The Identity and Access Management Systems Manager will be responsible for plan, direct and coordinate activities in Identity and AccessManagement systems. Duties include:
1. Develop and implement a comprehensive IAM strategy aligned with the organization's business objectives and security requirements.
2. Lead the IAM team, providing guidance, mentorship, and performance feedback.
3. Stay abreast of industry trends and best practices in IAM.
4. Oversee the day-to-day operations of the IAM program, including user provisioning, de-provisioning, access request management, andprivilege management.
5. Ensure compliance with internal security policies and external regulations.
6. Conduct regular access reviews and audits to identify and mitigate risks.
7. Review project plans to plan and coordinate project activity.
8. Evaluate, select, and implement IAM technologies and solutions.
9. Integrate IAM systems with other IT infrastructure components.
10. Troubleshoot and resolve IAM-related issues.
11. Work closely with IT, security, and business stakeholders to understand their IAM needs.
12. Communicate IAM policies and procedures to the organization.
13. Provide training and support on IAM tools and processes.
14. Assign and review the work of systems analysts, programmers, and other computer-related workers.
15. Develop computer information resources, providing for data security and control, strategic computing, and disaster recovery.
16. Consult with users, management, vendors, and technicians to assess computing needs and system requirements.
17. Prepare and review operational reports or project progress reports.
18. Control operational budget and expenditures.
This position requires 60% travel to various unanticipated client sites throughout the U.S.
This position requires a U.S. master’s degree or foreign equivalent in CS, EE, CE, CIS, IT or closely related/equivalent, and five (5)years of experience as a as a SW Engr, Info Manager/Engr, or closely related.
Must haveprofessional experience with:
- PL/SQL or MongoDB or NoSQL
- Azure Active Directory or Sailpoint IIQ
- Okta or Auth0 or PingFederate
- PingID or Microsoft Authenticator