Identity & Access Management Resume Samples

4.9 (101 votes) for Identity & Access Management Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity & access management job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
EW
E Welch
Elmore
Welch
840 Stracke Orchard
Boston
MA
+1 (555) 579 6211
840 Stracke Orchard
Boston
MA
Phone
p +1 (555) 579 6211
Experience Experience
New York, NY
Identity & Access Management
New York, NY
Schmeler-Volkman
New York, NY
Identity & Access Management
  • Assist in the development of performance metrics/ measurements for the user access attestations
  • Work with the project teams on implementing the defined Policyies within Acsess & Identity Management (AIM) solution
  • Champion the improvement of identity and access management processes, controls and communications related to Policies across stakeholder groups
  • Champion the improvement of identity and access management processes, controls and communications related to Roles across stakeholder groups
  • Work with the project teams on implementing the defined business Roles within Access & Identity Management (AIM) solution
  • Work with team on project work to keep project going according to schedule
  • Work with Business Unit Information Security Officers (BUISOs), system owners, and other IAM colleagues to address audit and regulatory related issues
Detroit, MI
Manager, Identity & Access Management
Detroit, MI
Kuhic Group
Detroit, MI
Manager, Identity & Access Management
  • Understand and refine a Role Based Security framework. Produce schema designs and operational plans to enforce and maintain identity management workflows
  • Participate in development of roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Promote effective teamwork, mentor employees, and evaluate individual performance
  • Manages the strategy and roadmap implementation for Identity and Access Management Platform Tools
  • Manage identity and access management support to business and technical teams in the design of standardized products and customized solutions
  • Develop roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Hands-on architect and developer of a comprehensive IAM system that addresses the challenges of a very complex development and production environment
present
Chicago, IL
Identity & Access Management Specialist
Chicago, IL
Feest, Metz and Little
present
Chicago, IL
Identity & Access Management Specialist
present
  • Troubleshooting and resolving access management and provisioning workflow errors
  • Perform Identity and access management activities
  • Updating existing access management and provisioning workflows
  • Execute and track security process related activities including User ID management
  • Manage operations within the IAM environment at the client, including application patching and upgrades and certificate management
  • Establishes and maintains good working relationships with all IAM customers
  • Web Access Management (Quest Active Roles Server, SiteMinder, Oracle Access Manager, etc.)
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of San Francisco
Bachelor’s Degree in Computer Science
Skills Skills
  • Be able to work with application teams and assist in implementing and tuning services that are reliable, available and performing
  • Solid organizational skills including attention to detail and multitasking skills
  • Strong agent to drive change including the ability to facilitate new processes and standards
  • Strong sense of ownership and accountability
  • Excellent troubleshooting skills and the ability to logically think through problem resolution
  • Knowledge of associated technologies such as: Windows Server, Active Directory
  • Professional qualification of CISSP or attaining CISSP is desired
  • Knowledge of Oracle Waveset (ex - Sun Identity Manager), CA Siteminder, Unix (Solaris and RedHat)
  • Knowledge of an Enterprise Identity Management Product, experience on Sailpoint IIQ a definite
  • Self-motivated, responsible, conscientious, and detail-oriented and possess a passion for excellence
Create a Resume in Minutes

15 Identity & Access Management resume templates

1

AVP, Identity & Access Management Resume Examples & Samples

  • Define, build and lead an Identity & Access management team responsible for providing access capabilities throughout the firm
  • Develop strategies aligned to the policies and roadmaps to continue enhancing the control effectiveness of access management across the enterprise
  • Develop a strong road map that identifies a 2 year plan, aligned to the strategy that includes tangible projects that will drive short term incremental value
  • Ensure strong controls and discipline are in place to manage efficient services levels, and effective controls around Moves adds and changes, provisioning and de-provisioning, and attestation
  • Ensure processes are in place to monitor and report on the effectiveness of access management controls as well as alignment to policies, regulations and audits
  • Ensure sufficient teams are in place to manage the operational demands of provisioning, including size of team, coverage of business and appropriate degree of skillsets
  • Able to manage effectively in a highly matrixed environment
  • Highly motivated individual with a track record of successfully implementing solutions across line of business boundaries
  • Must be able to work with a pool of experts and ensure high levels of service even when the effort crosses organizational boundaries
  • Comfortable leading through change and recognized as a champion for continuous improvement
  • Outstanding people management, leadership and coaching skills
  • Ability to build for the future by attracting and developing the best people
  • Excellent customer service orientation and a professional approach; including ability to interact with all levels across the organization
  • Security accreditation CISSP, CISM or other specific vendor or industry certifications
  • The ideal candidate will have a strong academic background (e.g., computer science, engineering)
2

Director, Identity & Access Management Resume Examples & Samples

  • Manage and guide design, development and support of Identity and Access Management solutions including provisioning/de-provisioning workflows, Analytics, Highly Privileged Accounts, Single Sign On, Directory, API Management, ETL, Unix authentication
  • Build strategy for Identity and Access Management services that are robust and scalable to support the employees, contractors, partners and customers
  • Maintaining security and risk controls
  • Establish an Access Governance program to drive PCI/SOX initiatives forward and increase security posture
  • Work closely with Software Architects to propose solutions and provide strategic technical direction across the team
  • Overall accountability for team delivery and technical support
  • Responsible for managing capital and operational budgets
  • Lead and develop team members
  • Occasional off-hours support may be necessary to address outages, pressing system issues, or scheduled deployments
  • Bachelor's degree in Computer Science, Information Technology, or equivalent work experience
  • 6+ years working with Identity and Access Management solutions
  • 4+ years in business requirements gathering
  • 4+ years programming experience, preferably the Java platform
  • Experience working in Agile environments
  • Experience with Project Management duties (project planning, resource management, scope, schedule and status, documentation)
  • Ability to manage, lead and motivate cross-functional teams including QA, Architects, Business Analysts, Project Managers and Vendors
3

Senior Functional SME Identity & Access Management Resume Examples & Samples

  • Implements, tests, debugs, and documents new systems, or enhances existing systems
  • Reviews and coordinates test plans for new and existing environments
  • Works independently to implement complex hardware and software environments
  • Interfaces with peers, technical & business staff, vendors, customers, and all levels of management
  • Writes scripts, templates, interfaces, and utility applications as needed to maximize efficiency and target continuous improvement
  • Provides technology and process training within discipline
  • Create framework for the Identity and Access Management Program
  • Provide oversight of the Identity and Access Management Program
  • Create framework to manage life cycle of Identity and Access Management global processes
  • Architect Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC)
  • Directory schema architecture
  • Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC)
  • Consult on Directory schema architectures
  • Work closely with project teams and other architects to translate technology direction functional and technical roadmaps
  • Assist Project and Program Managers as needed
  • The ability to lead large groups and be a primary facilitator
  • Demonstrated written skills
  • Comfortable working in matrixed project and management based teams
  • Ability to lead and shape presentations and expectations
  • Help drive pursuits and engage in complex deals, matching outcomes to expectations
  • Ability to operate independently at times to provide domain area functional and technology leadership
  • Working knowledge of a broad range of current security appliances, tools, and applications and security methodologies
  • The architect needs a depth of knowledge and experience in Identity and Access Management; Application and Data security; Infrastructure and Endpoint and be able to talk at introductory and advanced audiences
  • Proficient at end to end business and technical process mapping
  • Proficient at technical requirements gathering
  • Proficient in minimum one directory technology, e.g. Active Directory, Oracle Directory, IBM Directory, etc
  • Proven expertise in minimum enterprise identity & access management system, .e.g. Sun Identity Manager, Oracle Identity Manager, IBM Tivoli Identity Manager, SailPoint Identity Manager, etc
  • Ability to work as part of a team and interact effectively with others
  • Displays willingness to accept responsibility, display initiative, good judgment and a positive attitude
  • Appropriate blend of sense of urgency, strong results orientation, and delivery focus
  • Understands and uses SLC methodology
  • Ability to transfer concepts across environments
  • Proficient on interface standards and interoperability
  • Proficient in common testing tools and methods
  • Experience with Control Objectives for Information and Related Technology (COBIT) or ISO (the International Organization for Standardization) ISO IEC 27002 2013 Information technology Security techniques Code of practice for information security controls
4

Identity & Access Management Resume Examples & Samples

  • Providing 24x7 production support to our GIAM products and services under the round-the-sun model with supports in three different time-zones
  • Partnering with the IT Infrastructure team to build and support the application servers and infrastructure
  • Partnering with Incident management team to resolve the production issues and service outage of those applications consuming our products and services
  • You will continue to work with a global team environment, face and accomplish challenging assignments to develop and enhance IT security domain of the banking field and gain exposure to the regulatory challenges of the different countries around the world
  • Computer Science or Computer engineering degree or 5+ years of working experience
  • Candidates must have experience in a large production support environment assisting large-scale mission critical applications
  • Candidates must be able to communicate and exemplify strong understanding of identity and access management
  • Financial / Banking environment is desired but most importantly
  • Background in IT Risk and Controls within global financial institution a big plus
  • Good knowledge on installing and supporting LDAP service and replication is highly preferable
  • Professional qualification of CISSP or attaining CISSP is desired
5

Identity & Access Management Resume Examples & Samples

  • Knowledge of Oracle Waveset (ex - Sun Identity Manager), CA Siteminder, Unix (Solaris and RedHat)
  • Knowledge of an Enterprise Identity Management Product, experience on Sailpoint IIQ a definite plus
  • Oracle identity server/Oracle Directory Server Enterprise Edition
  • Advanced knowledge of Relational DBMS (Oracle, Sybase), must have proven ability to write ad-hoc SQL scripts to extract and manipulate relevant data
  • Experience in Java, J2EE related technologies, Oracle 10g or higher
  • Knowledge of Application Server (Apache, Tomcat & Websphere etc)
  • Unix Shell and perl scripting
  • German knowledge is an added advantage
  • Proven ability to deliver under stressful situations
  • Proven ability to multitask and prioritise based upon the business requirements
  • Must be able to collaborate and effectively communicate with colleagues in disparate geographical locations
  • Must be able to effectively communicate with senior colleagues and other stakeholders in the organisation
6

Identity Access Management Provisioning Resume Examples & Samples

  • At least 1 year experience in IT skills
  • At least 1 year experience in Processes Mgmt (Develop/ Analysis, designing new processes and their validation)
  • At least 6 months experience in Microsoft Office
  • At least 1 year experience in Communication and teamwork skills
  • Basic knowledge in Windows/ Unix server Admin
  • Basic knowledge in Active Directory
7

Avp Identity & Access Management Resume Examples & Samples

  • Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement
  • Willing to own the required cross-section of industry and business function experience
  • Able to apply proven best practices for IAM, established methodologies, and baseline templates
  • Focus on IAM design, development, deployment, automation, testing and maintenance
  • Manage end-to-end technical (solution and development) delivery, from vision to implementation
  • Should be able to work effectively with senior business and IT management not only to define strategy, but to affect change
  • Participate in and actively support mentoring relationships within practice
  • Hands on architectural and development experience with Ping PingIdentity (PingFederate) and RSA (RSA Adaptive Authentication)
  • Technical architecture experience integrating identity management, access management and access governance
  • Experience with Role Mining, Role based access control and Access Certification with products such as RSA Aveksa Access Governance Suite, SailPoint
  • Identity Management familiarity in one or more of the following areas
8

Identity & Access Management Tower Lead Resume Examples & Samples

  • 10+ years of experience in Access Management and one or more of the following areas: Data Protection, Data Security, Cyber Security, Information Security or Technology Architecture and Engineering
  • Experience with Access Management methodologies
  • Experience with role-based and security-based entitlements models
  • Experience in federated authentication across companies
  • Strong functional privileged ID management skills; identification and remediation techniques
  • Solid understanding of toxic pairs and remediation efforts
  • Strong understanding of Public Key Cryptography / Key Management (i.e. PKI)
  • Proficient in SharePoint and other documentation management systems
9

Identity & Access Management Resume Examples & Samples

  • Ensure that user access on business owned applications are being reviewed
  • Work with Synchrony Financial functional teams to identify business applications that are newly on boarded & ensure that they are included in the scope of the user access reviews
  • Train the application owners on the Synchrony Financial user access attestation process
  • Ensure application owners have access to the relevant tools/ documents for performing user access reviews
  • Validate the HPA (Highly Privilege Account) user access attestations by performing a 100% sample check
  • Ensure that job changes/ terminations are incorporated into the user access reviews
  • Perform periodical checks to ensure accuracy, timeliness & obtaining applicable supporting documentation on the user access attestations
  • Assist in the development of performance metrics/ measurements for the user access attestations
  • Continuously identify process improvements and co-ordinate implementation of solutions
  • Develop applicable documentation to support the process including metrics to determine effectiveness of process
  • Bachelor’s Degree in Computer Science
  • Minimum of 5-6 years of experience in Information Technology
  • Thorough understanding of Identity Access Management fundamentals
  • Must have proven strong analytical and problem solving skills
  • Experience with working with remote teams
  • 18 months in Synchrony and 12 months in current role,
  • Should not be on active formal or final formal corrective action
  • 18 months in Synchrony and 12 months in current role for applicants with SYF to be updated in required skills
  • Understanding of Role Based Access Control Methodology/ Framework
  • Quality Assurance/ Quality Control
  • Audit experience
10

Identity & Access Management Lead Resume Examples & Samples

  • Provide SME in Identity & Access Management within RFT
  • Process – Develop, Implement and manage secure software life cycle processes to that will assist the application development teams in integrating security requirements within their applications and databases
  • Impact Analysis – Review proposed solutions, develop use cases to explain/demonstrate requirements/specifications to key stakeholders
  • Contribute to the development and implementation of security software, policies, standards, procedures, and guidelines
  • Provide baseline metrics and reporting, both during impact analysis and on-going execution of risk-driven projects, organize and deliver clear and accurate data for Technology and Executive Management
  • Information security certifications (such as CISSP, CSSLP, CEH/CPT or related certifications) would be preferred
  • A graduate degree or equivalent experience in computer science is also required
  • Very strong data analysis, both quantitative and qualitative
  • Good reasoning and logic, problem solving skills
  • Exposure to financial services systems and processes preferably in Investment Banking
  • Experience in working with diverse cross geography teams
  • Self motivated individual, comfortable working without close supervision and with ability to work to deadlines
  • Team player with proven ability to build strong cross-business relationships
  • Exposure to information security principles and relevant standards including Access Management, Change Management, Security Incidents and Business Continuity Management
  • Strong understanding of secure software development life cycle
  • Working knowledge of application assessment, application security vulnerabilities, code review methodologies, and secure coding practices
  • Exposure to information security vulnerability concepts, issues and mitigation methods
  • Experience in a similar risk role
  • Experience of technology projects and/or the Risk and Finance business a plus
11

