Finding the best job has never been easier
Share
Job Description:
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements
Role Description:
The candidate for this role possesses in-depth IGA expertise, operational savvy, business and technical acumen, and a track record of enabling the business while reducing risk. This individual will utilize their in-depth IGA knowledge as well as new business requirements to design and direct secure solutions that meet the organization’s evolving needs. This individual also exercises independent judgment in directing staff to achieve results and works independently with direction from the Information Security IAM Executive.
An advocate and leader reinforcing the need for restricting permission assignment to users and birthright access application through hands on support activities.
Leads the team in providing tool and process support on bundle creation and maintenance.
Connects with First Line of Defense on product pain points and recommends product and capability improvements.
Respond to audit and regulatory requests as needed.
Work closely with Cybersecurity, audit, compliance, legal, and stakeholders to define access policies, user roles, and access control procedures for our diverse technology and lines of business landscape.
Ensure the team coordinates with Governance services on new or changing controls and executes accordingly.
Establishes a framework of policies and technologies as it relates to role and attribute-based access controls through collaboration with FLU, Technology, Product, and Architecture. Advises on access model best practices by acting as SME.
Support the team members by providing technical guidance as well as assist other on-going engagements for resolving critical issues.
Investigate and troubleshoot complex technical issues, perform root-cause analysis for high severity issues, and provide permanent resolution.
Work with technology vendors as appropriate to resolve product issues, technology evaluations, and design reviews.
Meets demands of managing multiple work streams, communicating effectively with senior technology and business leadership, and demonstrate experience leading large and complex projects and global programs.
Assess and advise on modernizing IAM capabilities and methodologies, including development of strategies, readiness assessment, development of training and communications.
Operate as an advisor for our distributed IAM teams to help them to elect the best solution for resolving the identified / possible technical issues or security threats in the system / infrastructure.
Harness familiarity with IT security and risk management practices on risk mitigants.
Required Qualifications:
10+ years experience in IAM working on complex projects and programs
Strong interpersonal and influencing skills
Excellent organizational skills, able to manage multiple work streams simultaneously and respond to rapidly changing demands
Demonstrated experience working with frequently-utilized IAM vendor solutions such as SailPoint, Savyint, ForgeRock, Ping, Okta, Varonis, and CyberArk in large enterprises for the purpose of governing security.
Experience in configuring and deployment of Single Sign On and MFA solutions, IGA solutions, and PAM Solutions
Hands-on on WAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts
Desired Qualifications:
Good knowledge of Web / Application servers (e.g. IIS, WebSphere, WebLogic, JBoss, and Apache etc.)
Strong technical knowledge of authentication and authorization including Authz and Authn, OIDC, SAML, XACML, LDAP, OAuth, OpenID
Experience working on various operating systems such as Windows, Linux, Solaris etc.
Working knowledge on Databases such as MS SQL, Oracle, mySQL
Good understanding or hands-on experience on JSON, REST and SOAP
Advanced knowledge of cloud platforms (AWS, Azure, GCP etc.) experience in deploying and managing AM solutions on cloud platforms. AWS is preferred
Deep knowledge and experience working with technology infrastructure including Windows, Active Directory, LDAP, Unix/Linux, databases, authentication protocols, and containers
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)These jobs might be a good fit