ability to prepare and deliver executive-level presentations, including clear articulation of risks, dependencies, timelines, and architectural decisions.
Strong decision-making capabilities and demonstrated ability to work collaboratively across various teams in a public sector organization.
Nice to Have Skills
Extensive experience in IT and Network Infrastructure.
Proven experience conducting Cybersecurity Risk Assessments, control gap analysis, and risk-based prioritization.
Experience with identity analytics, UEBA, and SOAR integrations.
Experience in regulated industries or critical infrastructure environments.
Vendor-specific IAM certifications.
Summary
If you're interested in the Technical Analyst role based in Toronto, we encourage you to apply online at www.randstad.ca.
Only qualified candidates will be contacted for the next steps. We look forward to hearing from you!
Randstad Canada is committed to fostering a workforce reflective of all peoples of Canada. As a result, we are committed to developing and implementing strategies to increase the equity, diversity and inclusion within the workplace by examining our internal policies, practices, and systems throughout the entire lifecycle of our workforce, including its recruitment, retention and advancement for all employees. In addition to our deep commitment to respecting human rights, we are dedicated to positive actions to affect change to ensure everyone has full participation in the workforce free from any barriers, systemic or otherwise, especially equity-seeking groups who are usually underrepresented in Canada's workforce, including those who identify as women or non-binary/gender non-conforming; Indigenous or Aboriginal Peoples; persons with disabilities (visible or invisible) and; members of visible minorities, racialized groups and the LGBTQ2+ community.
Randstad Canada is committed to creating and maintaining an inclusive and accessible workplace for all its candidates and employees by supporting their accessibility and accommodation needs throughout the employment lifecycle. We ask that all job applications please identify any accommodation requirements by sending an email to accessibility@randstad.ca to ensure their ability to fully participate in the interview process.
This posting is for existing and upcoming vacancies.
show more