Share
Job Description:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
What you can expect in Identity & Access Management:
The Identity and Access Management (IAM) enablement services and data engineering function within Global Information Security is responsible for engineering, solutions architectures, capabilities development, deployment maintenance and governance administration and assurance.
In this role you will use past-experience and an analytical mindset to identify opportunities and drive improvements in the Access Management experience. The role is focused on the more technical aspects of IAM eco-system on-boarding and management, including the identification of integrations across business applications, technology infrastructure, platforms and IAM capabilities, such as account discovery, IGA, Cloud and PAM.
This role requires you to be result-oriented, business focused, and successful at interfacing and influencing across multiple organizational units, at various levels. Knowledge/experience/exposure with information security topics, including the design, development, testing, implementation or governance of information security practices and solutions, is extremely desirable for this role. You should be prepared to demonstrate your knowledge of access management/risk identification and mitigation/project management skills.
Responsibilities:
You will be responsible for interfacing with project managers and stakeholders to ensure IAM requirements are clearly defined, fully understood, and ultimately delivered, translating those needs into applied rules tests, and reports that can be applied to ensure sustainability. You will have or will develop a deep understanding of information repositories and the business context of the information they contain, as well as possessing the technical skills to build repeatable, robust processes to test these assumptions.
Enterprise position overview:
As an experienced professional, provide advice to client management about highly complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Provides technical support to the management and staff in risk assessments and implementation of appropriate data security procedures and products. Identifies and escalates changes that will affect information security policy, standards and procedures. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. 2-5 years of operational experience.
Required Skills:
3+ years of professional experience, preferably in a technical/development environment.
Strong attention to detail and advanced analytical skills.
Excellent communication and presentation skills.
Excellent organizational skills and be able to effectively prioritize multiple tasks.
Previous experience creating and editing documentation that ensures clarity, accuracy, and consistency.
Ability to quickly grasp complex technical concepts and make them easily understandable.
Proficient in modern IAM technologies including IGA, Active Directory and Cloud
Must be able to engage and leverage teams and business partners to efficiently deliver business solutions.
Ambitious, self-starter
Must be able to identify, analyze and address problems to resolve issues whenever possible in way that minimizes negative impact and risk to the organization.
Must be pro-active and be able to drive direction of work that needs to be completed, ability to work independently on initiatives with little oversight. Motivated and willing to learn.
Must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
Desired Qualifications:
Knowledge of Identity and Access Management Governance Administration related tools which support, vaulting, integration with service management tool would be an advantage.
Security knowledge which covers core technology infrastructure (Account management, servers, databases, etc.) identity management and application security practice.
Ability to create management level reporting using aggregated bank data.
Ability to identify and integrate modern tech opportunities into the IAM platform, including adoption of Gen AI and LLM
These jobs might be a good fit