Identity & Access Management Specialist Resume Examples & Samples

  • Have knowledge of password management, password expiry, basic minimum password guidelines
  • Execute and track security process related activities including User ID management
  • Oversee and report compliance with all User ID Management processes on a regular (at least quarterly) basis and review
  • Coordinate & track the completion of scheduled IAM related activities
  • Support peers and team leaders to achieve UID related SLA / KPI of IAM processes
  • Knowledge of Global Delivery framework / Quality Projects
  • At least 2 years experience in IAM, Identity and Access Management
12

Mgr, Identity & Access Management Resume Examples & Samples

  • Resource management, ensuring the team is meeting the organizational support and request SLA’s
  • Regular 1 on 1 meetings with direct report staff
  • Development and Performance reviews of direct report staff
  • Technical support as needed
  • Operational alignment with strategic direction of the organization
  • Providing consulting advice and guidance to customers and other AGT teams in their area of technical expertise
  • Escalation point involving potential troubleshooting and problem resolution assistance
  • Five years Computer Science or related degree, or equivalent work experience
  • 7 or more years of related work experience
  • Leadership competencies: Acting Courageously, Bringing Clarity, Energize the Organization, Exceeding Expectations, Strategy Focused, Working Together
  • Subject matter experts in technologies related to Identity and Access Management
  • Breadth of knowledge across technology disciplines
  • Understanding of current and future business needs met by infrastructure platforms
  • Results-driven
  • Ability to quickly learn and apply new concepts
  • Ability to drive and achieve consensus/support from large diverse groups
  • Strong written and verbal communication skills enabling effective articulation of strategy across varying technical backgrounds
  • Demonstrated project management and client relationship skills
  • Certifications in relevant technologies, methods, or platforms are a plus
  • This position is also eligible for an incentive bonus
13

VP, Identity & Access Management Resume Examples & Samples

  • Define, report on and execute against the vision, goals and critical success factors for this function
  • Develop business process mapping to assess and identify issues and gaps and implement appropriate solutions enterprise-wide
  • Interface with various internal groups including Operations, Compliance, Risk Managers, Line of Business contacts, internal/external audit and Legal as necessary
  • Successfully drive and deliver Identity and Access Management (IDM/IAM) initiatives from initial inception to implementation to operations
  • Improve current processes and drive positive change in: controls, data quality and regulatory compliance
  • Work with global operations management to promote risk awareness and compliance, in line with established Information Security standards
  • Lead IAM practices (Identity and Access Management), policies and procedures for the access management of Databases (i.e. DB2, Oracle, MSSQL, MySQL, Hadoop, etc.)
  • Have a global mindset and collaborate effectively within and across different teams
  • Be a thought leader in this space and take 100% responsibility and accountability of the IAM function
14

Identity & Access Management Resume Examples & Samples

  • The candidate must possess a strong background in technology with an understanding of Identity and access management and a minimum of 10 years of experience
  • The candidate will be required to interact with team members, various business unites, IT and senior management
  • Coordinate entitlement management processes both with the understanding of business nature and entitlement data
  • Work with Business Unit Information Security Officers (BUISOs), system owners, and other IAM colleagues to address audit and regulatory related issues
  • The candidate must be able to provide detail status as well as follow-up on issues
  • 10+ years of work experience in IT with prior technology management responsibilities
  • Working knowledge of Information Security and Entitlements
  • Technical understanding of entitlement management products and processes
  • Strong interpersonal, problem solving, organizational and time management skills
  • Managing client relationships and working as part of a distributed team
  • IT development background or experience
  • Ability to think strategically and provide insight into how to improve existing technology processes
  • Strong written and verbal communication skills and interpersonal skill
  • Prior experience in financial industry is beneficial
  • Proficient in project management and risk management
  • Strong agent to drive change including the ability to facilitate new processes and standards
  • Individual must be able to multi-task effectively
  • Ability to work under pressure due to regulatory timelines and senior management
  • Capable of thinking strategically and provide insight into how to improve existing business and technology processes
15

Identity & Access Management Lead Resume Examples & Samples

  • Define and execute on the service roadmaps for all components of IDaaS
  • This role will lead a large, geographically dispersed team of 70 IT professionals
  • Responsible for budget planning and management
  • Ensuring delivered services are competitive with external prices and meet the service levels expected from the firm
  • Strategically manage vendors
  • Build and maintain relationships across all functions of IT and EY globally
  • The role has 70 staff members. The direct reports are senior positions and don’t require day to day guidance
  • It also has a matrix approach with other teams like Information Security and Operations
  • Demonstrated skills in developing actionable roadmaps and implementing these efficiently
  • Strong understanding of key performance indicators relevant to the role
  • Extensive experience in financial management (such as budgeting and cost comparison) for the relevant services
  • Have worked at a global level is a large multi-national organization
  • Knowledge and experience of the following technologies at a strategic level
  • Identity Management: PKI, RSA, CA Siteminder, Federation services, Group and List management platforms, Oracle Account provisioning, Microsoft FIM
  • Directories: Active Directory, Azure AD, Virtual Directories
  • 10-15 years working a senior global role
16

Identity Access Management Resume Examples & Samples

  • Must have 2-4 years experience with two or more of the following systems: IDCert, ITRC, RSAM, ID-Integrate, ITRMs, PIRA, Service Center
  • Solid knowledge of Identity and Access Management controls, principles, methods, and regulatory related obligations preferred
  • Good understanding of the global banking business and operations
  • Strong knowledge of IT risk management frameworks/concepts preferred
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client and vendor relationships
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access and Visio)
17

Identity Access Management Resume Examples & Samples

  • Excellent documentation skills required
  • Excellent Written and Spoken Communication Skill
  • Excellent presentation skills and able to present to management
  • Ability to lead, multitask and work well in a team environment
  • Strong problem ownership and strong analytical skills
  • Candidate must be able to communicate with external and internal customers
  • Self-starter and innovative
  • Ability to work with process owners to fix problems and implement changes
  • Responsible for interfacing with other groups within the organization
18

Director, Identity & Access Management Resume Examples & Samples

  • Develop Identity and Access Management (IAM) strategies, architecture and implementation plans for all Time Inc. digital products and services
  • Lead development and operation team responsible for authentication and entitlement
  • Evangelize IAM services and technologies while ensuring business needs are proactively met
  • Identify and prioritize areas for digital authentication and entitlement services improvements
  • Responsible for gaining stakeholder acceptance of IAM initiatives, develops communication plans, produce status reports and other similar artifacts
  • Lead and manage architecture and implementation of Single Sign-On and Customer profile systems
  • Evaluate IAM-related new technologies for potential adoption
  • Collaborate with internal and external Consumer Marketing and brand clients to understand business requirements, ultimately define the overall system technical direction and roadmap
  • Lead IAM-related design meetings with technical development teams both internal and external to Time Inc
  • Manage on-going support for IAM production systems
  • 10+ years of work experience including architecture design and development with a proven record of success
  • 7+ years managing and leading technical development staff to deliver successful technology solutions
  • Strong ability to effectively communicate and partner with business and technical members
  • Ability to understand and follow Java EE development code. Experience with Jersey, JAX-RS and Spring is a plus
  • Working knowledge of relational database design and queries
  • Experience with Access Control processes and properties such as User Provisioning, Onboarding, Role-Based Access Control (RBAC), Authorization models, Single Sign-On (SSO), Active Directory
  • Experience with identity federation protocols such as Security Assertion Markup Language (SAML), Open standard for Authorization (OAuth), OpenID and Facebook Connect
  • Experience with Service-Oriented Architectures (SOA) and RESTful service development
19

Head of Identity & Access Management Resume Examples & Samples

  • Strategic Leadership
  • Develop global enterprise wide strategy and standards for IAM programs ensuring alignment with business objectives and compliance with Access governance framework and operating model
  • Maintain in-depth awareness and understanding of current and emerging trends in IAM in order to inform strategy
  • Provide thought leadership in the development of identity management operational risk management practices
  • Develop, recommend, and partner with corporate support groups to enhance access security practices
  • Provide subject matter expertise and guidance on Access Governance framework to ensure compliance and adherence to bank’s operational risk-taking philosophy, policy, procedures and processes
  • As a member of the leadership team, contribute to the overall strategic planning and direction of the GITRM
  • Operational Leadership
  • Oversee the Access Management support team provisioning 7X24 support of IAM programs and services including certification and security services, privileged and non-privileged ID, and access management of employee and customer accounts acting as escalation point as required
  • Lead the execution of complex global enterprise wide IAM programs utilizing a deep specialized knowledge of IAM practices as the subject matter expert
  • Oversee the automation of user access activities including access request, approval, provisioning and de-provisioning, and certification/re-certification
  • Develop IAM programs and establish new quality assurance processes to increase effectiveness
  • Monitor metrics to measure program effectiveness, and compliance against standards and deliver reporting to provide assurance to senior management
  • Provide identity reporting to business groups to facilitate access to application and data resource decision making
  • Evaluate effectiveness of IAM programs, analyzing areas of deficiency and developing recommendations to resolve
  • Work with vendors to resolve deficiencies identified in audits
  • Research IAM tool sets and products in the market place and determine suitability for BMO’s environment
  • Provide oversight of the use of external resources involved in identity management programs, including selection of vendors, and management of contract costs
  • Risk and Compliance
  • Oversee the governance structure of IAM programs providing regular progress reports and updates to senior management
  • Manage the relationship with vendors and provide oversight of service implementation and execution
  • Ensure overall consistency and suitability for meeting objectives of all IAM programs across the enterprise
  • Manage risk through audit monitoring and control functions, ensuring compliance requirements, audits, and verifications are completed
  • Develop, monitor, and review policies related to IAM program
  • Monitor and escalate issues related to Identity Management
  • Monitor and report on the compliance and effectiveness of logical access controls
  • Manage access governance through development of access rule definitions that align with the bank’s policies and standards and oversight of access rule operationalization
  • Communication and Awareness
  • Promote Access control best practices across the organization through oversight of education and awareness programs
  • Lead the development of education and training programs concerning IAM related risks to the business
  • Conduct requirement reviews with technology partners, assisting in ensuring processes, procedures and documentation requirements are fulfilled
  • Liaise cross-functionally to ensure clear program communication and understanding of IAM policies, processes, and requirements for user access management by all levels of management
  • Recruit, lead, mentor, and develop a world-class technology team, providing opportunities for growth to ensure continuity of the department’s leadership
  • Establish a culture and work environment that attracts, retains and motivates a diverse, skilled workforce in order to maintain a high degree of employee professionalism, commitment and desire to maintain updated skills and knowledge in support of a high performance culture
  • Provide leadership and direction by setting context, defining accountabilities, tasks and assignments, and establishing boundaries for decision-making and approvals
  • Coach, motivate, develop and evaluate performance of direct reports and provide guidance and mentoring in the resolution of complex issues
  • Provide development opportunities to direct reports, including the identification of training needs, creation and implementation of appropriate development plans, monitoring, documenting and providing regular feedback on performance
  • Provide managerial direction, guidance, context setting and translate strategic picture for direct reports
  • Ensure necessary succession plans are in place for all key positions, identify and promote Top Talent, and actively implement solutions to resolve Single Points of Knowledge
  • Interacts with internal and external contacts and groups
  • A Minimum of 10 years of experience in a progressively responsible IAM program management, security operations, and/or risk management, preferably within the financial services industry
  • Completion of a University degree in Computer Science or equivalent work experience
  • Thorough up to date knowledge of the current IAM trends and best practices
  • Experience in vendor and contract management
  • Solid project management and budget management experience
  • Completion of critical security certification
  • Industry certification in related areas of specialty i.e. CISSP, CISA, ITIL, ISO17799, ISSAP, ISSMP, PMP, etc. is an asset
  • Solid knowledge of fiscal and budgetary management
  • Advanced knowledge of security systems, access controls, network security, security management, security architecture, risk management, and security governance framework
  • Strong awareness of emerging security technologies and IAM tools
  • Advanced knowledge of organizational, process, and business models
  • Strong understanding of policies, cross-organizational roles, and governance structures/processes within the Bank
  • Advanced understanding of ITIL processes and ISO Certification
  • Broad understanding of the financial regulatory and legal environment, especially in Canada and the US
  • Strong project management, problem solving and analytical abilities
  • Exceptional and proven leadership capabilities – communication, influence, negotiation, conflict resolution, people management, relationship management (internally/externally), and multitasking
  • Advanced level of critical thinking and sound judgement
  • Strong strategic enterprise wide vision and planning skills
  • Proven ability to successfully partner and consult with clients to identify business challenges and to develop effective strategies and alternatives to mitigate them
  • Ability to effectively lead change management initiatives
  • Strong conceptual skills; ability to deal with ambiguity; creativity; lateral thinker
  • Strong service management and service delivery orientation
  • Possesses expert written, oral, and interpersonal communication skills
  • Ability to present complex information in a manner suitable for technical and non-technical audiences
  • Highly self-motivated, self-directed, and attentive to detail
  • Ability to prioritize and execute tasks in a high-pressure environment
  • Strong team orientation and building skills, and ability to foster a collaborative environment
20

Identity & Access Management Professionals Resume Examples & Samples

  • Manage and deliver projects, including development of project plans, project goals and objectives, tasks, required resources, and associated budgets and timelines for completion
  • Establish relationships with client personnel at appropriate levels
  • Remain current on new developments in information security services and industry knowledge
  • Analyze regulatory requirements and compliance issues related to IAM
  • Perform current state assessments of IAM, including benchmarking/maturity assessments, developing strategies and roadmaps for improvement
  • Develop IAM policies & procedures, architectures, use cases, test and implementation plans
  • Define Role Based Access Control (RBAC), Entitlement, and Segregation Of Duty models
21

