Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Truist Identity Access Management Technical Director 
United States, North Carolina, Charlotte 
850077918

01.09.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)A role that is responsible for leading portions of the identity management and access control functions as described by industry best practices such as NIST and FFIEC. This will include a subset of the following sub-functions: a) request b) provisioning c) deprovisioning d) normal access e) privileged access f) attestations g) identity governance administration h) identify management platforms i) production support.


ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Align with IAM-wide priorities that define ‘our what’ that may change based on business need

  • Design and implement theend user support team foridentity management and access strategy on time and within budgetas it pertainsto meeting Joiner/Mover/Leaver controls including attestations.

  • Design and meetformal Services Level Agreements (SLAs)to ensure control frequencies are met

  • Improve theenduser experienceby partnering with the business to help provide tier 2 support and engagement directlyto completing required controls

  • with the DCIOand BISO towers tofoster relationshipsin efforts tosupportupcoming strategiccompliance and maturity needsof the IAM team long term

  • Proactively engage with stakeholders to make them aware and willing to adopt our solutions, which includes managing up, out, and down to avoid surprises and position our solutions to be successful.

Note: The differentiating factor between levels of IAM Technical Director are the years of experience performing the Required Qualifications, breadth and complexity of responsibility, number of resources managed, number of organizational layers managed, and the percentage of time spent performing one type of work vs another.

QUALIFICATIONS
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Bachelor’s degree or equivalent

  • 20 years’ technical experience working in the identity and access management control function

  • 10 years’ experience as a senior manager

  • 15 yeas’ experience in strategic planning, operational planning, and execution

  • 10 years managing simple and structured work

  • 15 years managing complex and unstructured work

  • 15 years’ experience leading diverse teams, such as teammates, contract workers, onshore, offshore resources, and/or managed services

  • 5 years’ experience and intermediate-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active directory, RACF,Idaptive, CyberArk, PRIVA, Oracle OIM, Persistent Ignite)

  • 15 years’ experience and basic functional knowledge of tools and processes for the broader IAM capability

  • 10 years’ experience and expert-level strength in soft skills and interpersonal communications

  • 15 years’ technical experience working for a top 10 US bank

  • 15 years’ experience collaborating with the following functions: a) infrastructure b) application development c) application support d) business unit risk management e) technology risk f) audit and g) external auditors

  • 15 years’ experience collaborating with the following peer functions in corporate cyber security

  • 15 years’ experience managing the remediation of regulatory matters and internal findings

  • 15 years’ experience in strategic planning and applying industry best practices to operations (NIST, FFIEC)

Preferred Qualifications:

  • 15 yearsexperience running an end user support teamas it pertains to Identity and Access Management

  • 10 years’ experiencemanaging an Identity and Access Management platform such as Oracle, SailPoint,

  • Subject matterexpertiseas it pertains to Identity and Access Management control design and execution

  • Experience in partnering with IAM developers and engineers to detail required enhancementsto IAM tool and testing and implementation of them

  • Experience in Active Directory groups and downstreamaccessrequirements

  • themultiple approaches to designing IAM technical solutions

  • Experience in waterfall and agile project management methodologies

  • Experience managing contracts for IAM managed service providers