Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Truist IAM Access Control Consultant 
United States, North Carolina, Charlotte 
235325222

04.09.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)


Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Collaborate and consult with lines of business, technology staff, senior leaders, and other stakeholders to understand and document their access needs

  • Assist with the design of access controls that adhere to the least privileged principle, enforce separation of duties as appropriate, and enforce other applicable security controls per IAM standard

  • Coordinate implementation of access controls through partnership with system administrators, security staff, IAM managed services, and others

  • Proactively engage with stakeholdersto understand their feedback and identify improvements towards better user experience

  • Engage managed services to configure Truist’s Identity Governance and Administration (IGA) capability based on access control design and ensure adherence to service level agreements

  • Provide reporting and analytics to gauge the appropriateness of roles for users based on their job responsibilities and refine roles based on the least privileged principle

  • Provide reporting on users’ access to applications, systems, and other IT assets

  • Assist with the develop of performance metrics and key risk indicators

  • Assist with the design, development, documentation, implementation, and ongoing management of separation of duties (SoD) rules

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor's degree in business administration, technology related field or equivalent education and related training

2. More than seven years of demonstrated progressive experience in Cybersecurity, with emphasis on data lost prevention, vulnerability management, access management, firewalls, security awareness training, etc.

4. Strong working knowledge of cybersecurity terms, concepts, disciplines, frameworks, best practices and industry/regulatory requirements

Preferred Qualifications:

  • Bachelor’s degree or equivalent

  • 5 years’ experience with industrystandard access control methods such as Access Control Lists (ACL), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Policy-Based Access Control (PBAC)

  • Knowledge of identity, authentication and authorization concepts and methods

  • 5 years’ demonstrated experience with best practice role mining and role engineering techniques, tools, and capabilities

  • 5 years’ demonstrated experience creating and managing separation of duties (SoD) rules

  • 5 years’ demonstrated experience creating access reporting and analytics

  • 5 years’ experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active Directory, RACF, Azure, AWS, Idaptive, Centrify, CyberArk, SailPoint, Oracle OIM, Persistent Ignite)

  • Excellent communication, collaboration, and organizational skills

  • 5 years’ experience executing the remediation of regulatory matters and internal findings

  • 5 years’ technical experience working for a top 10 US bank

  • Experience with designing and implementing access models for Amazon Web Services (AWS) and Microsoft Azure

  • Strong knowledge of security frameworks, regulatory compliance, and security strategies

  • Knowledge of SOX, SOC1 and GLBA requirements and experience enforcing compliance

  • Cyber security certifications such CISA and CISSP

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need