Identity Access Management Resume Examples & Samples

  • 5 years experience in developing detailed process workflows with automation orientation
  • Solid understanding of the operations and global banking business
  • Outstanding analytical, communication and problem-solving skills with the ability to develop solutions to complex analytical/data-driven problems
  • Strong experience with Oracle, SQL, and Microsoft Office products: Visio, Excel, PowerPoint, Access, Word
  • 2- 4 years working knowledge of access certificaton and provisioning tools and processes
  • Knowledge of Identity and Access Management controls, principles, methods, and regulatory related obligations preferred
22

VP, Identity Access Management Resume Examples & Samples

  • Design, implement, support and continuously improve IAM technologies and supporting processes
  • Lead and influence teams consisting of cross-functional, onshore/offshore personnel and virtual groups; directly supervise staff, assign responsibilities to team members, monitor progress and hold teams accountable
  • Act independently to deliver program to schedule, budget and scope; support provided as required and requested, and is self-driven and motivated
  • Ensure business goals are met for business stakeholders
  • Creating a written plan and strategy for meeting targets
  • Develop and execute reporting mechanisms to keep stakeholders well informed
  • Work with vendor team members (engineers, project managers) to deliver milestones
  • Bachelor Degree in Computer Science or other related field
  • 5 years’ experience with various IAM solutions
  • Successful background in deploying and managing IAM solutions
  • Deep understanding of Authentication & Authorization technologies such as Active Directory, LDAP, 2-Factor Auth & various Single Sign On solutions
  • Deep knowledge of proven IAM procedures and best practices
  • Expert knowledge with integrating IAM technologies with diverse directories and infrastructures
  • Effective in project management
  • Excellent with communication skills
23

Director, Identity Access Management Resume Examples & Samples

  • Define, design, build, testing, and rollout of the enterprise IDM and Access Management solutions in collaboration with internal and external resources
  • Serve as a trusted adviser to the business stakeholders and understand their core business processes, business priorities which can be enhanced using IDM solutions
  • Provide technical Engineering and vision for customers' application platforms
  • Ability to support negotiations on scope of work as well as manage work with outside vendors / integrators. This includes SOW, MSA, NDA's, along with full financial tracking and defining business benefits
  • Contribute and review IDM and Access Management solution design: ensure innovation, security, and business requirements are met, while also keeping a keen eye on improving the associate's experience with technology
  • Define an enterprise IDM Engineering strategy, with a roadmap of key deliverables and timelines, and deliver consistently
  • Mentor other members of the team on IDM best practices
  • Maintain up-to-date knowledge by researching new technologies and software products, participating in educational opportunities and conferences, and reading professional publications
  • Foundational knowledge of Identity Management technologies such asSailPoint, PingID, CA Minder Suite
  • Significant experience working with large tier security vendors leading RFI/RFP's and contributing to industry standards and working groups
  • A true technical director that inspires creativity and technical leadership from his/her team. A leader focused on the execute component that is agile and understands how to map the business needs to
  • Participating in the definition and leading technical programs that support the IIS security strategy and architecture for security services, mechanisms and safeguards for a broad reaching information security program
  • Working in active partnership with stakeholders (Office of the Global CISO, IIS Security Strategy and Architecture teams, IIS Policy and Compliance Organizations, Network Engineering Organization, and the Business| parallel technical teams) to understand often unique business requirements and develop supporting security domain expertise and technical objectives that will enable the growth and evolution of Comcast's CybrSecurity Identigy Management program
  • Ensuring that operational and incident trends and observations are considered with regard to the evolution of the company's enterprise security architecture capabilities
  • Communicating and working through conceptual design (CCD-HLD) and (SLD) system level design to design in compensating controls, increase visibility/telemetry and IR capabilities
  • Designing and evaluating platforms and structure for integrating diverse security toolsets and technologies
  • Providing consulting function to IIS leaders in addressing their IDM and Access Management posture
  • Promoting a consistent risk vocabulary for application risk and controls and aligning that vocabulary with related compliance and business risk disciplines within the organization
  • Developing metrics that demonstrate current technology implementation roadmaps, indicators of progress, and alignment across IIS teams for those activities
  • Supporting other senior leaders in Information Risk Management in leveraging those metrics as part of the overarching risk and operational dashboard
  • Formally and informally responding to customer and regulatory requests with regard to application security services, mechanisms and safeguards (this includes regular communications with regulatory, privacy and legal stakeholders and active participation in both internal and external audit activities)
  • A true technical director that inspires creativity and technical leadership from his/her team. A leader focused on the execute component that is agile and understands how to map the business needs to viable technology solutions. An extremely technical leader and SME Identity Management Technologies and their implementation in large scale environments
  • Working under extreme pressure and tight deadlines in a calm and collaborative fashion leading from the front
  • 5+ years of experience leading IDM Engineering teams and building Access Management Platforms and Solutions
  • 10+ years of leadership and mentoring experience in hands-on and rolling up your sleeves management
  • 10+ years of experience managing and providing technical leadership for complex enterprise security projects/programs for a large enterprise organization
  • 10+ years of experience with Identity Management technologies and implementations
  • Specific experience managing projects / programs from concept through implementation (supporting oversight processes) using a structured project management methodology across the entire project life cycle (not a project manager)
24

Identity Access Management Resume Examples & Samples

  • Develop and maintain business process maps and supporting documentation
  • Work with a Global team to ensure Certification tasks and responsibilities are completed in a timely basis
  • Act as the liaison between the CIB IAM teams, business units, various technology and support teams in discovery efforts to produce audit related deliverables
  • Assist in the design, development and testing of new reports from CIB IAM
  • Ability to respond to ad hoc requests and queries from internal sources regarding Certification, Termination and Transfer processing
  • Support reporting associated to CIB IAM project status, control and service metrics, other internal reporting projects
  • Support project management efforts within CIB IAM – including (but may not be limited to) the following: aid in the creation of project charters, analysis for value capture, document business and functional requirements (BRDs/FRDs)
  • Support CIB IAM’s effort in partnering and coordinating with Information Owners, IRMs, ADMs and other JPMC control teams to identify/suggest efficiencies to CIB IAM control procedures
  • Provide expertise in technology control practices: information risk management, IT control policies, etc
  • Minimum 3-5 years experience in application development, production/customer support, information security operations and/or technology risk management
  • Strong ability to analyze and produce metrics for Senior Level Reporting
  • Strong knowledge of Identity and Access Management controls, principles, methods and regulatory related obligations preferred
  • Must have 1-2 years experience with two or more of the following systems: IDCert, IIQ, AACT CAR, ARMS, RSAM, IO Console, EURC, IBID/RMT, Phoenix, ITRC, Alacrity / Service Center (or a similar ticketing system)
  • Some experience with any of the following is highly desirable: IIQ, AACT CAR, VDS, DCR, DO, NEIM/FARS, EPV, GEI, ID Integrate, MIT, IRT, CRT
  • Proficiency with Sharepoint site administration / development desired
25

Identity & Access Management Services Specialist Resume Examples & Samples

  • Security Architecture fundamentals, Security Processes and Standards,
  • Microsoft Office Tools (Word, Excel, Visio, PowerPoint) - The ability to create high quality documentation such as Presentations, Reports and completing metrics and spreadsheets
  • IT Systems - A fundamental understanding of IT Systems and Services covering Virtualisation, Mainframes, Cloud Services, Hosting Services, Desktop
  • Systems Development - A fundamental understanding of IT Systems Development
  • Networking Technologies - An understanding of the fundamentals of IT networking technologies, the basic building blocks used and how they support a secure architecture
  • Czech: Fluent or Mother Tongue
  • Teamwork, Adaptability
  • Listening, High Integrity & work ethic
  • Communication, Positive demeanor
26

Identity & Access Management Engr-ping Federate Resume Examples & Samples

  • Bachelors degree or higher in engineering or a related field with 6-8 years of IT infrastructure integration experience with a recent focus on security
  • Minimum 3 years experience working with Ping Identity Ping Federate (or CA/Netegrity Siteminder or related WAM technology)
  • 5 years working with UNIX
  • Web Access Management, SSO, Authentication, Identity Federation, SAML
  • Candidate will support multiple projects requiring effective multi-tasking and time management skills
  • Candidate must have good communication skills and be able to work as part of a geographically dispersed team
  • Shell scripting
  • LDAP and/or database experience
  • Strong Authentication / PKI
  • Scripting experience desired as is programming knowledge to understand APIs and assist with prototype development
  • Web Servers, Application Servers, Internet technology, Information security
27

Cybersecurity & Privacy Identity & Access Management Manager Resume Examples & Samples

  • Supervision and development of staff on multiple projects, business development, and communications with executives
  • Identifying and addressing client needs: building solid relationships with clients; developing an awareness of relevant services; communicating with the client in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and resolving potential conflicts as a leader
  • Identifying and addressing client needs while displaying the ability to contribute to the development of a business vision and manage implementation efforts with complex project management capabilities
  • Managing and/or contributing to project planning, engagement administration, budget management, and successful completion of engagement workstream(s)
28

Manager Identity & Access Management Resume Examples & Samples

  • Candidate should have overall 2-8 years of information technology (IT) experience and specifically three to four years in implementing medium/large Identity and Access Management projects including the following product suites
  • CA R12 Identity Management
  • Sun Identity Management
  • IBM Tivoli Identity Management
  • Oracle Identity Management
  • Experience in following technologies would be an advantage: LDAP, PKI, SSL, JNDI, etc
  • Should have experience in delivering IT projects, including requirements analysis, defining architecture, and conducting detailed technical design, development, and lead solution delivery
  • Should have experience in carrying out application integration with the IAM solution
  • Should have experience in implementing at least one complete IAM SDLC engagements projects, including requirements gathering, analysis, design, development, testing, deployment, and application support
  • Should have had direct client experience, including working with client teams in an on-site and offshore mode
  • Should have ability to manage multiple project tasks within and across projects, as required
  • Should be focused on identifying and driving initiatives that are relevant for the project delivery and will help factor reusability as well as related benefits
  • Desirable to have certifications in security domain, such as CISSP and CISA
  • Strong programming background
  • Medium to advanced expertise in any of the following products
  • Oracle - Identity & Access Management
  • Tivoli Access/ Identity Manager
29

Manager, Identity & Access Management Resume Examples & Samples

  • Develop roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Partner with Architecture teams to develop solution designs
  • Maintain deep technical and business knowledge of industry directions and trends in the area of system engineering
  • Drive to deliver technology and products in the roadmap on schedule and with the highest quality
  • Provide advice, guidance and direction to carry out plans and procedures, ensuring schedule attainment, product development process adherence, performance and budget targets are met
  • Provide escalation support for operations and support teams, including root cause analysis and preventative analysis
  • Minimum of five years of experience in an IT environment with three years of experience managing and supporting projects
  • Bachelor's degree in computer science or related discipline from an accredited college or university
  • Experience with Microsoft Active Directory, X.509 Public Key Infrastructure Certificates and CRL, SCEP and Certificate Lifecycle Management tools
  • Firm understanding of authentication and authorization technologies and protocols such as Kerberos, certificate, basic, forms-based and multi-factor authentication etc
  • Understanding and experience with Cloud Identity as a Service such as Microsoft Azure Active Directory, Identity Federation protocols such as SAML2, WS-Federation, OAuth, OpenID Connect etc
  • Experience with Identity & Access management tools is a plus, such as IBM Security Access Manager for Web and Mobile, Tivoli Directory Server, Tivoli Federated Identity Manager, Tivoli Identity Manager and DataPower IND2016
30

Identity & Access Management Resume Examples & Samples

  • Support team functions by.
  • 5 + years professional Information Technology experience
  • General knowledge of Access Administration and /or IT Risk Management
  • Experience with internal tools such as ID-Cert, IBID, RSAM, EPV, SEAL, ARMS, TAMS and other standard access management tools is preferred
  • Knowledge and understanding of Identity and Access Management controls, principles, methods, and related regulatory obligations is preferred
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to independently develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing positive relationships
  • Must be able to execute in a challenging environment and handle a large volume of work
  • Highly proficient in Excel, Word, PowerPoint, SharePoint and Visio
  • Proficient in Project, and Access
  • Bachelor’s Degree in a business or information technology related field
31

Identity & Access Management Expert Resume Examples & Samples

  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role-based access control, authentication, and authorization, such as SailPoint, CyberArk, PowerBroker, Okta, Active Directory, or ForgeRock
  • Experience in devising IAM strategies and implementing IAM solutions for complex enterprise environments with diverse user populations
  • Experience with one or more IAM products, including directories, multi-factor authentication, provisioning tools, and single-sign-on tools
  • Ability to work with teams and be flexible to work for a diverse set of clients
  • Experience with Cloud-based systems and deploying IAM to Software as a Service solutions
  • Experience with designing and deploying IAM process workflow
  • BA or BS degree in CS, IT, Engineering, or a related field preferred
32

Identity & Access Management Cyberark Manager Resume Examples & Samples

  • Requirements analysis, strategy, design, implementation, operations and application/business integration
  • Performing as a team member: understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback; providing guidance, clarification and feedback to less experienced staff
  • Contributing to business development opportunities and/or engagements from pre-sale and initial scoping through final delivery and sign-off
  • Leading teams to generate a vision, establish direction, and motivate team members
33

Identity & Access Management Resume Examples & Samples

  • Provide support and deliver on requirements for Identity and Access Management initiatives as required to support the planning ,design and execution of the initiatives and on-going access control activities
  • Support CIBC's key Identity and Access Controls as required
  • Develop a sustainable Policy Management practice as it relates to Identity and Access Management
  • Facilitate discussions with business groups across the enterprise to gain understanding of access management business rules, such as segregation of duties, to enable definition of Access Management Policies
  • Work with business groups and their supporting technology teams on defining mapping between Policies and business applications; identifying required entitlements per Policy
  • Maintain Policies and all associated data, rules , and processes. Ensure proper governance of Policies; Policies verification on a regular basis
  • Maintain risk and operational metrics related to Policies
  • Work with the project teams on implementing the defined Policyies within Acsess & Identity Management (AIM) solution
  • Support the integration of new subsidiaries to CIBC’s Identity and Access Management solutions and processes
  • Research the latest methodolgies and approaches for effective and efficient Policy Management practices
  • Champion the improvement of identity and access management processes, controls and communications related to Policies across stakeholder groups
  • Where required, consult with Technology and LOBs regarding access control related issues
  • Prepare management and/or executive reporting and other presentation materials
34

