Job Directory Morgan Stanley Identity & Access Management Security Architect - VP
Morgan Stanley

Identity & Access Management Security Architect - VP Morgan Stanley
New York, NY

Morgan Stanley is a global financial services firm that advises, originates, trades, manages, and distributes capital.

Companies like Morgan Stanley
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.

About Morgan Stanley

Job Description

At Morgan Stanley, we are thinking today about how to plan for and adapt to tomorrow's realities and position ourselves for long-term growth. We pursue sustainability not only because it reflects our values, but also because it is playing an increasingly important role in finance. Morgan Stanley is dedicated to making a positive contribution to society through our core business activities, employment practices, operations and philanthropic giving. Our growing focus on sustainable investing reflects our commitment to delivering scalable innovations and solutions that help maximize the potential for private capital to address the world's most pressing challenges. We believe we can partner with the millions of individuals we serve, as well as the governments and institutions for whom we advise, originate, trade, manage and distribute capital, to advance sustainable solutions globally.

Morgan Stanley is a global financial services Firm with a large and diversified clientele. We encourage you to visit the Firm s Internet site at to learn more about Morgan Stanley.

Technology Risk (TR)'s mission is to deliver first-line defenses to manage risks to Firm technology, information and cyber threats through risk identification, control management and assurance. This allows the business to operate and grow in a secure and legally-compliant manner.


Morgan Stanley's SecArch team is looking for an experienced Identity and Access Management (IAM) Architect, VP to join their established team.

Security Architecture (SecArch) team is part of the Technology Risk (TR) organization. The mission of the team is to protect the Firm by ensuring in-scope technologies built internally, products purchased and services used meet security requirements that include the Firm's Policies, external guidelines, regulatory expectations, and appropriate controls in the areas of information security, secure design, and cyber security. We accomplish this mission via three primary services: architecture consulting, solutions consulting, and design review.

The SecArch IAM Security Architect will be working on multiple security architecture and design assessments spanning a range of technologies, primarily related to IAM on-premises and cloud-based solutions. The architect is expected to be capable of conducting a security architecture review from a general scope, while having subject matter expertise in IAM security. To be successful in this role, the candidate must have deep IAM subject matter expertise and broad overall technology & security experience coupled with risk management, leadership, communication, and time management skills.


* Work independently to lead SecArch deep dives with business and technology requestor
* Conduct assessment and provide technology risk/requirements to the requestor in the IAM security domain
* Prioritize risks identified in relation to business risks
* Propose solutions to mitigate risks identified
* Establish, communicate and contribute to the overall effort of the Firm's IAM security posture, strategies and direction
* Leverage existing expertise in IAM on-premises or cloud-based solutions to identify gaps in current technology environment and provide strategy for risk reduction
* Perform hands-on assessments of system, applications and platforms as part of control validation and strategy definition
* Produce position papers on testing/research performed
* Periodically review security reference architecture (security blueprints) and conduct updates/enhancements


Security Architecture Skills

Required - In depth knowledge of IAM security principles, protocols, frameworks, solutions and vulnerabilities. Ability to explain these vulnerabilities to engineers as well as business users.

Required - Experience in at least two of the following domains:

Identity: Identity lifecycle management

Authentication: Multi-factor authentication, Risk based authentication, Federation

Authorization: Entitlement management, Access governance, Privileged access management

Cloud Security: Cloud computing architecture, IAM solutions within Microsoft Azure, Amazon Web Services (AWS) and, preferably, other cloud providers

Required - Hands-on experience in at least three of the following IAM protocols and solutions: SAML, Siteminder, Kerberos, OpenID Connect, OAuth, Smartcard, U2F, UAF, RADIUS, PingFederate, ADFS, Azure AD, CyberArk, HiPAM and OpenIDM.

Highly Desired - Hands-on experience in Microsoft Azure IAM solution

Highly Desired - Experience in conducting and / or reviewing penetration tests, dynamic vulnerability assessments and static vulnerability assessments.

Desired - Experience in conducting security assessments with a strong focus on reviewing technical designs and functional requirements to identify areas of security weakness, presenting the outcomes of the assessment and obtaining buy in.

Desired - Experience in the following security domains:

Data protection, data leakage prevention and secure data transfer and storage

Application Security - validation checking, software attack methodologies

Cryptography - encryption and hashing

Soft Skills (Required)

Excellent communication skills: written, oral, presentation, listening

Ability to influence through factual reasoning

Time management: ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking

Strong focus on delivery when presented with short timelines and increased involvement from senior management

Ability to adjust communication of technology risks vs business risks based on the audience

Ability to operate in multiple virtual teams, directly manage teams, or ability to operate as a sole-contributor

Development Experience

Required - Even though the SecArch Integrator role is not a development role, the candidate must have previous background in programming, design and application architecture.

Required - In order to be a practical SecArch Integrator shall have experience implementing complex applications in an enterprise environment.

Desired - Knowledge of programming and scripting languages: Java, JavaScript, C#, C/C , Perl, Python, Ruby

Desired - Knowledge of web technologies such as Web Browsers, Web Servers, Web Services

Other Areas of Expertise

Desired - Understanding of geographic regulations and their impact on Security assessments

Desired - Previous experience in Financial Services is preferred

Desired - CISSP, CISM, GSEC or other industry qualification

Desired - Experience working with global organizations

Educational Requirements

Bachelor's Degree in Computer Science, Information Security or other Engineering Degree with minimum 5 years relevant work experience in high-paced, enterprise environment

About Morgan Stanley

Morgan Stanley is a global financial services firm that advises, originates, trades, manages, and distributes capital.

10001 employees
Morgan Stanley

1585 broadway

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.