Manager, Identity & Access
The Identity and Access (IAM) Manager position is part of the Global Information Security organization. The position has global responsibility for managing and directing the client's identity and access management technologies, services and activities.
The key actions, outputs, deliverable, products and Services include:
· IAM service delivery, support and management.
· Management of integrated, global enterprise IAM systems.
· Development of IAM related policies, procedures and priorities.
· Identification, establishment and sustainment of IAM services Service Levels.
· Development and Management of Privileged Access (PAM) standards and tools
· High quality, reliable, stable, and persistently available IAM technologies and services, worldwide.
· Enterprise level IAM standards and strategies that support current and future business requirements.
Identity Management for all employees, contractors, and third parties; Access Management to company network, all enterprise systems, and select business systems; Federation services for select third party systems, Vendor Access Management and standards as well as Metrics and Process (Access reviews), Multi Factor Authentication strategy and execution
•Management, administration, maintenance and support of all Identity and Access Management technologies and services (end-to-end).
-Manage the technical team (Managed Services) responsible for identity and access management and oversee the development, implementation and support of client's enterprise user provisioning tool and processes globally. This includes provisioning for Active Directory (AD) user and administrative accounts, AD generic and service account provisioning, SAP accounts and access, remote access, password management, and maintenance of the Enterprise User Data Repository.
-Management and support of client's enterprise web access management / single sign-on system for secure access to applications
-Direct the establishment and continuous improvement of IAM processes to ensure day-to-day operational stability and security.
-Development and execution of applicable IAM security standards and processes, in partnership with Global Sourcing, select and manage vendors needed for IAM initiatives.
-Development and annual facilitation of applicable Disaster Recovery / Business Continuity solutions and exercises.
-Establish and maintain applicable Enterprise Service Levels (SLAs) and metrics.
•Departmental / Staff Management
-Establishes, maintains, and manages to a defined staffing plan.
-Management activities related to 1:1s, budget, staffing, promotions and merit reward planning, and staff motivation/engagement.
-Demonstrate full support of the company culture and all Human Resources people development processes and activities.
•Strategy and Innovation Leadership
-Provide strategic direction relative to the implementation/use of IAM technologies and solutions.
-Understand the implications of IAM technology enablement across geographic and language boundaries.
-Identify and leverage integration opportunities of IAM technology into enterprise systems/applications.
-Understand zero-trust methodology
Knowledge and Experience:
•Bachelors Degree in Information Technology/Computer Science or a related discipline or equivalent work experience
•4+ years experience in a management/leadership role
•7+ years of general IT work experience
•4+ years IT business analysis and design experience with exposure to customers.
•Proven leadership skills with the ability to manage conflict, deal with ambiguity, negotiate and make timely decisions
•An advanced understanding and practical application experience of IAM and security related technologies and services is a must
•Prior experience interfacing with customers, managing supplier relationships and managing projects through the phases of the project delivery lifecycle from process design through production support.
•Excellent communication skills with demonstrated ability to write clear, concise business communication for multiple levels (management, technical, and user).
•Security Certification preferred: CISSP, CISM, GIAC or CISA.