Identity & Access Management Resume Examples & Samples

  • Develop a sustainable Role Management practice as it relates to Identity and Access Management
  • Facilitate discussions with business groups across the enterprise to gain understanding of business functions and roles & responsibilities to enable definition of business Roles
  • Work with business groups and their supporting technology teams on defining mapping between business Roles and business applications; identifying required bundling of entitlements per role across multiple business applications
  • Maintain business Roles and all associated data, rules including access bundling rules, and processes. Ensure proper governance of Roles; roles verification by Role owners on a regular basis
  • Maintain risk and operational metrics related to Roles
  • Work with the project teams on implementing the defined business Roles within Access & Identity Management (AIM) solution
  • Research the latest methodologies and approaches for effective and efficient Role Management practices
  • Champion the improvement of identity and access management processes, controls and communications related to Roles across stakeholder groups
  • Lead a small group of roles, policies, and access management specialists
  • Relationship Management--Ability to establish, build and maintain healthy working relations and partnerships with clients, vendors and peers
  • Written Communications--Ability to produce a variety of business documents that demonstrate command of language, clarity of thought and orderliness of presentation
  • Interpersonal Relationships--Knowledge of approaches, tools and techniques for working with individuals and groups in a constructive and collaborative manner
  • Leadership--Knowledge of approaches, tools, and techniques for gaining the cooperation and support of others
  • Service Excellence—Act as a service ambassador across CIBC and classify, summarize and prioritize client/partner feedback in a continuous service enhancement capacity
35

Identity Access Management Specialist Resume Examples & Samples

  • 1Conduct functional testing of the IDM Solution
  • 2Conduct integration testing of the IDM Solution
  • 3Conduct regression testing of the IDM Solution
  • 4Conduct capacity and performance testing of the IDM Solution
36

Manager, Identity & Access Management Resume Examples & Samples

  • Participate in development of roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Partner with architecture teams to develop solution designs
  • Provide advice, guidance and direction to carry out plans and procedures, helping to ensure schedule attainment, product development process adherence, performance and budget targets are met
  • Five years of experience in an IT environment with three years of experience managing and supporting projects
  • Experience with the IBM suite of access management tools preferred including: IBM Security Access Manager for Web and Mobile, Tivoli Access Manager, Tivoli Directory Server, DataPower, IBM Security Access Manager for Mobile, and Tivoli Federated Identity Manager
  • Experience with the IBM suite of identity management suite of tools preferred including: Tivoli Identity Manager and IBM Security Identity Manager; experience with Microsoft Active Directory
  • Experience with other identity and access management systems is a plus
  • Firm understanding of authentication and authorization technologies and protocols including: Kerberos, SAML, OATH, OAuth, federation, certificates, multi-factor authentication and XACML IND2016
37

Identity & Access Management Lead Resume Examples & Samples

  • Oversee the daily and timely operation of IAM applications and related systems, including identity provisioning and administration, configuration maintenance, log monitoring, and incident investigation
  • Support the CISO and SRI staff in developing and executing strategy for the continual evolution of information security practices. Assist the CISO in the communication and distributed implementation of such strategies
  • Support the development and engineering of security technologies and management tools including but not limited to infrastructure and application vulnerability assessment and management, endpoint protection, logging and monitoring, and data loss prevention
  • Manage development of information security architecture and supporting patterns in alignment to information security and IT strategies and compliance requirements
  • Support the execution of information security policies and standards, including development of appropriate technical standards, guidelines, procedures and configurations
  • Create and communicate technology roadmaps to enable SRI and gain buy-in from key stakeholders
  • Support requirements definition, planning, technology selection, and implementation of role based access control, multi-factor authentication, authorization control, and mobile device management (MDM)
  • Plan and manage activities of technical implementation teams and provide accurate estimates and timely updates to project management
  • Coordinate with business divisions to review and restructure security classes, groups, and profiles to ensure accuracy and compliance with requirements
  • Develop, implement, and administer access control processes that support the creation, modification, and termination of system level user accounts and associated access rights
  • Perform analysis, design, documentation, and testing to ensure system performance and functionality
  • Measure and report on the effectiveness and efficiency of IAM activities
  • Manage end user requests and act as liaison between end users and application developers
  • Monitor service requests received through the IT Service Desk to facilitate timely resolution
  • Document the design, architecture, and operating procedures of information security systems
  • Participate in risk assessments, audits, IT incident response, disaster recovery, and business continuity planning
  • Develop program and processes for user awareness, user account provisioning, and workflow automation
  • Determine, develop/acquire, implement, maintain and utilize processes and tools that adequately control and monitor the security environments of ITS supported platforms
  • Extend to divisional IT organizations the utilization of monitoring and control processes and tools as appropriate for use in application systems security environments
  • Develop, implement, and administer access control processes that support the creation, modification, and termination of machine level user accounts and associated access rights
  • With line-of-business coordinators, review and restructure security classes, groups, and profiles to ensure accuracy and compliance
  • Bachelor’s or Master’s degree (preferred) degree in Computer Science, Management Information Systems, Engineering or other related field. Professional certifications such as CISSP, CISA, CISM, and PMP preferred
  • 6+ years of combined experience in the following areas: IT operations, application development, identity administration, and/or information security operations
  • 2+ years of experience with managing and configuring enterprise level identity and account management platforms including entitlement and workflow management, as well as target system provisioning configuration
  • Must be a highly motivated, self-reliant team player who is comfortable with managing and prioritizing multiple tasks and deadlines
  • Demonstrated ability to design and configure policies and workflows to achieve system objectives, including audit and regulatory requirements
  • Solid understanding and working knowledge of Identity & Access Management applications, including MS Active Directory and Okta platforms
  • Familiarity with the SAML protocol, Single Sign-On systems, PKI, SOA, and web technologies and services
  • Operational experience with monitoring and analyzing performance and capacity metrics to determine current health and proposed platform growth
  • Knowledge of applicable security and privacy practices, standards, and regulations such as NIST, FIPS, FERPA, HIPAA, ISO 27001/2, COBIT, and SANS
  • Analytical and problem-solving skills and ability to apply those skills to information security privacy issues
  • Working knowledge of current project management principles, processes, methodologies, and tools
  • Fluent in IT security terminology and frameworks (e.g. ITIL)
  • Prior hands-on professional experience must include combination of: VPN, IDS/IPS, DLP, digital certificates, smart cards, biometrics, content/e-mail filtering, data encryption, and application security
  • Experienced in promoting and executing based on software and systems development methodology
  • Ability to establish and maintain effective work relationships with all levels of personnel both internally and externally; e.g. leadership, executives, clients, vendors, and business division staff
  • Ability to prioritize and handle multiple tasks simultaneously
  • Attention to detail and follow through including the ability to document work
  • The ability to provide support after normal business hours as needed
  • History of and commitment to ethical behavior and ethical full disclosure
  • Experience managing enterprise-wide IAM systems, including integration with ERP, HCM, and SaaS
  • Knowledge of leading governance, risk, and compliance (GRC) and data privacy laws and practices
  • Knowledge of compliance auditing and evaluation techniques, technologies, and methodologies
  • Knowledge of leading web, application, and database security practices
  • Experience with MS SharePoint
38

Identity & Access Management Specialist Resume Examples & Samples

  • Act as subject matter expert, responsible for the developing and enhancing Morgan Stanley’s RADIUS infrastructure as well as architecture
  • Development of tooling and software extensions
  • Work as a member of the global RADIUS engineering team
  • Debug and solve native RADIUS protocol issues as well as system integration issues
  • Design, develop, test and deploy Nokia RADIUS server side extensions
  • Maintain, patch, build, test and deploy Nokia RADIUS components
  • Excellent understanding of RADIUS protocol and its implementation
  • Thorough understanding of core network and security concepts, specifically Identity and Access management concepts including authentication, authorization and accounting (AAA)
  • Strong Java development experience
  • Development experience for Perl, Python
  • Good communication and technical documentation skills
  • Good Understanding of UNIX / Linux operating system as well as basic system administration skills
  • Excellent understanding of Software Development Lifecycle Management concepts
  • Experience operating in a large, global, compartmentalized enterprise environment
  • Established track record of process analysis optimization and automation
  • Certifications desired - CISSP, CCNA
39

Identity & Access Management Resume Examples & Samples

  • Become a tech SME for our flagship products family of Identity and Access Management
  • Analyze customer problems & service requests and resolve them within agreed service levels
  • Use troubleshooting/ debugging techniques and tools to analyze technical problems
  • Engage Development teams for issues that need a resolution through code fixes
  • Increase IBM's Self-Help knowledge base, by creating knowledge articles wherever needed
  • Provide feedback to the Development Team on Product feature enhancements. Provide Test cases to the Test Team
  • Product related assistance to Pre-Sales / Sales/Deployment Teams
  • Create wikis, blogs, tech-notes, technical trainings, webcasts for educating Customer and Business Partners
  • Provide technical support for critical issues on Weekends/ Public holidays on rotation basis
  • Especially for Unix / Linux. Troubleshooting computer setups, networking issues. Strong OS concepts, OS security, Inter-Process communication, shell scripting
  • Clear and effective communication skills(oral and written English)
  • Excellent email and telephone etiquette
  • Listening skills. Analytical and problem solving skills
  • Ability to work as a part of a global team, despite the diversity(cultural, geographic and other differences)
  • Readiness to work in morning / evening shifts. Weekend of rotation basis
40

Director of Identity Access Management Resume Examples & Samples

  • Ability to provide strategic leadership in the development and implementation of solutions to support access authentication, authorization and provisioning while standardizing and streamlining IT security administration processes
  • Ability to govern and continually improve processes and procedures that focus on risk-based access controls; i.e., providing the least allowable access required for business operations, including role-based access models
  • Ability to lead the IAM team which includes delivering automated access security services, managing the quality of services delivered, developing team skills and fostering a high performance culture
  • Ability to generate innovative ideas and appropriately challenge the status quo. Identify opportunities to improve logical access provisioning processes
  • Ability to collaborate with control owners and stakeholders across enterprise to develop and maintain logical access controls to safeguard MGMRI data and consumer information
  • Ability to monitor automation performance by including bench-marking and tracking performance against service improvements
  • Ability to provide IAM program direction, subject matter expertise and training to control owners and stakeholders
  • Ability to execute all responsibilities based on a solid knowledge of IT security and access management best practices and processes
  • Ability to supervise staff in delivering IAM services
  • Ability to deliver Role Based Access Models (RBAC), entitlement review and certifications process
  • Ability to manage a phased-release approach to product development and testing; implements, manages tools for
  • Ability to Work closely with development teams and technical leads to build automation standards
  • Ability to oversee automating application deployment and environment configuration management
  • Working knowledge in Security Administration, Identity and Access Management along with one or more of the following governance and compliance concepts, practices and procedures, which includes but is not limited to ISO, COBIT, NIST, PCI-DSS, SOX, Gaming MICS
  • Strong problem solving, logical thought processes and analytic abilities
  • Exhibits a strong interest in and aptitude to be an IT security advocate for Information Technology
  • Highly ethical and discreet, with ability to maintain confidentiality and objectivity
  • Excellent interpersonal skills, including the ability to support all clients and stakeholders, while ensuring adherence to the company’s logical access and security administration standards and policies
  • Maintains a professional, neat and well-groomed appearance, adhering to MGM Resorts International standards
  • At least 10 years’ experience in IT Security with focus on user access management and/or security access automation tools
  • Prior leadership experience including working directly with executive management
  • Ability to lead and prioritize in a high pressure environment
  • Familiar with IT governance and compliance concepts, practices and procedures, which includes IT General Controls, PCI-DSS, SOX and Gaming MICS (Minimal Internal Control Standards)
  • Excellent communication, interpersonal, facilitation and presentation skill
41

Senior Identity & Access Management Specialist Resume Examples & Samples

  • ​Design, deploy and implement internal Privileged Identity Management and Identity & Access Management Tools
  • Develop and maintain operational framework for Privileged Account Management
  • Provide expertise in workflow, policy and external integration with IAM tool
  • Acts as an escalation point for the team and helps remove barriers that prevent IAM policies and processes from moving forward
  • Java & REST Development with the IAM Tool Framework
  • ForgeRock IDM knowledge
  • Java Programming or other Language
  • Bachelor's degree preferred and 5-7 years of related work experience or an equivalent combination of education and experience
  • Excellent written and verbal communication skills. Ability to explain technical concepts to technical or non-technical personnel
  • Ability to read, write and interpret business and technical documents
  • Basic math functions such as addition, subtraction, multiplication, division and analytical skills
  • Strong leadership profile and 4/5+ years hands on experience with implementing and supporting Identity and Access Management and Governance software and solutions, such as SailPoint, Hitachi, EMC, Oracle, Ping and CyberArk
  • Ability to work a flexible schedule based on department and company needs
  • This position involves regular ambulating, sitting, hearing, and talking. May occasionally involve stooping, kneeling, or crouching. May involve close vision, color vision, depth perception, and focus adjustment. Involves use of hands and fingers for typing on keyboard and using a mouse. May be a need to move or lift items under 10 pounds
42

Identity Access Management Resume Examples & Samples

  • Excellent knowledge of Microsoft Active Directory, including DHCP, DFS, DNS and WINS
  • Excellent knowledge of Microsoft Forefront Identity Manager / Microsoft Identity Manager
  • Working knowledge of Windows Server 2012R2 or higher version
  • Knowledge of Microsoft AD integration with Microsoft O365 Cloud/ Microsoft Azure Active Directory
  • Working knowledge of Visual Basic and Visual Studio preferred
  • Previous experience implementing Role-Based Access Control (BHOLD) preferred
43

