Verification Specialist
Listed on 2026-03-15
-
IT/Tech
Cybersecurity, Systems Engineer
Location: Queensville
Join to apply for the Specialist role at Key Data Cyber
Get AI-powered advice on this job and more exclusive features.
At Key Data Cyber
, our vision is to be the North American leader in designing and delivering digital identity security strategies and solutions to protect our clients in their digital transformation initiatives. Key Data Cyber is a Gartner-recognized leader in professional identity security services, specializing in:
- Identity Governance & Administration (IGA)
- Privileged Access Management (PAM)
- Customer Identity & Access Management (CIAM)
- Cloud Security Posture Management (CSPM)
- Identity Threat Detection & Response (ITDR)
We are currently seeking an Specialist to join our Delivery Services team and lead the Proof of Concept (POC) for an identity verification solution. This role demands deep expertise in identity and access management, hands-on experience with identity verification technologies, and strong collaboration skills to work across technical and business teams in evaluating, designing, and validating solutions that enhance our digital identity capabilities.
Location: Canada, Remote
Employment Type: Contract duration until December 2025, with a possibility for extension
Responsibilities- Lead and manage the end-to-end Proof of Concept (POC) for identity verification implementation.
- Define success criteria, develop test scenarios, and establish evaluation metrics for the POC.
- Collaborate with vendors and internal stakeholders to configure and deploy POC environments.
- Develop practical identity verification use cases (e.g., employee validation during help desk calls).
- Evaluate identity verification technologies such as biometric authentication, document verification, and liveness detection.
- Integrate identity verification solutions with IAM platforms (e.g., Ping Identity).
- Ensure all solutions comply with security, privacy, and regulatory requirements.
- Work closely with product owners, security architects, and compliance teams to gather and clarify requirements.
- Present findings, recommendations, and technical insights to leadership and key decision-makers.
- Produce detailed documentation including architecture diagrams, POC results, and implementation roadmaps.
- Provide technical guidance and conduct knowledge transfer sessions for internal teams.
- Bachelor’s degree in Computer Science/Information Technology; post-graduate degree in a related field is a strong asset.
- 3–5+ years of hands-on experience in identity and access management (IAM) and identity verification technologies.
- Proven experience leading Proof of Concept (POC) initiatives or similar project implementations.
- Familiarity with IAM platforms such as Ping Identity, Okta, or similar solutions.
- In-depth knowledge of identity verification technologies including biometric authentication, document verification, and liveness detection.
- Strong understanding of security, compliance, and privacy frameworks (e.g., GDPR, CCPA).
- Experience integrating identity verification solutions with IAM systems and enterprise environments.
- Ability to define success criteria, develop test scenarios, and critically evaluate technologies to recommend optimal solutions.
- Strong communication skills, both verbal and written; ability to present information clearly.
- Analytical mindset with attention to detail; able to work under pressure and meet deadlines.
- Self-motivated, collaborative, and organized with the ability to take ownership of projects.
- A Place Putting People First – Our team is our strongest asset. We support learning and development and promote work-life balance.
- A Place to Accelerate Your Career – We lead digital identity solutions deployments in Canada and are in hyper-growth mode across North America.
- A Place to Share Your Perspective – A culture of respect, belonging, and empowerment for all.
If you require accommodation due to a disability at any time during the recruitment and/or assessment process, please contact Talent Acquisition and we will make all reasonable efforts to accommodate your request.
Apply now to join the Key Data Cyber team!
Note:
This posting reflects the responsibilities and qualifications for the role and is not a complete job description. For more details, refer to internal job postings.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: