Skip to content
IAM Consulting · Melbourne, AU

Securing Identities,
Governing Access.

I help organisations design and implement identity governance programs that reduce risk, enforce least privilege, and pass audits — using SailPoint, Okta, and Azure AD.

50+
IAM Deployments
600+
Identities Governed
3
Major Platforms
100%
Audit Pass Rate
LinkedIn

End-to-End Identity Governance

From role architecture to attestation campaigns, I deliver IAM programs that scale with your organisation.

Role Engineering & RBAC

Deep-dive role mining using both top-down and bottom-up methodologies. I build scalable role catalogues that enforce least privilege across every department.

SoD Policy Design

Define and implement Segregation of Duties policies — both entitlement-based and role-based — including cross-application conflict detection and exception workflows.

Certification Campaigns

Orchestrate manager and application-owner access reviews, configure lifecycle phases, and automate revocation workflows to reduce certification fatigue.

Connector Integration

Build and maintain connectors for Active Directory, Azure AD/Entra ID, Okta, and custom applications — including schema configuration, aggregation, and provisioning rules.

Compliance & Audit Readiness

Prepare comprehensive evidence packages, policy violation reports, and exception documentation to satisfy SOX, ISO 27001, and internal audit requirements.

Identity access management ecosystem showing locks, keys, and user identity cards in an interconnected isometric layout

What I Deliver & When

IAM Health Check and initial consultation are complimentary. Engagement pricing is discussed at your first meeting.

ServiceWhat's DeliveredTimelineInvestment
IAM Health CheckScorecard PDF, 3 priority actionsFree / 1 dayFree
Current State / Target State AssessmentGap analysis, roadmap document2–4 weeksScoped to engagement
AD Cleanup & Identity HygieneStale accounts removed, groups rationalised2–4 weeksScoped to engagement
MFA RolloutEntra MFA or Okta MFA deployed, policy configured2–4 weeksScoped to engagement
Conditional Access Policy DesignCA policies built, tested, documented1–2 weeksScoped to engagement
Joiner/Mover/Leaver AutomationAutomated provisioning via Entra / SailPoint4–8 weeksScoped to engagement
Role Engineering & RBAC DesignRole catalogue, least-privilege mapping4–8 weeksScoped to engagement
SoD Policy DesignSoD ruleset, violation report, exception process3–6 weeksScoped to engagement
IGA Platform ImplementationSailPoint IIQ/IDN or Entra ID Governance end-to-end8–16 weeksScoped to engagement
PAM ImplementationEntra PIM or CyberArk for privileged accounts4–8 weeksScoped to engagement
Cloud Identity MigrationOn-prem AD → Entra ID, hybrid → cloud-only8–16 weeksScoped to engagement
ACSC Essential 8 IAM UpliftMaturity level 1→2 for identity controls (E8 3, 5, 6)4–8 weeksScoped to engagement
APRA CPS 234 Compliance & Audit ReadinessEvidence packages, attestation, policy documentation3–6 weeksScoped to engagement
Ongoing vIAM RetainerMonthly access reviews, policy updates, advisoryOngoingScoped to engagement

Technology Expertise

Hands-on experience with the industry's leading identity governance and administration platforms.

SailPoint IIQ

IdentityIQ administration, role mining, SoD policies, certification campaigns, workflow configuration, and BeanShell customisation.

Okta

SSO federation, MFA policies, lifecycle management, OAuth 2.0/OIDC integration, and Universal Directory configuration.

Azure AD / Entra ID

Conditional Access policies, Privileged Identity Management, App Registrations, SAML/SCIM configuration, and hybrid identity setup.

Active Directory

OU structuring, Group Policy, PowerShell automation, user lifecycle scripts, and AD-to-IGA connector configuration.

API & Web Services

OAuth 2.0 token flows, REST API integration, web services connectors, and Postman-based testing for identity provisioning pipelines.

Network & Infra

Cisco networking (Layer 1–3), network infrastructure troubleshooting, and identity-aware network access control integration.

Real-World IAM Projects

Production-inspired environments built to demonstrate enterprise-grade IAM capability end to end.

Featured Project

Metaverse IAM Lab

Enterprise Identity Governance & Hybrid Identity Environment

Stack AD + SailPoint IIQ + Entra ID + AD Connect
Scope Identity Governance, JML, RBAC, Hybrid Sync
Status Validated & Documented

Overview

A production-inspired Identity and Access Management environment built across multiple VMs to demonstrate enterprise-grade capability in IAM systems architecture, identity governance engineering, access automation, and operational troubleshooting.

Key Capabilities Demonstrated

Source-of-truth driven identity governance with AD
Joiner, Mover, and Leaver (JML) automation workflows
Role-based access control with business role design
Hybrid identity sync (AD to Entra ID via AD Connect)
End-to-end access request, approval, and provisioning
LDAP/LDAPS, certificate, and Tomcat troubleshooting

Architecture

Metaverse IAM Architecture diagram showing AD, SailPoint IIQ, AD Connect, and Entra ID layers
On-Prem Active Directory on Windows Server VMs
Governance SailPoint IIQ + Java + Tomcat
Hybrid AD Connect / Entra Connect
Cloud Microsoft Entra ID
Consultant analysing identity governance dashboard with access management analytics

Keyur Purohit

I am an IAM specialist based in Melbourne, Australia, with deep expertise in identity governance, role engineering, and access management. My work spans the full IGA lifecycle — from initial role mining and RBAC strategy through SoD policy implementation and certification campaign orchestration.

I combine infrastructure knowledge (Cisco networking, Active Directory, Azure) with identity governance platforms (SailPoint IdentityIQ, Okta) to deliver solutions that are technically sound and operationally practical. Whether building a greenfield IAM program or optimising an existing deployment, I focus on outcomes: reduced risk, cleaner access, and audits that pass the first time.

SailPoint IIQ Okta Azure AD / Entra Active Directory Role Engineering SoD Policies Access Certifications OAuth 2.0 PowerShell Python Cisco Networking

How I Work

A structured, risk-focused approach to every engagement.

01

Discovery

Map your current access landscape — who has what, where, and why. Identify orphan accounts, over-provisioned roles, and toxic combinations.

02

Architecture

Design your role catalogue, SoD rules, and governance workflows. Define birthright access, request policies, and exception processes.

03

Implementation

Configure connectors, deploy policies, build certification campaigns, and test end-to-end in your IGA platform of choice.

04

Optimisation

Refine policies based on real violation data, tune certification schedules, and establish continuous improvement cadences.

Let's Talk Identity

Whether you need a full IAM program build or a targeted SoD audit, I am ready to help.

Location
Melbourne, Victoria, Australia
Availability
Open to contract & consulting engagements