Senior Manager Identity & Access Management Resume Examples & Samples

  • Responsible for the reliability and uptime of the Rackspace Identity and Access Management systems
  • Ensure that Rackspace systems can conduct the following: automate access requests, enforce policies, ensure compliance, enable delegated administration, as well as ensure Role Based Access Controls
  • Leverage change management procedures to ensure high uptime and consistent results
  • Accountable for providing information to complete security and compliance audits
  • Manage teams of technical engineers
  • Leverage project management skills to facilitate medium to large projects to ensure projects are completed on time and according to quality standards
  • Research and identify system areas that need to be advanced in a proactive manner; this includes solutions that can be deployed off the shelf and creating new solutions via our Software Development teams
  • Assess and communicate risks based on product complexity, resource and/or timeline constraints
  • Work closely with other groups throughout the company, including being a technical resource for internal groups and communicating frequently with engineering and development teams to help them improve the operational efficiency of the systems you manage
  • Focuses time on hiring, coaching, and developing a solid team in order to accomplish the above tasks
  • Helps set development goals for your employees and provide regular feedback to them so that they always know where they stand in your organization
  • Continuously finds ways to improve the business through better processes and people
  • Able to assist in planning the strategic vision of the organization for the next 5 years
44

Identity & Access Management Specialist Resume Examples & Samples

  • They will liaise with our client and third parties in respect of patching, maintenance and capacity issues for the systems in question
  • Maintain Identity and Access Management strategies and solutions within our client’s environment for both corporate as well as external facing applications
  • The resident would work closely with the Infrastructure Security and Risk Management teams to ensure all design and development activities across platforms adhere to industry best practices and regulations related to data security, Access Control or Security initiative
  • Manage operations within the IAM environment at the client, including application patching and upgrades and certificate management
  • Design and implement standards and processes for access enforcements (authentication and authorization protocols) and access governance (role management, certification, logging monitoring etc.)
  • Establish an automated process for full user lifecycle management (provisioning/de-provisioning) of systems, ensuring process will comply with regulatory standards, including PCI DSS
  • Implement procedures and controls to ensure password settings, administration and delegation of rights, privileged access management in compliance with the client's security standards
45

Identity & Access Management Solutions Resume Examples & Samples

  • Develop complex IAM components required to manage legacy (non-web based) applications, including but not limited to custom adapter using TDI development
  • Document and train team to support solutions architected and developed
  • Provide IDM developers with technical development direction and coaching
  • Recommend, document, and socialize design of underlying technical solutions
  • Work with technical teams and partner organizations to validate that technical components have been configured appropriately
  • Assist with the prioritization of managed system / application rollouts
  • Monitor and assess stakeholder needs and priorities for management of user profiles and access rights
  • Assist with the development and implementation of policies and procedures across IDM System instances
  • Ensure appropriate review of issues encountered in steady state production environment, consolidating all information from team members, and communicating root cause and proposed resolution to management
  • Contribute to the development of components to report on performance against defined SLAs
  • Ensure that the level of error handling required to ensure that all solution issues are identified and reported upon to the appropriate parties has been built into all components, facilitating alignment with SLAs
  • Contribute to the maintenance of IDM System configuration, including Policies, Services, Reports, and Lifecycle Rules
  • Establish the design, and contribute to the maintenance connectors and resource adapters to managed resources
  • Develop and manage SSO implementations from an associate, B2B, B2C perspectives
  • Assist with the management of configuration and ongoing support
  • Review code and configuration developed for workflows, adapters and business rules, validating alignment with overall solution design
  • Support bulk user loads for processing large scale user adds, modifications, and/or revocations
  • Troubleshoot complex technical issues being encountered by end-users, and work with the team to ensure that the appropriate actions are taken to address such issues
  • Escalate incident recurrences to Management for review
  • Architect, configure and maintain the IDM System components
  • Review and approve / reject change requests based upon the validation that all necessary change management requirements have been fulfilled from a Technical standpoint
  • Diagnose and resolve hardware, software, and user application issues
  • Monitor IDM System performance and collaborate with hardware and software support to align processing and storage capacity accordingly
  • Implement IDM System policies, procedures, and configuration standards
  • Monitor the IDM System infrastructure for potential security vulnerabilities and taking appropriate resolution steps
  • Monitor IDM System alerts and error conditions
  • Propose IDM System enhancement and/or integration designs
  • Implement appropriate data classification controls, user groups, and roles within the IDM System, addressing local privacy and data protection requirements
  • Support testing of IDM System enhancements and integrating with managed platforms and applications, resolving technical issues as appropriate
  • Coordinate IDM System upgrades and the application of security patches
  • Monitor IDM audit data regularly for security and policy violations
  • Notify management of continued issues being introduced through current processes, or due to potential lack of clarity around appropriateness, resulting in inappropriate actions being taken by the team
  • Participate in information gathering sessions with business users, collecting requirements, and communicating the appropriate design to meet collected requirements to team members
  • Participate in cross-team design reviews, providing teams with guidance and direction based upon best practices for Sysco
  • Train team members on the appropriate means of dealing with specific requests and/or issues, from a technical, procedural, and communication perspective
  • Ensure that significant and/or questionable requests and/or issues are appropriately escalated to management
46

Dir, Identity & Access Management Resume Examples & Samples

  • Be an expert in building, executing and managing enterprise I&AM initiatives in a complex organizational environment
  • Drive the development and implementation of standard processes that result in effective methods for transferring implemented solutions to security operations
  • Demonstrated experience managing the demand/supply of project resources and tracking allocation
  • Demonstrate an ability to influence all project and portfolio stakeholders; communicate highly relevant information to both executive leaders and individual contributors in an effective manner
  • Be recognized as an Industry Expert in the field of Identity and Access Management
  • Bring a deep background and broad experience in Identity Management, Information Security or related business areas and expert understanding of business process, scope and risk management, and scorecard/dashboard development
  • Demonstrate the ability to effectively collaborate with Directors, Managers and Team Members in the pursuit of measurable outcomes and results
  • Manage and lead a team of high performing individuals who create I&AM solutions to meet current and future needs for Nike
  • Develop and manage a project portfolio that ensures consistency and transparency for approximately $5 million/year in technology project spend
  • Have the ability to effectively work cross-functionally with and through business and IT Leaders to build consensus and drive results
  • Need to demonstrate a proven track record of successfully delivering large I&AM project-portfolios in a fast-paced environment with accountability for deadlines and value propositions
  • Manage project budgets and scope, and conduct resource planning for risks that are proactively identified
  • Develop and employ strategies to bring strategic alignment between technology and business stakeholders at NIKE
  • This role reports to the Senior Director of NIKE Corporate Information Security Architecture and Engineering
  • A Bachelor's degree in Business, Project Management, Information Technology or related field. MBA and/or CISM, CISSP preferred
  • 8-12 years' experience leading and managing teams that deploy large-scale I&AM projects; should include comprehensive experience as a business/process leader or as a leader in an IT role
  • Demonstrated experience managing direct reports, as well as teams within large cross functional projects
  • Proven track record of being results orientated with demonstrated ability to achieve aggressive goals
  • Exceptional communication skills, including the ability to gather relevant data and information, actively listen, dialogue freely, verbalize ideas effectively, negotiate tense situations successfully, and manage and resolve conflict
  • Proven presentation and facilitation skills
  • Budget management experience of a multi-million dollar portfolio
  • Demonstrated expertise of building a consensus across business partners and technology leaders, and influencing successful outcomes
  • Must excel working in team-oriented roles that rely on ability to collaborate with others
  • Experience working successfully in a high matrix organization
47

Identity & Access Management Solutions Resume Examples & Samples

  • Provide direct leadership and management of all IAM functions
  • Actively lead and manage IAM programs to ensure on time delivery, budget and quality goals are met
  • Analyze service offerings, program portfolios and define success / failure metrics and ensure the tracking and reporting, status updates of all metrics
  • Lead and drive definition, implementation and closure of IAM projects, including requirements, project plans and resource needs with stakeholders and within team resource
  • Assist in the development and execution of the overall enterprise security roadmap as it pertains to IAM Lead the innovation and championing of IAM processes/methodologies at all levels across the firm
  • Ensure understanding and implications of third party technologies solutions that control access
  • Assist in maximizing investment decisions by understanding the capabilities of existing IAM solutions and aligning with business strategy
  • Ensure that ongoing training/awareness of IAM is delivered to internal employees and team members
  • Lead the optimization of processes and controls, with a goal of reduce vulnerabilities and mitigation of IAM risks
  • Partner with business leads to drive the adoption of IAM services Manage staff in accordance with organization’s policies and applicable regulations
  • Responsibilities include planning, assigning, and directing work; appraising performance and guiding professional development
  • Bachelor’s Degree in Computer Science or related field; Graduate degree highly desired
  • 10 years IT management experience 5 years developing/supporting/architecting processes, policy and or tools for large scale Identity and Access Management solutions
  • Minimum of 5 years of progressive experience managing security operations initiatives, experience in successfully deploying IAM programs
  • Knowledge and experience in infrastructure, networking, databases, authentication and authorization and directory services Advanced security certifications a plus (CISSP Preferred)
  • In-depth knowledge and solid experience of the IAM discipline across multiple IAM functions
  • Demonstrated track record of developing and implementing an IAM roadmap that meets security requirements and appropriate industry standards
  • Demonstrated success in the design and development of security solutions that adhere to applicable policies and standards
  • Extensive knowledge across a broad range of identity and access management technologies
48

Identity Access Management Resume Examples & Samples

  • Responsible for analysis, design and development of the access request workflows in the firm approved request tools, in comformity to audit set standards
  • Ensures application workflow onboarding requests are initiated, processed timely and accurately
  • Document access workflow onboarding requirements, initiate calls/meetings, prepare an onboarding plan and manage the lifecycle of the process
  • Work with a team of workflow developers/project administrators, partners and report to managers in a global team environment
  • Analysis of the access control gaps across the application workflows in request tools, documentation of the RCA and submission of the attestation evidences
  • Data extraction from databases of various in-house tools
  • Access provisioning failures monitoring and remediation
  • Identify ways to increase efficiencies of processes
  • Gather operational metrics and update progress in trackers
  • Document and update related procedures in SharePoint environment
  • Act as the liaison between the Application Developers, Database Administrators, Business Units, various technology and support teams
  • Partner and coordinate with Information Owners, Technology Control Officers and Application
  • 2-3 years of hands on analysis & development experience is preferred
  • Bachelor’s Degree in Engineering in information technology related field or equivalent experience in the Identity and Access Management field
  • Must have 1-2 years experience with one or more JPMorgan Identity and Access Management tools OR atleast 1 role based access management tools in the market
  • Project Management experience including solid knowledge of Identity and Access Management controls, principles, methods, SOX/SSAE16 and regulatory related obligations preferred
  • Solid understanding of the global banking business and operations
  • Solid knowledge of IT risk management frameworks/concepts preferred
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client relationships
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access, SharePoint and Visio)
  • Working knowledge of SQL/Oracle queries is a must
49

Identity & Access Management Director Resume Examples & Samples

  • 8+ years of IT security and/or Governance Risk and Compliance related experiences
  • 4+ years working with Identity and Access Management solutions
  • 4+ years of experience in People/Personnel Management
  • Experience interfacing with executive leadership and making case for strategic change/improvements
  • Ability to manage, lead and motivate cross-functional teams including Engineers, Business Analysts, Project Managers, Administrators and Vendors
50

Service Manager Identity Access Management Resume Examples & Samples

  • You will be the first point of contact for all operational issues
  • Responsible for the IAM service, including ensuring continuous improvement and management
  • Ensure efficient delivery of IAM services and high user satisfaction
  • Manage service level agreements and contracts with vendors
  • Manage software updates, patching and testing
  • Support and define IAM implementation and upgrade projects
  • Ensure quality compliance with regard to following processes and documentation
  • Ensure timely communication and involvement of all relevant stakeholders including vendors, project teams, customers and architects
  • Bachelor or similar graduate degree in Engineering, Computer Science, Business Administration combined with additional relevant IT and business experience
  • 6+ years of experience working within IT Infrastructure
  • Very strong knowledge within IAM processes and governance
  • Strong ITIL process experience and understanding, such as with change and incident management
  • 2+ years of relevant experience in managing deployments of IAM solutions. Experience in managing Sailpoint is particularly valued
  • 2+ years of experience developing identity management strategies and supporting architecture and implementation plans
  • Strong broad understanding of security concepts, deployments and implications
51

Identity & Access Management Manager Resume Examples & Samples

  • Governs the identity lifecycle processes around roles, monitoring access control processes to ensure they are effective, efficient and in compliance with standards and control objectives
  • Manages and implements procedures to control information workflow for the addition, modification, and removal of user access across in-scope applications and resources
  • Provides advisory and consultation to system development projects around identity and access management requirements/controls
  • Create, update, and look for opportunities to continuously improve standards and procedures
  • Create and update access request forms to ensure a smooth, effective and compliant request process
  • Enforce policies and procedures to ensure an effective, efficient, and compliant operating environment
  • Ensure all access certifications are completed on time and accurately
  • On board additional applications as needed, including access certifications
  • Serve as the escalation point for all questions / issues impacting the Provisioning team from internal or external sources
  • Participates in internal and external audits
  • Complies with all applicable federal and state regulations
  • 31
52

Identity & Access Management Resume Examples & Samples

  • Edge commercial tools, assessing a client's current state and gaps, developing processes, and using excellent communication expertise to interact with executive leaders, business unit managers, and IT staff. Support a federal department by assessing current IAM capabilities, exploring the impact of new technologies and capabilities, developing strategies, deploying new IAM products, and integrating them with existing products to improve business operations, reduce security risks, and meet regulatory requirements. Provide support to unify the agency's identity management solutions, including credential management, identity management, public key infrastructure, access management, and identity federation using Active Directory Federated Services (ADFS), Dir SyncAzure Active Directory Sync (AADSync), eDirectory/Novell Identity Vault (IDV), Novell Secure Login (NSL), ActivIdentity ActivClient, Novell Identity Manager Password Sync Filters, Novell Identity Manager Drivers, and miscellaneous scripts
  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role
  • Based access control, authentication, and authorization, such as Active Directory Federated Services (ADFS), Dir SyncAzure Active Directory Sync (AADSync), eDirectory/Novell Identity Vault (IDV), Novell Secure Login (NSL), ActivIdentity ActivClient, Novell Identity Manager Password Sync Filters, Novell Identity Manager Drivers, and miscellaneous scripts
  • Experience with devising IAM strategies and implementing IAM solutions for complex enterprise environments with diverse user populations
  • Experience in consulting and communicating with clients at multiple levels of an organization
  • Experience with one or more IAM products, including directories, multi
  • Factor authentication, provisioning tools, and single
  • Sign
  • On tools
  • Knowledge of the engineering life cycle and change management
  • Ability to work with teams and show flexibility towards working for a diverse set of clients
  • Based systems and deploying IAM to Software as a Service solutions
  • Experience with testing
  • Experience with Web development
  • Knowledge of solution protocols, including SSL/TLS, HTTP, SAML, Kerberos, S/MIME, SCIM, and oAuth
53

