CrawlJobs Logo

Security identity and access management domain architect

asml.com Logo

ASML

Location Icon

Location:
Netherlands , Veldhoven

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided
Save Job
Save Icon
Job offer has expired

Job Description:

As an Identity and Access Management (IAM) Architect at ASML, you will play a critical role in safeguarding our cutting-edge technology. You will design secure identity solutions that protect sensitive data and enable innovation across the organization. Your work ensures that ASML remains a trusted leader in the semiconductor industry by maintaining a strong security posture.

Job Responsibility:

  • Design and maintain IAM domain architecture aligned with enterprise security principles
  • Define IAM standards for identity lifecycle, authentication, authorization, and privileged access
  • Ensure compliance with security policies, regulations, and industry best practices
  • Translate enterprise IAM principles into actionable system-level architectures
  • Provide guidance and reusable patterns for implementation teams
  • Evaluate IAM technologies and vendors for strategic fit
  • Stay current with emerging IAM trends, standards, and threats

Requirements:

  • A bachelor’s degree in computer science, information security, cybersecurity, or a related field (master’s preferred)
  • At least 8 years of experience in IAM architecture or related security roles
  • Proven knowledge of IAM frameworks and protocols such as OAuth 2.0, OpenID Connect, and SAML
  • Hands-on experience with IAM technologies, including: Identity Governance & Administration (IGA)
  • Privileged Access Management (PAM)
  • Single Sign-On (SSO) and Multi-Factor Authentication (MFA)
  • Directory Services (Active Directory, LDAP)
  • Familiarity with cloud IAM (Azure AD, AWS IAM) and hybrid identity models
  • Experience with agile practices (SAFe/Agile environments)
  • Experience with regulatory frameworks like ISO 27001 and NIST CSF
  • A Certificate of Good Conduct “Verklaring Omtrent het Gedrag (VOG)” is required for this position

Additional Information:

Job Posted:
January 06, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Security identity and access management domain architect

Principal Security Architect

As a Security Architect, your role involves designing, reviewing, and enhancing ...
Location
Location
United States , San Francisco
Salary
Salary:
164000.00 - 290000.00 USD / Year
ethoslife.com Logo
Ethos
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of experience in Information Security with at least 2 years as a Security Architect
  • Bachelor’s Degree in Computer Science or related field, or an additional 3 years of pertinent work involvement preferred
  • Strong knowledge of prevalent security architectures, frameworks, standards and emerging threats along with strategies and technologies for defense
  • Deep understanding of network protocols, operating systems, databases, applied cryptography, least privilege, zero trust principles, identity & access management, and other core information security concepts
  • Expertise in cloud computing and its associated best security practices encompassing applications, infrastructure, storage, platforms, and data security
  • Ability to conduct threat modeling and risk assessments
  • Ability to come into our San Francisco, CA office once a week
Job Responsibility
Job Responsibility
  • Conduct Threat Modeling & Architectural Assessments to cover all Information Security domains to ensure Security by Design
  • Assess technologies and solutions to develop and enrich security capabilities
  • Identify security gaps and communicate associated business risks to relevant stakeholders
  • Craft solutions that harmonize business needs with security and compliance requirements
  • Verify the effectiveness of security controls in mitigating identified risks
  • Assist engineering projects across the Software Development Life Cycle (SDLC) and collaborate to prioritize product security elements effectively
  • Apply expertise in information security and application development to instigate organizational shifts aimed at managing and resolving security weaknesses and vulnerabilities
  • Contribute to the creation of security policies, standards, and guidelines
  • Devise and implement frameworks for data classification, retention, and disposal to ensure alignment with data privacy regulations
  • Spearhead initiatives for data security awareness and training
  • Fulltime
Read More
Arrow Right

Senior Application Security Architect

The Information Security Operations (ISO) Sr Manager is a senior management leve...
Location
Location
Mexico , Ciudad De Mexico
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6-10 years of relevant experience
  • Knowledge of Scripting and Programming Languages preferred
  • Demonstrated ability to interpret and apply information security policies, standards and procedures
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • English Advance Domain, fluently speaking and writing
  • Communication skills to explain security controls required for the solutions in a clear and concise manner to non-technology stakeholders
  • Project coordination, give track end to end to all the approval and presentation process
  • Correct comprehension technical and business requirements of the solutions to be explained in IS Global Committees
Job Responsibility
Job Responsibility
  • Support the implementation of Information Security (IS) Training Plan, by verifying training participants completed the training and understand IS requirements
  • Coordinate with cross-functional Operations and Technology (O&T) counterparts and teams to improve O&T risk oversight
  • Attend and participate in internal/external IS forums and risk committees when necessary and provide IS updates to the business
  • Ensure stakeholders are held accountable for IS controls, and understand responsibilities in risk mitigation and remediation
  • Improve processes, remove IS deficiencies and enhance current tools that reduce an overall risk profile
  • Ensure security practices and standards compliance to reduce the likelihood of audit, regulatory and legal liabilities and reduce security risks by enhancing controls and minimizing weaknesses in Citi’s applications portfolio
  • Ensure non-compliant items are addressed through coordination with Business Manager and business staff
  • Support the Global Information Security (GIS) policies, standards, and initiatives development and implementation
  • Provide guidance on IS aspects of projects in support of business initiatives
  • Establish communication channels with cross-sector ISOs to efficiently tackle security issues that span multiple businesses
  • Fulltime
Read More
Arrow Right

Senior Security Technical Architect

As a Senior Security Technical Architect at NTT DATA, your expertise will lead t...
Location
Location
India , Gurgaon
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proficiency in security domains including network security, application security, cloud security, DATA protection, identity and access management, cryptography, and secure coding practices
  • Thorough knowledge of enterprise architecture principles and frameworks (e.g., TOGAF) for designing secure, scalable systems
  • Understanding of security standards and regulations (e.g., ISO 27001, NIST, PCI dSS)
  • Experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools
  • Exceptional understanding of the vendor's products, business, and technology positioning
  • Advanced analytical and problem-solving skills for assessing risks and proposing effective security solutions
  • Advanced client engagement and technical consulting skills with the ability to deliver on business targets
  • Extensive project management experience and familiarity with methodologies
  • Bachelor’s degree in information technology, Computer Science, or related fields
  • certifications in Enterprise Architecture methodologies (e.g., TOGAF, Zachman) are essential
Job Responsibility
Job Responsibility
  • Designing complex security architectures tailored to meet both current and future needs
  • Collaborating closely with cross-functional teams such as developers, engineers, and project managers to embed security considerations throughout the system design and development lifecycle
  • Working as a trusted technical advisor, offering pre-sales support and analysing client requirements to enhance their existing security capabilities
  • Guiding secure coding practices, network security, identity and access management, and DATA protection
  • Selecting and evaluating security technologies, tools, and frameworks
  • Leading incident response activities
  • Ensuring policies, standards, and procedures comply with industry regulations and best practices
  • Engaging with essential stakeholders
  • Driving the drafting of technical design documents that align with solution specifications
  • Contributing significantly to our pre-sale’s efforts, including determining project scopes, product pricing, and RFP/RFI responses
  • Fulltime
Read More
Arrow Right

Senior Security Technical Architect

As a Senior Security Technical Architect at NTT DATA, you will design complex se...
Location
Location
South Africa , Johannesburg
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proficiency in security domains including network security, application security, cloud security, DATA protection, identity and access management, cryptography, and secure coding practices
  • Thorough knowledge of enterprise architecture principles and frameworks (e.g., TOGAF) for designing secure, scalable systems
  • Understanding of security standards and regulations (e.g., ISO 27001, NIST, PCI dSS)
  • Experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools
  • Exceptional understanding of the vendor's products, business, and technology positioning
  • Advanced analytical and problem-solving skills for assessing risks and proposing effective security solutions
  • Advanced client engagement and technical consulting skills with the ability to deliver on business targets
  • Extensive project management experience and familiarity with methodologies
  • Bachelor’s degree in information technology, Computer Science, or related fields
  • certifications in Enterprise Architecture methodologies (e.g., TOGAF, Zachman) are essential
Job Responsibility
Job Responsibility
  • Design complex security architectures tailored to meet both current and future needs
  • Collaborate closely with cross-functional teams such as developers, engineers, and project managers to embed security considerations throughout the system design and development lifecycle
  • Work as a trusted technical advisor, offering pre-sales support and analysing client requirements to enhance their existing security capabilities
  • Guide secure coding practices, network security, identity and access management, and DATA protection
  • Select and evaluate security technologies, tools, and frameworks
  • Lead incident response activities
  • Ensure policies, standards, and procedures comply with industry regulations and best practices
  • Engage with essential stakeholders to drive the drafting of technical design documents
  • Contribute to pre-sale’s efforts, including determining project scopes, product pricing, and RFP/RFI responses
  • Manage client proof-of-concept (POC) initiatives and own proposed solutions through to delivery
What we offer
What we offer
  • Workplace embraces diversity and inclusion
  • A place where you can grow, belong and thrive
  • Fulltime
Read More
Arrow Right

