Skip to main content
KeyData Cyber logo

Manager,Digital Identity

KeyData Cyber
Be an Early ApplicantFull Timemid
CanadaPosted Today

Job Description

<div class="content-intro"><p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">At <strong>KeyData Cyber,</strong> we’re shaping the future of identity security. Recognized by Gartner and KuppingerCole as a leading IAM professional services firm, we specialize exclusively in designing, deploying, and managing end-to-end Identity and Access Management programs for organizations across North America.</span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">With 20&nbsp;years of experience, 50M+ identities managed, and 1,000+ successful deployments, our team is our strongest asset and is built by design to help clients protect critical infrastructure, enable digital transformation, and ensure compliance with confidence.</span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">We deliver comprehensive solutions across IAM domains, including:</span></p> <ul> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Workforce IAM (Access Management, Identity Governance and Administration, Privileged Access Management)</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Consumer IAM (Identity Verification, Authentication and Access, Threat Detection) in highly regulated industries.</span></li> </ul> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">If you’re ready to grow your career alongside some of the industry’s best, come join us — you’re key to our success</span></p></div><p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span data-contrast="auto"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span data-teams="true">We are seeking a <strong>Manager, Digital Identity</strong> to join KeyData Cyber’s Delivery Services team. This role is ideal for an IAM and IGA professional with strong experience in assessments, strategy, and solution delivery. You will work closely with clients to lead IAM/IGA assessments, roadmap initiatives, and identity transformation projects while supporting enterprise security and compliance objectives.</span></span></span></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong>Location: </strong>Canada</span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong>Employment type:</strong> Full-time, Remote</span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><span data-contrast="none">Vacancy Status: </span></strong><span data-contrast="none">Immediate Opening: This position is currently available, and hiring is underway.&nbsp;</span><span data-ccp-props="{&quot;335559739&quot;:0}">&nbsp;</span></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u>Responsibilities:</u></strong></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u></u></strong></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"></span></p> <ul> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="2mwdcf" data-start="53" data-end="165"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Lead and deliver IAM/IGA maturity assessments, gap analyses, and roadmap development for enterprise clients.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="bz0y7s" data-start="166" data-end="326"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Collaborate with KeyData Cyber’s multi-disciplinary teams to design and implement digital identity and IGA solutions, with a focus on SailPoint and Saviynt.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="1cjahc0" data-start="327" data-end="426"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Provide subject matter expertise while leading client engagements and guiding engagement teams.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="ukzesb" data-start="427" data-end="557"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Present findings, recommendations, and identity transformation strategies to client stakeholders, including senior executives.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="1q7dfty" data-start="558" data-end="636"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Manage IAM/IGA project deliverables and ensure successful client outcomes.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="11p8az4" data-start="637" data-end="788"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Drive identity initiatives including lifecycle management, access governance, compliance, certification campaigns, and Segregation of Duties (SoD).</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="bjsua9" data-start="789" data-end="898"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Develop strong, long-term client relationships and align identity architectures with business objectives.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="8q253w" data-start="899" data-end="1028"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Support business development activities including client proposals, thought leadership, and participation in industry events.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="1102ewr" data-start="1029" data-end="1126"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Contribute to building knowledge capital through research, innovation, and industry insights.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;" data-section-id="1xb6lro" data-start="1127" data-end="1245" data-is-last-node=""><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Help grow KeyData Cyber’s security practice across North America through leadership and entrepreneurial initiatives.</span></li> </ul> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u>Required Qualifications:</u></strong></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u></u></strong></span></p> <ul> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">5+ years of experience in Identity and Access Management (IAM) and Identity Governance &amp; Administration (IGA), including experience conducting IAM/IGA assessments and roadmap initiatives.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">3+ years of hands-on experience with IAM/IAG technologies such as SailPoint and/or Saviynt.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Experience with technologies such as CyberArk, Okta, ForgeRock, Microsoft Azure, Ping Identity, or BeyondTrust is an asset.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Strong consulting and client-facing experience working with stakeholders to define IAM/IGA strategies and implement solutions.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Proven ability to manage multiple projects and collaborate across teams</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Technical expertise in:</span> <ul> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Automated provisioning and reconciliation of IT resources</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">RBAC design and implementation</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Access request and approval workflows</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Single Sign-On and federation solutions</span></li> </ul> </li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Security certifications (e.g., CISSP) and/or vendor certifications are an asset.</span></li> <li style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;">Bachelor’s degree in a technical field (Computer Science, CIS, MIS, Engineering, or equivalent <span style="color: rgb(255, 255, 255);"><span data-teams="true">#LI-RJ1</span>&nbsp;</span><span data-teams="true"><br></span></span></li> </ul> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u></u></strong></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong><u></u></strong></span></p> <p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"></span></p><div class="content-conclusion"><p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Why You’ll Love Working Here</strong></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">At KeyData Cyber, we put people first, valuing learning, growth, and work-life balance. We offer extensive opportunities to advance your career through leading digital identity projects across North America. Our culture is built on respect, inclusion, and equal opportunity for everyone.</span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Accessibility &amp; Accommodations</strong></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><em>If you require accommodation due to a disability at any time during the recruitment and/or assessment process, please contact </em><a href="mailto:%20talent.acquisition@keydata.ca"><em>Talent Acquisition</em></a><em> , and we will make all reasonable efforts to accommodate your request.&nbsp;</em></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><em></em></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Fraud Prevention &amp; Identity Verification</strong></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">We may use information provided during the application process to help prevent fraud and verify identity. These checks may be conducted automatically through trusted third‑party service providers as part of our standard application screening process.</span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><em></em></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span class="TextRun SCXW158980204 BCX0" lang="EN-CA" data-contrast="none"><span class="NormalTextRun SCXW158980204 BCX0">BrightHire technology is used during the preliminary interview stage for recording, transcription, and candidate evaluation as part of our hiring process.&nbsp;</span></span></span></p> <p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Apply now to join the <strong>KeyData Cyber</strong> team and be part of our mission to secure the future of digital identity across North America.</span></p></div>

About KeyData Cyber

KeyData Cyber logo

KeyData Cyber

keydatacyber.com

On-site

Want AI-powered job matching?

Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.

Get Started Free