Manager, Identity & Access Management Resume Examples & Samples

  • Minimum 7+ years of experience supporting or administering packaged or custom IAM solutions
  • Minimum 7+ years professional work experience in a large organization
  • Industry-adopted security certifications preferred (CIAM, CIPA, Security+, etc…)
  • Bachelor degree in a technical field preferred (e.g. Computer Science, CIS,MIS, Engineering)
  • Experience with User Provisioning \ Onboarding, RBAC \ Authorization models, SSO \ Active Directory
  • Proven ability to work in a Global Account Security or Identity Access Management program
  • Experience with Behavioral Analytics tools is a plus
54

Senior Director, Identity & Access Management Resume Examples & Samples

  • Strategic Planning– Develop and maintain a comprehensive vision and strategy of how IAM services can and will be used to accomplish department objectives of protecting our systems and data while facilitating new and existing business models highly dependent on technology
  • Program Management -Manage a large portfolio of IAM operational services and the pipeline of projects/tasks to create, evolve, and change them as needed. Various peers and partners will provide support from the Information Security and Risk Management (ISRM) and Enterprise Technology Services (ETS) organizationsincluding risk management alignment, project management, financial planning, and human resources
  • Operations– Build and lead a team (15-20 staff?) that delivers business critical control sets including
  • 8 + years cybersecurity/information security experience including 4+ years managerial experience
  • Minimum of 8 years’ experience in IAM services, security engineering, other IT, and/or technical risk management
  • Deep technical understanding of IAM and service lifecycles including capacity planning and change management
  • Strong management skills planning, organizing, leading, and measuring service driven teams
  • Strong interpersonal and communications skills to build/ maintain ongoing business relationships
  • Experience with compliance regulations/laws, security frameworks and standards (e.g., NIST, HIPAA, ISO, COBIT, OWASP, ITIL, etc.)
  • Ability to exercise and mentor others on good professional judgment and security-related ethics
  • Knowledge of the healthcare, distribution, or software industries is a plus
  • Experience with law enforcement, defense, or intelligence community a plus
  • OSCP, SANS/GIAC, CISSP or other similar professional certifications are a plus
55

Director of Identity & Access Management Resume Examples & Samples

  • Managing multi-functional teams responsible for service delivery
  • Strategic direction for Microsoft IT’s Identity and Access services
  • Lead direction, discussions, and decisions on end to end lifecycle management products and services
  • Identify service improvements and develop and design tools that will streamline the service to improve end-user experiences and lower operating costs
  • Understand the business and define what is technically needed to meet strategic objectives and the day-to-day running of the service. This includes identification and innovation of new service capabilities that meets customer and security requirements
  • Provide technical leadership to a cross functional operations team
  • Initiate and provide on-going technical leadership for projects within the team and department-wide as appropriate
  • Work closely with engineering groups providing feedback on pre-released software, and driving improvements into their products and services
  • Collaborate with other service teams to assist in solving their service problems when related to your services
  • Evaluate service feature requests, assist in prioritization, and analyze them for impact to operations and delivery cost
  • Communicate on a deeply technical level with product engineering and operations teams to improve and optimize both the product and the infrastructure
  • Provide recommendations and guide engineering and operations counterparts through technology adaptation stages of engineering and pilot deployment including but not limited to
  • Future technology
  • Product Group perspective
  • Complex business case/risk analysis for technology adoption/retirement
  • Maintaining working relationships with product group contacts, other business partners, and cross-company stakeholders
  • Development of technology solutions that satisfy and meet security requirements
  • Proof of concept technology analyses and production pilots
  • Technology solutions that satisfy & complement the business capabilities and requirements
  • Changing market conditions
  • Worldwide legal and regulatory requirements
  • Advances in technology
  • Lifecycle management
  • Technology standards
  • Business architecture requirements
  • 10-15 years’ experience in the IT industry with solid experience in security, systems engineering design and operational support roles interfacing with customers
  • Proficient understanding of Microsoft products, software lifecycle methodology. Moderate to deep knowledge of Identity Products
  • Previous experience deploying IT, Security or related solutions
  • Practical experience with ITIL/MOF - PMI/PMP is a plus
  • Strong problem resolution, judgment, communication and decision making skills
  • PowerShell, C++ Ability to adapt to a changing, fast-paced, team environment and multi-task assignments
  • Ability to approach problems with a sense of ownership, enthusiasm and innovation (out-of-the-box thinking)
  • Excellent judgment, decision-making skills, and the ability to work under continual deadline pressure when the situation is ambiguous
  • Track record of leading technical teams across stages of service development and delivery using agile methods
  • Demonstrate strong prioritization, time management and organizational skills
56

IdM / Identity & Access Management SME Resume Examples & Samples

  • Possess an active Secret clearance, or have a security clearance in process
  • Have demonstrable strong knowledge of US Government ICAM
  • Have experience working across multi-disciplinary Enterprise environments
  • Have experience with Active Directory Authentication, Enterprise Single Sign-on, Public Key Infrastructure, SAML, SSH, Radius, LDAP
  • Have experience with software development in multiple languages
  • Have web development experience
  • Have an interest in identity management and access management in the enterprise and evolving standards
57

Identity & Access Management Lead NC Resume Examples & Samples

  • Define, develop, and enforce the IAM control framework
  • Ensure adherence to ISO standards and active involvement in process enhancement and development
  • Documentation creation, update, and maintenance (including process documents, user guides and procedures)
  • Identification of control gaps and recommended remediation and improvements for User Transfer and Exit process
  • Assistance in user re-certifications, reconciliations, system profile review, third party applications validation and other IAM related reviews
  • Liaise with IT Security groups worldwide
58

Manager, IT Identity & Access Management Resume Examples & Samples

  • Manage the implementation of standards and process for access enforcement and access governance across the enterprise
  • Real world experience with IDM platforms and authentication technologies such as SAML, LDAP, SPML, OAuth, WS-Federation, Kerboros, NTLM, Sales Force Identity, and Azure Active Directory
  • BS or higher degree in Computer science, Information Security, or equivalent experience
  • 5+ years of professional experience in IT security, compliance and risk management, including privacy, data protection, security controls, etc
59

Manager, Identity & Access Management Resume Examples & Samples

  • Develops and applies policies impacting business methods and integrated security restrictions, weighing complex requirements form the business with industry best practices for security
  • Identifies, evaluates and develops opportunities for process improvement, training and awareness materials to educate users on security policies and practices
  • Implements department policies and procedures; reviews for relevance and monitors associates to ensure compliance
  • Ensures team members maintain necessary documentation for assigned systems, projects and tasks
  • Defines entitlement requirements for application security
  • Supports the implementation of applications
  • Analyzes application security to ensure standard or preferred methods are followed
  • Acts as intermediary and facilitator to help resolve ongoing and/or complex technical issues
  • Creates team goals that align with the Information Technology (IT) and IT Security strategies
  • Manages the daily workload and distributes assignments to associates based on varying skill sets and abilities
  • Supervises project work by team
  • Plans, assigns, monitors, reviews, evaluates and leads the work of associates
  • Coaches and mentors subordinates, identifies training needs and recommends development programs
  • Minimum of a Bachelor’s degree in Computer Science, MIS or related degree and seven (7) years of related experience including leadership or management experience or a combination of training, education and experience
  • Experience in operational task fulfillment, business process improvement and improving operational efficiency
  • Knowledge of Identity and Access Management (IAM) best practices
  • Experience in project management, enterprise implementation, strategic planning, business acumen and change management
  • Financial services industry experiences a plus
  • CISSP certification or ability to obtain within agreed upon timeframe
  • Provides feedback, empowerment and coaching to help others excel in current and future job responsibilities
  • Builds strategic partnerships within the organization to collaboratively execute business goals
  • Interacts with others in a way that promotes openness & trust and gives confidence in one’s intentions
60

Manager of Identity & Access Management Resume Examples & Samples

  • Bachelor’s degree in computer science, electrical engineering, and business administration or other relevant field, or equivalent experience
  • 5-7+ years' managing IT personnel, systems, and platforms
  • Familiar with ITSM operations, technologies, and processes
  • Extensive experience and expertise working in customer-service focused organizations
  • Proven experience in IT leadership, planning, organization, and development
  • 5+ years proven experience with implementing and managing an enterprise Identity and Access Management Solution/Suite
  • Master’s degree in computer science, electrical engineering, and business administration or other relevant field, or equivalent experience
  • 10+ years managing IT personnel, systems, and platforms
  • 5 + years’ experience in strategic planning, execution, policy development and ITIL or ITSM
  • 5 + years’ experience working in the Retail industry preferred
  • Minimum of 5+ years of Identity/Access Management technical experience (process design, implementation, support)
  • Experience working with 3rd party suppliers and/or managing outsourced resources
  • CISM or CISSP
  • Knowledge of IBM and Microsoft security tools/processes
  • Comfortable working across geographies and a variety of national and corporate cultures
  • Excellent organization and planning, proven management/supervisory, and communication skills
  • Exceptional service orientation
  • Superior analytical, evaluative, and problem-solving abilities and comfort with ambiguity
  • Ability to motivate in a team-oriented, collaborative environment
  • Ability to serve as a catalyst for change in the organization
  • Ability to set and manage priorities independently
  • Excellent written and oral communication and listening skills
  • Strong aptitude and proven ability for developing professionals and future leaders
  • Ability to articulate ideas to both technical and non-technical addressees
61

Identity & Access Management Specialist Resume Examples & Samples

  • Maintains a good understanding of IAM service offerings
  • Establishes and maintains good working relationships with all IAM customers
  • Captures customer objectives and develops support strategies that map to IAM service offerings
  • Measures and reports on value delivered to customers
  • Advocates for new/enhanced IAM services on behalf of customers
  • Contributes requirements to technology selection process
  • Serves as technical resource on select IAM initiatives
  • Adhering to all policies, rules, regulations, and procedures
  • Performing other duties or functions as requested by management
62

Identity & Access Management Expert Resume Examples & Samples

  • Ensure that business requirements & IT solutions meet GRC security requirements providing guidance and professional input for security architecture, process change, standardization and harmonization
  • Own and update GRC related process documentation (SoD matrix, role catalogue)
  • Develop GRC regulations (SoD management regulation)
  • Develop Cyber Risk & Compliance under the umbrella of Identity & Access Management Programme of MOL Group with a special focus on Segregation of Duty compliance covering business critical applications
  • Run enterprise wide Entitlement Review process (mini projects with ) for business critical applications (special focus on MOL Nyrt ’Office environment’, in 2017 run trial within ’industrial environment&#8217
  • Mediate between IT and the business functions in order to harmonise the IT solution with the business and security requirements ensuring that IT solution meets the GRC security requirements
  • Support Cyber compliance activities
  • University / college degree in Computer Science, Engineering or related field
  • Thorough understanding of security principles, practices and standards and how they translate into real world process solutions
  • Ability to communicate the essence of SoD & GRC concepts both at high level as well as on technical level
  • 5+ years of progressive experience in the information security industry covering identity & access management area
  • Ideal candidate have ERP & project management background
  • Information security industry recognized certifications from relevant certification bodies: Offensive Security, GIAC, EC-Council, ISECOM, (ISC)2, etc
  • Excellent English communication skills (written and oral)
  • Driving licence (desired)
63

Manager, Identity & Access Management Resume Examples & Samples

  • Manages the strategy and roadmap implementation for Identity and Access Management Platform Tools
  • Identify and implement process enhancements utilizing different tools and methodologies
  • Owner of the Application Onboarding Process for bringing applications in the IAM space for administration & access governance
  • Owner of the annual SOX Access Review certification
  • Responsible for the continuous improvement of the RBAC Program
  • Develop reporting metrics for team in order to monitor productivity and quality
  • Evaluate new and proposed IAM technologies
  • Liaison to business and technology partners and act as an IAM advocate for strategic projects
  • Accountable for meeting increasingly rigorous compliance requirements
  • Responsible for risk detection and remediation
  • Identifies, evaluates and develops opportunities for training and awareness materials to educate users on security policies and practices
  • Implements department procedures; reviews for relevance and monitors associates to ensure compliance
  • Minimum of a Bachelor’s degree in Computer Science, MIS or related degree and seven (7) years of relevant experience including leadership or management experience or a combination of training, education and experience
  • Strong understanding of current IAM technologies with an interest in emerging technologies
  • Solid understanding of Identity Lifecycle, SSO, authentication models, and security concepts
  • Experience in project management, enterprise implementation, strategic planning, business acumen, and change management
  • Strong Relationship & Collaboration skills
64

Identity & Access Management Consultants Resume Examples & Samples

  • You must have an IT consulting background with at least 1 year of working experience in project management and/or delivery
  • 2+ years of expertise of Identity and Access Management
  • Degree majoring in Computer Science, IT or Electrical Engineering – M.Sc./civ.ing. preferred, with excellent academic record
  • Experience from project management and/or work in team-oriented environments
  • Relevant consulting, communication and interpersonal skills
65

Intern, Identity Access Management Resume Examples & Samples

  • Exposure to a wide variety of IDM/IAM responsbilities
  • Areas you may be exposed to are CyberArk, ServiceNow development, SecureID, to name a few
  • Conduct research related to ESI and its clients
  • Perform data analysis and assist in data reporting as needed
  • Makes or assists in making oral or written presentations to management
  • Collaborate with other functional areas on various projects as needed
  • Full-time student in an accredited 4 year college, graduate program or Pharm. D. Program; Preference given to students with 3.0 GPA or above
  • Motivated self-starter; Excellent verbal and written communication skills; Attention to detail; Excellent analytical skills; Creative and resourceful; Strong business aptitude; Knowledge of the PBM or healthcare industry preferred; Dates of Internship are May 14th-Aug 3rd, 2017; Students must be available to work M-F 8am-5pm during this time frame
66