Physical identity domain architect

As part of the strategy to advance our digital and innovative capabilities in ou...
Location
Location
Netherlands , Veldhoven
Salary
Salary:
Not provided
asml.com Logo
ASML
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master degree in Innovation / Technology / Security Management or equivalent
  • 10+ years’ experience with a focus on strategic planning and architecture in physical security and/or identity and access management
  • 5+ years’ experience in leading a team
  • 5+ years’ experience in program / project management
  • Sound understanding of security technologies, techniques and best practices, with a focus on (physical / digital) identity and security
  • Excellent leadership, influencing and interpersonal skills
  • Self-starter mentality, highly-motivated, with a strong work ethic and entrepreneurial mindset
  • Able to lead, develop, motivate and mentor a team of security professionals
  • Able to strategize, develop and implement new concepts and technologies
  • Able to convince others, change management savvy and deal with resistance
Job Responsibility
Job Responsibility
  • Drive strategic planning processes for Physical Identity capabilities, resulting in a multi-year plan and roadmap, including the monitoring thereof
  • Lead and drive innovative and leading edge physical and digital identity initiatives to increase ASML’s resilience to existing and new internal and/or external physical and identity security threats (e.g. identity theft)
  • Translate physical & digital identity concepts and innovations into workable products and services, improving the security, effectiveness and efficiency of physical and digital identity security
  • Create and nurture an internal and external innovation funneling mechanism that ensures ideas are collected, processed, tested and implemented, and align with ASML’s security architecture and capability framework
  • Connect the physical and digital identity spaces and develop synergies and holistic solutions that seamlessly integrate
  • Develop and maintain relationships with relevant internal and external stakeholders
  • Build, lead, develop, motivate and mentor a team of innovation / security professionals
  • Fulltime
Read More
Arrow Right

IAM Solutions Architect

Join a leading organization dedicated to empowering individuals and businesses t...
Location
Location
United States , Southlake, Austin
Salary
Salary:
72.30 - 80.33 USD / Hour
aquent.com Logo
Aquent
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Computer Information Systems, Management Information Systems, or a related technical field
  • A minimum of 10 years of experience in information security, with at least 5 years specifically focused on Identity and Access Management (IAM)
  • At least 3 years of experience in an enterprise-level architecture role, with a direct focus on IAM technologies and strategy
  • Demonstrated deep knowledge of critical IAM domains, including authentication and authorization, Single Sign-On (SSO), Identity Governance and Administration (IGA), Directory Services, Federation Services, and Privileged Access Management (PAM)
  • Proven ability to define robust IAM architectures and develop strategic roadmaps
  • Strong background in aligning IAM strategy with enterprise security policies and overarching business objectives
Job Responsibility
Job Responsibility
  • Architect and establish comprehensive strategies for managing the identity lifecycle, including user authentication and authorization across both on-premise and cloud environments
  • Define, document, and maintain reference architectures, technology standards, processes, and policies for core identity solutions
  • Seamlessly integrate new identity solutions into existing infrastructure, ensuring compatibility and optimal performance
  • Provide expert leadership and direction for technical infrastructure support, including on-call support and resolution of escalated trouble tickets, and lead the resolution of key implementation and system integration challenges
  • Leverage deep understanding of federation concepts and technologies, including SAML, OAuth, and OIDC, to design advanced identity solutions
  • Design and engineer sophisticated identity and access management solutions within leading cloud platforms, including Azure and AWS, and potentially other cloud providers
  • Lead Proof of Concepts (POCs) and develop tactical and strategic solution roadmaps for identity initiatives
  • Collaborate effectively with product vendors and internal governance teams, presenting and demonstrating application solutions to diverse stakeholders
  • Guide the deployment of directory services infrastructure, ensuring adherence to best practices, robust security architecture, and resilience against vulnerabilities
What we offer
What we offer
  • subsidized health, vision, and dental plans, paid sick leave, and retirement plans with a match
Read More
Arrow Right

