Cyber Security Identity, Fraud & Governance

Join Identity, Fraud & Governance TalentCloud

If you possess mastery in any of the roles or skills below, you can apply to this TalentCloud. Once you become an approved Experfy TalentCloud member, you will get exclusive access to jobs and project opportunities from our clients.

Popular Cloud Architect Roles in this TalentCloud

  • Identity & Access Management Specialist
  • Digital Identity Expert
  • Fraud Protection Officer
  • Cybersecurity Fraud Analyst
  • Identity & Access Governance Technologist
  • Governance, Risk, and Compliance Administrator
  • Model Governance Director
  • Identity & Access Management Engineer
  • Identity & Access Management Analyst

Cloud Description

Identity, Fraud, and Governance experts in this TalentCloud should be able to ensure only the right people have access to certain information at all times. This is accomplished through data access and privilege restrictions, as well as policies and procedures, as well as cyber threat detection, prevention, and response. 


  • Ensure access control through various practices, such as audits, assessments, threat mitigation practices, and risk identifications
  • Conduct research and analyze data to find weaknesses and breaches
  • Establish and prioritize solutions in a timely manner relating to critical issues
  • Report any issues to the appropriate parties immediately and generate reports regarding risk analysis and solution recommendations
  • Offer updates to existing systems and practices to boost security measures
  • Design, configure and implement identity access management solutions
  • Support process and procedures at all times, including through ticket management and customer service
  • Monitor transactions and access to seek out possible fraudulent activity
  • Create policies and processes regarding cyber threat detection, prevention, and response 
  • Detect, prioritize and control within all networks and infrastructure
  • Work with managers to bridge the gap between big-picture governance and daily operational practices
  • Develop risk management protocols and controls to add to the cybersecurity framework

Preferred Education 

  • Bachelor’s or Master’s Degree in IT or Computer Science Related Field
  • Equivalent Work Experience

Required Skills 

  • Experience with information security and risk management tools
  • Understand information security standards and frameworks, such as ISO 27001, SOC 2, NIST, SANS, COBIT, and others
  • Must have exceptional organizational skills, as well as possess the ability to multitask well and work in a fast-paced environment
  • Familiarity with state and federal compliance regulations
  • Solid understanding of technical jargon

Preferred Skills

  • Complete specialized certifications, such as CIAM, CISM, CAMS, CISSP, Security+, CRISC, CGEIT, and others
  • MBA in Information Systems or related field