Identity & Access Management Specialist Resume Examples & Samples

  • You should have a Bachelor's degree in Computer Science, Engineering, or equivalent experience
  • You should be able to translate business needs into technical requirements that can be implemented on the identity and access management platform
  • You should be experienced with PowerShell or any other scripting language
  • You should have a methodical approach to problem solving and troubleshooting
  • You should have previous experience with Dell Quest ActiveRoles server is advantageous
  • You should have knowledge and experience with Microsoft Active Directory is desirable
67

Manager, Identity & Access Management Resume Examples & Samples

  • Manage the work direction and resource needs for Identity & Access Management (IAM). Determine, manage and track budget and staffing needs for these divisions. Define team goals and manage performance to meet those goals
  • Define, publish and maintain a strategic plan for assigned business areas. Manage activities relative to the day-to-day operations of access control and authentication; determine business and technical requirements for account requests and provisioning efforts. Serve as key respondent and facilitator for internal and external security events and incidents
  • Manage identity and access management support to business and technical teams in the design of standardized products and customized solutions
  • Stay abreast of industry and technology trends and best practices to advise leadership and direct teams on when to innovate and when to use traditional approaches. Maintain awareness of current and potential threats and risks for security related information protection
  • Develop and maintain a working relationship with 3rd Party service providers. Work with business unit executives and service providers to introduce required Cyber Security functionalities into the environment
68

Identity & Access Management Specialist Resume Examples & Samples

  • Function as a subject matter expert for successful design and implementation of IAM solutions in a complex environment
  • Act as a liaison to business, technology and project management partners and act as an IAM advocate for technology initiatives
  • Conduct maturity assessments and technology gap analysis for the IAM program
  • Look for ways to optimize IAM processes and recommend opportunities and solutions for improvement, automation and streamlined integration
  • Provide implementation leadership for IAM procedures and products
  • Evaluate new and proposed IAM systems and technologies
  • Ensure adherence to compliance regulations and policies
  • Collaborate with IT, Audit, and other oversight teams to understand and remedy audit findings
  • Analysis of requests for potential risk before action
  • Answer general inquiries regarding information security practice or security access
  • Make recommendations for implementing desired level of access controls
  • Assist in implementing action plans to address system access issues
  • Follow process and procedures to ensure compliance with policy
  • Develop reporting methods and ensure that metrics are captured and reported for the team, in order to monitor productivity and quality of service
  • Identify, define/approve and implement continuous process enhancements/improvements utilizing various tools and methodologies (i.e. creation of automation scripts)
  • Provide metrics in order to monitor productivity and quality of service
  • Recommend procedural changes to enhance the functionality of Identity Access Management Team
  • A passion for and deep understanding of technology risk and information security
  • Bachelor's or Master's degree in Information Systems, Computer Science, Engineering or equivalent work experience
  • Experience in risk management, including privacy, data protectin, security controls, etc
  • Demonstrated understanding in formulating strategies, alternatives and recommendations in information security management
  • Knowledge of industry regulatory environment and risk management practices
  • Demonstrated ability to think critically about risks and clearly articulate prevention and detection mechanisms to key partners
  • Analytical, problem solving and organizational skills with a focused attention to detail
  • Verbal and written communication skills, including the ability to effectively lead discussions and meetings
69

Deloitte, Identity & Access Management Resume Examples & Samples

  • Service management for our CyberArk managed service
  • Provide system security advice and reporting to senior management, system staff and users
  • Acting as an escalation point for the Security Analysts in event of a major security Incident
  • Run a continual service improvement program for the managed service
  • Serve as liaison with various customers (internal and external)
  • Produce and present Service line reports to clients
  • Manage business processes and solutions to ensure that Privileged Access Management (PAM) services perform according to defined processes, meet defined policies and comply with applicable information security requirements
  • Communicate to clients and partners aspects of both the product and the PAM service at the technical and functional level appropriate for the situation
  • Post-sales requirements gathering, analysis and documentation
  • Manage operational project scope, schedule, status and documentation
  • Identify opportunities to improve engagement profitability
  • Execute advanced services and supervise staff in delivering basic services
  • An understanding of the leading IAM product CyberArk
  • Experience of the Identity and Access Management industry
  • Understand complex business and information technology management processes
  • A degree in computer science or equivalent is preferred
  • Have excellent oral and written communication skills and be self-motivating
  • Demonstrable experience of security related incidents and work requests
  • Experience of working within a change control and incident management environment
  • Ability to hold at least BPSS national security vetting
  • A proven track record of delivery in a multi-disciplined environment
  • Advanced understanding of business processes, internal control risk management, IT controls and related standards
  • Experience of developing and enhancing information security processes and policies
  • Understanding of IT security fundamentals and systems including Multiple operating systems
  • Client / Server applications, Firewalls, IPS/IDS
  • Malware / Forensic product sets
  • Networking principles and Internet protocols
  • Patch management
  • To qualify for the role you should have one or more of the following certifications or extensive security operations experience
  • CISSP
  • CISM
70

Identity & Access Management Specialist Resume Examples & Samples

  • Configuring, customizing, setting up and deploying of Identity and Web Access suite, as well as performing solution integration activities
  • Participating in project activities including Requirements, Design, Testing, Documentation, Support, Troubleshooting, etc, as needed during the appropriate phases
  • On boarding of applications to the identity and access management platform
  • Implementing and managing access policies on user, group and computer objects
  • Updating existing access management and provisioning workflows
  • Defining and implementing access management workflows as needed to meet business requirements
  • Managing user, group and computer objects in Active Directory
  • Troubleshooting application authentication and authorisation errors
  • Troubleshooting and resolving access management and provisioning workflow errors
  • Ongoing monitoring and optimisation of access policies and workflows
  • Creating and updating access management system documentation
  • Supporting entitlement review processes and co-ordinating access reviews with the appropriate stakeholders
  • Reviewing application access requests and managing the approval process
  • Optimising log management and log reviews relating to IAM events
  • Bachelor's degree in Computer Science, Engineering, or equivalent experience
  • The candidate should be able to translate business needs into technical requirements that can be implemented on the identity and access management platform
  • Directories (Active Directory, LDAP & X500)
  • Web Access Management (Quest Active Roles Server, SiteMinder, Oracle Access Manager, etc.)
  • Single Sign-on and Federation (SAML 2.0, ADFS, OAuth 2.0, Kerberos, etc.)
  • Privileged Access Management
  • Two-factor Authentication (especially One-Time Password solutions and Certificates on Smart Cards)
  • Adaptive & Device Authentication
  • Identity Management (automated provisioning, de-provisioning, certification, etc.)
  • Public and Private Cloud IAM
  • Windows Security
  • Unix and Linux Security (especially privileged command management)
  • Public Key Infrastructure (PKI)
  • Experience with PowerShell or any other scripting language is a must
  • Excellent written English
  • Methodical approach to problem solving and troubleshooting
  • Previous experience with Dell Quest ActiveRoles server is advantageous
  • Knowledge and experience with Microsoft Active Directory is desirable
71

Identity & Access Management Specialist Resume Examples & Samples

  • Granting/modifying permissions to company systems
  • Working with wide range of IT technologies
  • Processing access related requests based on tickets
  • Participating in innovation and improvement process
  • Position is suitable for fresh graduates
  • Team-player with good communication and interpersonal skills
  • General overview of IT technologies
  • Responsible and reliable
  • Interested in innovation and improvements
72

Identity Access Management Lead Resume Examples & Samples

  • 7+ years IT Risk experience, including 3+ years experience with Technology Audit functions
  • 3+ years experience with project management processes; including project planning, issue management, risk management, resource tracking and management score-carding
  • 3+ years experience with Operating System Security and Distributed Security
  • Broad technical knowledge across Identity &Access Management (IAM) is required; Data Protection & Privacy disciplines are a plus
  • Must have a high degree of technical expertise to interface with technology stakeholders and recommend IAM based process improvements
  • Strong analytical and problem solving skills are required
  • Knowledge of key Identity and Access Administration functions and toolsets, including on-boarding, certification, termination, and entitlements management
  • Strong knowledge of technology risk management and industry best practices
  • Strong written and verbal presentation skills to a wide variety of senior managers across the organization and proven track record of influencing and leadership skills
  • Proficient experience with MS Excel and Access is required
  • CISSP, CISA or CRISC certifications a plus
  • Experience with ACF2 is a plus
73

Identity & Access Management Manager Resume Examples & Samples

  • Responsible for user account provisioning and de-provisioning of business applications, authentication sources, and data stores
  • Lead evolution and maturation of identity management initiatives including onboarding and tuning new and existing applications and processes
  • Partner with business units to define roles, entitlements, and potential separation of duty violations across managed application and data stores
  • Monitor request and ticketing queues to ensure approved modifications are performed timely and accurately
  • Analyze audit findings and implement corrective actions
  • Oversee management and support of IAM tools
  • Supervise IAM team; including coaching, staff development, performance reviews, and other personnel matters
  • Prepare reports and artifacts for internal and external audits
  • Takes personal initiative and is a positive example for others to emulate
  • Embraces our vision to become "The World's Greatest Bank."
  • Bachelor's Degree in Information Systems, Computer Science is preferred
  • Certification in CISM, CISSP, Security+, GSEC is preferred
  • 5 - 8 years User provisioning, Active Directory, banking applications, IT Security
  • 1 - 3 years Managing day to day activities of staff, balancing demands and prioritizing tasks
  • Experience managing Active Directory accounts and groups in a multi-domain environment
  • Experience managing access to enterprise applications using the principle of least privilege
  • Ability to consistently create and follow detailed procedures and workflows
  • Demonstrate excellent customer service and communication skills
  • Extensive analytical, problem solving, and organizational skills with a focused attention to detail
  • Experience internal audit concepts and regulatory requirements (e.g. SOX, GLBA, etc.)
74

Acting Director, Identity & Access Management Resume Examples & Samples

  • Provides leadership and overall direction to site resources and/or remote resources in order to fulfill the customer deliverables
  • Ensures that all resources have and utilize the necessary information, standards, methodologies & business processes to effectively and proactively meet the needs of our customers
  • Understands the overall university’s services delivery model and builds effective working relationships with others both within and outside of the university
  • Establishes and manages effective governance over all business project and enhancement work to drive quality delivery and lessons learned
  • Forecasts and reports staffing demands to applicable leadership
  • Establishes quality deliverables and measurements to monitor our delivery
  • Provides supervisory tasks for site staff supporting end-to-end delivery at customer site
  • Represents to the customer (internal or external) and manages the execution of all IAM service management processes
  • Provides performance review input to applicable management for team members to improve performance of the team and development of the staff
  • Ensures services are optimized for an effective cost model and to achieve customer satisfaction while managing to contractual scope
  • Ensures timely, effective communication across teams as well
  • Works with business owners, internal IT team, product and consulting vendors
  • The individual in this role must be able to function effectively with a high degree of independence and minimal direct supervision
75

Director, Identity Access Management Resume Examples & Samples

  • Foundational knowledge of Identity Management technologies such as SailPoint, PingID, CA Identity Suite
  • Participate in the definition and leading technical programs that support the TP&S security strategy and architecture for security services, mechanisms and safeguards for a broad reaching information security program
  • Work in active partnership with stakeholders (Office of the Global CISO, TP&S and Architecture teams, Policy and Compliance Organizations, Network Engineering Organization, and the Business| parallel technical teams) to understand often unique business requirements and develop supporting security domain expertise and technical objectives that will enable the growth and evolution of Comcast's CyberSecurity Identity Management program
  • Ensure that operational and incident trends and observations are considered with regard to the evolution of the company's enterprise security architecture capabilities
  • Communicate and work through conceptual design (CCD-HLD) and (SLD) system level design to design in compensating controls, increase visibility/telemetry and IR capabilities
  • Design and evaluate platforms and structure for integrating diverse security toolsets and technologies
  • Provide consulting functions to address IDM and Access Management posture
  • Promote a consistent risk vocabulary for application risk and controls and align that vocabulary with related compliance and business risk disciplines within the organization
  • Develop metrics that demonstrate current technology implementation roadmaps, indicators of progress, and alignment across teams for those activities
  • Support other senior leaders in Information Risk Management in leveraging those metrics as part of the overarching risk and operational dashboard
  • Formally and informally respond to customer and regulatory requests with regard to IDM security services, mechanisms and safeguards
  • Specific experience managing projects / programs from concept through implementation (supporting oversight processes) using a structured project management methodology across the entire project life cycle yet not a project manager per se
  • Industry-specific certifications, including two or more of the following: C|CISO, CISSP, CISA, CISM, ISSACA
76

Identity & Access Management Lead Resume Examples & Samples

  • Bachelor’s Degree in Information Technology, Information Systems Security, Cybersecurity, or related field
  • 2+ years of relevant consulting or industry experience
  • Proven experience effectively prioritizing workload to meet deadlines and work objectives
  • Experience in one or more of the following Identity Management areas
  • Single Sign On
  • Identity Federation
  • Logical Access Control systems and Enterprise Directory Architecture and Design including directory schema
  • Knowledge of Identity & Access Governance including Role based access control, access request and certification
  • Ability to perform requirements fit/gap analysis
  • Develops, maintains, and documents Identity Management standards and processes
  • Monitors compliance to identity requirements and policies
77

Director, Identity & Access Management Resume Examples & Samples

  • Supports the implementation of Company programs, procedures, methods and practices to promote Starbucks key messages and achieve a competitive advantage
  • Develops annual budgets and programs, including partner training and awareness; investigations; policies, standards, procedures; and security technology
  • Evaluates and presents level of information and data security risks
  • Evaluates the effectiveness of security policies, standards, technical controls, procedures and other internal controls and makes appropriate improvements
  • Provides consulting services, such as security risk assessments for pre- and post-systems implementation
  • Leading information security policy, standards and controls development and integration in a high-growth company (8 years)
  • Experience with collaborative work environments and ability to influence decisions across functional areas (5 years)
  • Leading and getting results from cross-functional work groups of managers and above (4 years)
  • Knowledge of information security "best practices", such as ISO/IEC 17799 and ISF The Standard of Good Practice for Information Security
  • Progressive experience in leading within an information security progrmam, leading information security policy, standards and controls development and integration in a high-growth company
  • Progressive leadership experience in a large organization
  • Ability to apply sound business principles and practices to project management and change management processes
  • Effective management and supervisory skills, including planning, organizing, developing and monitoring partner performance
  • Negotiation and conflict management skills
  • Ability to understand and incorporate technology trends into designs and plans
  • Advanced knowledge of system architecture and design principles, practices and enabling tools
  • Ability to advise and influence executive management regarding security best practices, security risk analysis and security risk mitigation
78

