Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Truist IAM Access Control Senior Consultant 
United States, North Carolina, Charlotte 
716671306

04.09.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)


ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

Provide input into organizations’ operating models from a security perspective

3. Determine appropriateness of fine-grain versus coarse-grain access control approaches that balance security with operational flexibility

4. Develop a strategy for structuring and managing access across all Truist assets that leverages industry best practice such as Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC)

5. Design access controls that adhere to the least privileged principle, enforce separation of duties as appropriate, and enforce other applicable security controls per IAM standard

6. Lead and oversee implementation of access controls through partnership with system administrators, security staff, IAM managed services, and others

7.Proactively engage with stakeholdersto understand their feedback and identify improvements towards better user experience

9. Continually analyze the appropriateness of roles for users based on their job responsibilities and refine roles based on the least privileged principle

10. Provide subject matter expertise and mentor less experienced IAM role management staff

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience

2. Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security

3. Previous experience in leading complex IT projects

Preferred Qualifications:

  • Bachelor’s degree or equivalent

  • 10 years’ experience with industrystandard access control methods such as Access Control Lists (ACL), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Policy-Based Access Control (PBAC)

  • Strong expertise and demonstrated experience implementing RBAC subtypes as defined by NIST (e.g., flat, hierarchical, constrained, and symmetrical)

  • Strong expertise in identity, authentication and authorization concepts and methods

  • 10 years’ demonstrated experience with best practice role mining and role engineering techniques, tools, and capabilities

  • 5 years’ experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active Directory, RACF, Azure, AWS, Idaptive, Centrify, CyberArk, SailPoint, Oracle OIM, Persistent Ignite)

  • Ability to provide direction and mentor less experienced teammates

  • Excellent communication, collaboration, and organizational skills

  • Demonstrated leadership abilities, high accountability, drive, and initiative

  • Master’s degree

  • 5 years’ experience in strategic planning and applying industry best practices (NIST, FFIEC)

  • 5 years’ technical experience working for a top 10 US bank

  • 5 years’ experience executing the remediation of regulatory matters and internal findings

  • Experience with designing and implementing access models for Amazon Web Services (AWS) and Microsoft Azure

  • Strong knowledge of security frameworks, regulatory compliance, and security strategies

  • Knowledge of SOX, SOC1 and GLBA requirements and experience enforcing compliance

  • Cyber security certifications such CISA and CISSP

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need