Senior Cyber Security Engineer

As a Sr Cybersecurity Engineer at Cloud Software Group, you will design and impl...
Location
Location
United States , San Ramon
Salary
Salary:
116716.00 - 210089.00 USD / Year
cloud.com Logo
Cloud Software Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in Cybersecurity Engineering, Infrastructure Security, or a related technical role, with a proven track record of managing enterprise-grade security platforms or a Master’s degree with 3 years
  • or a PhD without experience
  • Deep technical understanding of security controls across multiple domains, including Vulnerability Lifecycle Management, Privileged Access Management (PAM), Identity & Access Management (IAM), and Network Defense
  • Knowledge of one or more Cloud platforms (AWS, Azure and GCP) and best practices for architecting and securing
  • Familiarity with security telemetry concepts, including logging, monitoring, and alerting
  • Awareness of common enterprise threat vectors and the types of controls used to prevent or detect them
  • Knowledge of security trends, software, and protocols
  • Problem-solving, attention to detail, sharp analytical skills
  • Strong communication skills
Job Responsibility
Job Responsibility
  • Collaborate with Engineering Business Units, Operations teams to architect, deploy, and continuously optimize enterprise security controls that balance robust protection with business agility
  • Drive the continuous optimization of core security platforms, focusing on Vulnerability Management, Privileged Access Management (PAM), and automated workflows to enhance our defensive posture
  • Ensure high availability and performance of owned security platforms by providing advanced technical support and streamlining escalation paths
  • Create and maintain clear technical documentation for security configurations, processes, and improvements
  • Actively monitor global threat intelligence feeds and vulnerability disclosures to identify emerging risks and integrate proactive countermeasures into our security architecture
  • Orchestrate enterprise-wide phishing simulation programs to quantify organizational risk and leverage data-driven insights to strengthen the “human firewall" against social engineering
  • Translate complex vulnerability data into comprehensive risk reports, providing stakeholders with clear technical roadmaps to harden the organization's security posture
  • Support internal and external security audits by providing technical evidence as needed
What we offer
What we offer
  • Healthcare, life insurance and disability benefits, 401(k) plan and company match
  • Fulltime
Read More
Arrow Right

Senior Product Manager, Governance Engineering

The Onyx Research Data Tech organization represents a major investment by GSK R&...
Location
Location
United States , Cambridge
Salary
Salary:
147675.00 - 246125.00 USD / Year
us.gsk.com Logo
GSK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • PhD + 2 years, Masters + 4 years, or Bachelors + 6 years
  • 5+ years of experience in product management, with a proven track record of shipping 0-to-1 technical products, preferably in platform, infrastructure, or security domains
  • Experience defining product strategy for automated governance, Identity & Access Management (IAM), data access control, or platform security services
  • Technical fluency with cloud-native architectures (e.g., AWS, GCP, Azure), API design, and the infrastructure required to build and scale secure, distributed systems
  • Experience with security principles, compliance frameworks (e.g., GDPR, HIPAA), and data privacy regulations
Job Responsibility
Job Responsibility
  • Product Vision & Strategy: Define and own the product vision and strategy for automated governance, focusing on delivering self-service, secure, and compliant access across our cloud platforms, including compute, AI/ML, GenAI, data and knowledge management, and scientific applications
  • 0-to-1 Product Leadership: Lead the end-to-end product lifecycle for new governance capabilities, from concept and user research to design, development, launch, and continuous iteration, balancing security needs with developer and scientist velocity
  • Automated Access & Data Governance: Drive the development of intelligent, automated systems for fine-grained access control, data usage policies, and consent management. This includes capabilities for "who can access what data for what usage" to ensure regulatory compliance and ethical data practices
  • Identity & Authentication Services: Own the product roadmap for robust authentication and authorization services for applications and platforms, including seamless integration with enterprise identity providers, secure API access, and single sign-on (SSO) capabilities
  • GenAI Governance & Agentic Access: Pioneer product capabilities for governing GenAI applications and AI agents, including defining and implementing "on-behalf" data access patterns, secure delegation of agent permissions, auditable agent actions, and ensuring responsible AI policy enforcement
  • User-Centric Design: Deeply understand the needs of our diverse user personas—engineers, developers, and scientists—to design governance products that are intuitive, minimize friction, and embed security by default without hindering innovation
  • Technical Product Definition: Translate complex security, compliance, and governance requirements into clear, actionable technical specifications, user stories, and API designs for engineering teams, fostering a "governance as code" mindset
  • Cross-Functional Collaboration: Partner closely with enterprise security architects, legal & compliance teams, platform engineering, product managers, and R&D stakeholders to align on requirements, ensure solution adoption, and drive a culture of secure development
  • Performance & Metrics: Define and track key performance indicators (KPIs) for governance effectiveness, compliance adherence, operational efficiency, and user adoption to continuously optimize and demonstrate product value
What we offer
What we offer
  • health care and other insurance benefits (for employee and family)
  • retirement benefits
  • paid holidays
  • vacation
  • paid caregiver/parental and medical leave
  • annual bonus
  • eligibility to participate in our share based long term incentive program
  • Fulltime
Read More
Arrow Right