Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

Truist IAM Access Control Senior Group Manager 
United States, North Carolina, Charlotte 
729284142

04.09.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)This role is responsible for developing, implementing, and maintaining a Role Based Access Control (RBAC) strategy to be executed across the Bank’s applications and IT systems. The primary responsibility will be to build and apply a security model that combines a working understanding of business operations for applications, IT systems, and job functions to define birthright roles. The incumbent will need to be versed in industry best practices such as NIST and FFIEC to ensure proper risk controls are implemented across these roles. Responsibilities will include a subset of IAM life-cycle functions such as: a) defining core, hierarchical and constrained access controls b) role assignments and permission authorizations c) role governance d) role compliance and e) separation of duties enforcement.

ESSENTIAL DUTIES AND RESPONSIBILITIES

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Create and maintain an access management strategy, roadmap and control framework that includes appropriate control models (e.g., RBAC, PBAC, ABAC) and is in alignment with NIST and FFIEC.

2. Work with Application Technical Managers (ATM) to understand roles and entitlements within the application landscape to define role-based permissions.

3. Design access models (i.e., how access is structured), access roles and RBAC based on business needs and the access management strategy, roadmap, and control framework.

5. Design, implement, and govern security controls for access to applications and IT systems.

6. Partner with role owners and appropriate subject matter experts to design effective segregation of duties (SoD) policies.

7. Ensure appropriate SoD and least privileged access controls are effective accross all IT assets.

8. Proactively engage with HR, D-CIO organizations, and stakeholders to understand their access needs.

10. Oversee managed services for:

  • Access analysis and reporting
  • Role mining and role “fit” analysis
  • Execution of RBAC and access role life cycle (e.g., creation, configuration, and deletion in IGA)
  • Configuration of SoD policies and rules in Truist's IAM system
  • Resolution of SoD conflicts
  • Maintain role titles, descriptions, and other attributes
  • Administration of access management delegates
  • Behavioral analytics based on activity and authorization logs from Truist's SIEM
  • KPIs to measure performance against the service level agreement (SLA) for execution of the role lifecycle processes

11. Create and maintain process documentation for the role lifecycle processes.

12. Design and implement role assignments, role authorization and permission authorizations across applications following the principle of least privilege.

13. Develop and implement static and dynamic separation of duty rules and policies.

14. Establish a governance structure to maintain role policies and role re-evaluation guidelines.

15. Perform hiring, coaching, terminations, disciplinary action, and performance reviews to enable a high-performing team.

17. Improve the user experience for requesting and obtaining access necessary for staff to perform their job functions.

18. Proactively engage with stakeholders to make them aware and willing to adopt our solutions, which includes managing up, out, and down to avoid surprises and position our solutions to be successful.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor’s degree and eight years of experience in systems engineering or administration or an equivalent combination of education and work experience
2. Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
3. Previous experience in leading complex IT projects


Preferred Qualifications:

1. Significant knowledge and demonstrated experience in the following:

  • Leading a team of senior and less experienced cybersecurity professionals

  • Developing and implementing an access management strategy

  • Leading implementation and transition to RBAC, ABAC and PBAC access control models

  • Advanced role-mining and role engineering techniques

  • Implementation of effective segregation of duties (SOD) controls

  • Designing and executing security controls

2. Deep expertise of Human Capital job profiles, titles, and roles to create and align birthright rules.

3. Bachelor’s degree or equivalent

4. 10 years’ technical experience working in the identity and access management control function

5. 10 years’ experience as a manager leading diverse teams, such as teammates, contract workers, onshore, offshore resources, and/or managed services

6. 10 years managing simple and complex role permissions Experience managing third party managed service provider contracts

7. 5 years’ experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active Directory, RACF, Azure, AWS, Idaptive, Centrify, CyberArk, SailPoint, Oracle OIM, Persistent Ignite)

8. 5 years’ technical experience working for a top 10 US bank

9. 10 years’ experience managing the remediation of regulatory matters and internal findings

10. 10 years’ experience in strategic planning and applying industry best practices to operations (NIST, FFIEC)

11. Excellent communication, collaboration, and organizational skills

12. Demonstrated leadership abilities, high accountability, drive, and initiative


Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.