BA With Identity & Access Management Resume Examples & Samples

  • Support the Program Lead and Program Manager to ensure the business requirements are executed efficiently and effectively in the multiple technology implementations
  • Collaborate with internal and external subject matter experts, system users, and stakeholders to understand and document existing and proposed business processes, requirements, and system needs
  • Closely partner with stakeholders throughout the process to ensure ongoing alignment and participation throughout the agile process
  • Effectively facilitate solutions and requirements gathering sessions with individuals and large groups
  • Produce effective documentation to capture and communicate business process and requirements in the format of business process flow diagrams, data flow diagrams, data definition documents, decision trees, logic diagrams, requirements documents, and user experience flows
  • Translate requirements and system needs into effective customer experiences
  • Work within an agile environment performing grooming work to craft effective user stories, and then partnering with the team during delivery of the stories to ensure stories are accurately implemented
  • Effectively manage projects / initiatives from inception through implementation
  • Minimum 5 years of previous experience with data collection methodologies and quantitative analysis
  • Experience with implementing Identity & Access Management programs
  • Critical thinker with an ability to analyze information and to evaluate the implications of a course of action or strategy
  • Expert knowledge of Excel including use of pivot tables and macros
  • Bachelor's Degree in business or engineering or similar quantitative field
  • Strong problem solving and issue resolution skills
  • Experience with large data sets and modeling
  • Highly skilled in Excel; familiarity with SQL, Access, or other big data software experience with statistical models in a professional setting a plus
  • Proficient at collecting and mining data from different sources using technologies like SQL
  • Ability to organize, analyze and interpret data to explain complex irregularities or trends
  • Self-motivated and creative problem-solver
  • Must be comfortable with unstructured, fast moving and constantly evolving environment
79

Identity & Access Management Resume Examples & Samples

  • Ability to work well with large and diverse teams
  • Experience creating work breakdown structure (WBS) - translate requirements into tasks
  • Experience with task scheduling and resource assignment
  • Experience with project management practices and tools to create, manage, and track project performance, cost, verify scope
  • Solid organizational skills including attention to detail and multitasking skills
  • Experienced user of MS Office toolset (Project, Word, Excel and PowerPoint)
80

Identity & Access Management Resume Examples & Samples

  • At least two years proven IT experience including IT Security Administration
  • Background and practical experience with at least one of the following development environments / languages: J2EE, Java, JavaScript
  • Good understanding of database administration
  • Ability to adapt to changing business requirements
  • Ability to balance customer service and regulatory needs
  • Background and practical experience with infrastructure Systems (Windows, UNIX, Linux)
  • Good experience with IBM ISIM product
  • Good understanding of database management (DB2, Oracle, Microsoft SQL Server)
  • Good understanding of directory services
  • Good understanding of network technologies
  • Great Communications Skills, both verbal and in writing
  • Ability to work both independently at customer's sites and in a team
  • Ability to efficiently acquire and utilize new skills in response to a change
81

Identity & Access Management Specialist Resume Examples & Samples

  • 2nd & 3rd Level Customer support IDM & PKI
  • Coordination and control of the Security IDM &PKI Services
  • Reporting and supervision, quality control of all tasks
  • Requests approved and submitted in a DXC standard ticketing system
  • Create, modify and disable/delete user access based on approved process
  • Order Processing IDM & PKI
  • Give Advice on Topics covered by Identity Management and PKI Service Unit
  • Health Checks
  • System Monitoring & Diagnostic
  • Handling workflow tool based incidents
  • Issue coordination and Incident documentation
  • Strong knowledge of Active Directory structure and management
  • Experience with PKI-related technologies (encryption, signature, authentication, smartcards, protocols, standards)
  • Experienced with Windows Server OS (Linux/Unix experience will be considered an advantage)
  • Experienced with technologies WLAN, TCP/IP, Firewall Rules, Network Routing
  • Experienced with technologies for SMS Authentication, One Time Passwords
  • Knowledge of Share and NTFS permissions management
  • Knowledge of Identity Management and corresponding processes and technologies
  • Knowledge of Privileged Identity Management solutions such as CyberArk will be considered an advantage
  • Knowledge of ITIL
  • Knowledge of basic Information Security principles
  • Troubleshooting for Remote Access Technologies
82

Director of Identity & Access Management Resume Examples & Samples

  • Enhance User Experience: To simplify and improve user access to applications and information inside and outside of the City of Boston
  • Reduced Administrative Overhead: Minimize the duplication of effort through streamlined application provisioning and empower users to engage self-service functionality over the Service Desk
  • Protect City Resources: Improve the security posture of the City of Boston through effective and efficient identity lifecycle management, access control and account auditing
  • Working directly with the City’s project team and implementation partner in a multi-disciplined team structure, designing and implementing IAM solutions across a variety of vendor products including SailPoint, Ping Identity and Radiant Logic
  • Serve as the key technical resource for the Identity and Access Management (IAM) team
  • Directly supervise the work of the IAM Systems Administrator
  • Developing deep working relationships with Senior Executives and Senior Managers across the City
  • Serve as a trusted adviser to the project stakeholders and understand their core business processes and business priorities which can be enhanced using IAM solutions
  • Supporting end-user communication and training
  • Leading technical discussions with Sr. Managers, Executives, and Stakeholders
  • Contribute and review solution design: ensure innovation, security, and business requirements are met, while also keeping a keen eye on improving the end users’ experience with technology
  • Define an IAM enterprise strategy, with a roadmap of key deliverables and timelines, and deliver consistently
  • Mentor other members of the team on IAM best practices
  • Perform related work as required
  • Applicant must possess at least four (4) years of full time, or equivalent part time, professional information security experience. A bachelor's degree in business, IT systems, computer science or a related field is highly preferred and may be substituted for two (2) years of the required experience
  • CISSP or CISM certification preferred
  • Working knowledge and/or experience implementing IAM solutions such as SailPoint, Ping Identity and Radiant Logic highly preferred
  • Directory services and database skills (specifically SQL) preferred. Understanding of Networking/Security and Identity Management development
  • Candidate must have demonstrated knowledge and experience with best practices in identity and access management
  • Public sector experience is highly preferred
  • A strong candidate has excellent technical, personal and team management skills
  • Applicant must have strong written and oral communication skills and have demonstrated an ability to work effectively in a team environment
  • Ability to exercise good judgment and focus on detail as required by the job
83

Identity & Access Management Resume Examples & Samples

  • Bachelor's degree, preferably in Computer Science, Information Technology, Computer Engineering, or related IT discipline; or equivalent experience
  • Experience is required in one or more of the following areas: IBM Security Identity Management, IBM Security Access Management, Role Based Access Control, Tivoli Federated Identity Management
  • Strong understanding of IBM Security Identity Manager
  • Experience of installing, configuring and upgrading/migrating IBM Security IAM solution components
  • 5 years + experience using Java, JavaScript, XML, DSML
  • Keen interest in providing best practice solutions for overall IAM strategy
  • Knowledge of basic security concepts (encryption using keys, SSL, HTTPS)
  • Experience in performance tuning and problem determination
  • Willingness to travel up to 20%
  • Must be willing to live and work in the Orlando, FL area
84

Identity & Access Management Specialist Resume Examples & Samples

  • Technical architect for IAM solution design and deployment across the enterprise with exposure to Mainframe, AD and UNIX environments
  • End to end IAM solutions and services for user lifecycle management (provisioning / de-provisioning), access recertification, and user authentication/authorization
  • Hands on experience using SailPoint & CyberArk suites
  • Configure, Administer & Design experience in areas like: Identity Management, Access Governance, Access Management, Advanced Authentication, Privileged Access Management, Directory Services, Federated Authentication and Identity Management
  • 7 - 8 years proven experience in IAM which includes technology implementation, upgrades, migration, replacement and architecting. Minimum IAM consulting experience of 2 years
  • Excellent understanding of RBAC
  • Excellent documentation, communication and interpersonal skills
  • Exposure and understanding of role & Entitlement Management, Enterprise & Mobile SSO, Virtual Directory, OAUTH, OpenID Connect, XACML, JSON, REST, SOAP
  • Security certifications such as CISSP and IAM product vendor certifications are desired
  • Bachelor’s degree in Technology/Computer Science/Information Systems
  • Competency with spreadsheets, word processing and database software and/or business systems (Word, Access, Excel, PowerPoint)
85

Manager Identity & Access Management Resume Examples & Samples

  • Performs management responsibilities to include, but are not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity
  • Assures compliance to Corporate and Information Security policies, standards and procedures
  • Champion all aspects of the IAM Program, including the business value, ownership of the roadmap, project milestones and key messaging to business and IT
  • Work with various stakeholders and vendors to deliver and promote the IAM program and roadmap in a phased and iterative approach
  • Work to understand the IT enterprise architecture and communicate with architecture teams to ensure that IAM security standards are created and adopted into the Enterprise Architecture frameworks. This role will provide extensive and effective oversight of the enterprise’s IAM security solutions and operations through management of internal and external resources
  • Participate in solution architecture design; lead security efforts assisting with the integration and initial implementation of IAM solutions
  • Run an IT technology P&L (Profit and Loss) for his or her products or services (i.e. distributed computing)
  • Provide expertise and guidance as the SLA (Service Level Agreement) and budgeting process is completed for his or her products
  • Gains understanding of customer needs and adapt product strategies to meet their expectations
  • Bachelor’s Degree - Information Security, Information Systems, Information Assurance, Computer Science or related field
  • 7-10 years' experience in Information Security and/or Information Risk Management and/or Information Technology
  • 1-3 years' experience in mentoring others in a leadership role
  • 7-10 years’ experience in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences
  • 1-3 years' experience in developing and executing strategic plans to realize business objectives
  • 10 - 15 years' experience in Information Security and/or Information Risk Management and/or Information Technology
  • Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework
  • Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits
  • Experience establishing budgets and meeting fiduciary goals
  • Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.)
  • Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
  • Ability to motivate high performance, multi-discipline teams
  • Strong experience with roles based access control (RBAC) definitions based agile business application software deployments
  • Expert at risk and IAM program compliance and reporting. Experience with working hand in hand with internal and external audit partners
  • Experience with IAM data model, data warehousing concepts and new IAM frameworks such as OAuth/OpenID Connect, OATH, SCIM, CASB (Cloud Access Security Broker, i.e. CloudLock), IDaaS (e.g. Okta, OneLogin) tool sets
  • Experience with continuous delivery and implementation concepts (CI/CD)
86

Identity & Access Management Lead Resume Examples & Samples

  • Function as a subject matter expert for successful design and implementation of Identify Access Management solutions
  • Act as a liaison to business, technology and project management in support of IAM technology initiatives
  • Optimize IAM processes and recommend solutions for improvement, automation and streamlined integration
  • Manage activities relative to the day-to-day operations of access control and authentication; determine business and technical requirements for account requests and provisioning efforts
  • Serve as key respondent and facilitator for internal and external security events and incidents
  • Review security violation reports and investigate possible security exceptions, updates, and maintain and document security controls
  • Make recommendations and assist in the implementation of changes to work methods and procedures to make them more effective or to strengthen security measures
  • Recommend processes and methods for auditing and addressing non-compliance to information security standards; facilitate migration of non-compliant environments to compliant environments
  • Identify potential areas where existing data security policies and procedures require change, or where new ones need to be developed, especially regarding future business expansion
  • Research, design, and advocate new technologies, architectures and security products that will support security requirements for the enterprise and its customers, business partners, and vendors
  • Assist in providing management with risk assessments and security briefings and advise them of critical issues that may affect customer or corporate security objectives
  • Periodically test and evaluate Information Security controls and techniques to assure compliance with policies. Coordinate the use of external resources involved in the performance of security testing, i.e. penetration tests, vulnerability scans
  • Develop business-relevant metrics to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation and increase the maturity of the security program
  • Assist in the development and implementation of a company-wide Information Security training program to assure the organization’s workforce is knowledgeable of Information Security policies, practices and relevant guidance appropriate to their role in the organization
  • Duties, responsibilities and activities may be assigned or changed from time to time
  • Bachelor’s degree in Computer Science, Information Systems (or related degree), or equivalent experience
  • 4+ years working knowledge of network switches, routers, firewalls, load balancers required
  • Demonstrated understanding of modern Identity & Access Management concepts and best practices
  • Strong technical knowledge required, including security operations, engineering and cyber security, endpoint protection, governance, risk and compliance, and identity management
  • Strong understanding of systems including but not limited to Windows, Unix, Linux and Virtualization technologies. Knowledge of iSeries and Cloud service technologies a plus
  • Working knowledge of Microsoft Word, Project, Excel, Access, and Visio
  • Ability to think strategically and evaluate options in the short, medium and long term
  • Ability to cope in a technically complex and fast-changing environment and to respond calmly and rationally to changing aspirations in a deadline-driven situation
  • Strong planning and organizing skills including the ability to manage several work streams simultaneously
  • Excellent communication skills with a capacity to present, discuss and explain issues coherently and logically both in writing and verbally
  • Good influencing and persuasion skills with the ability to enthuse and inspire multidisciplinary teams and build successful relationships at all levels
  • Clear decision-making ability with the facility to judge complex situations and assess when to escalate issues
  • Must be detail oriented, outgoing, can balance conflicting and changing demands through prioritization and a pragmatic approach working with all levels of corporate personnel
  • Ability to manage multiple priorities as well as flexibility to adapt to change with new systems and methods while working in a team environment
  • CISSP, CISA, and/or related certifications are preferred
  • Flexibility to travel when required
87

Identity & Access Management Tool Rationalization Lead Resume Examples & Samples

  • Partner with Enterprise Architecture to clearly identify strategic IAM tools and for each IAM discipline
  • Coordinate efforts to turn down systems / process and tools that are deemed divest by transitioning those dependent on those systems to strategic solutions and/or finding alternate methods to meet their business needs
  • Broker the conversations, foster consensus and provide leadership to drive this most important function forward
  • Prepares and disseminates presentations, roadmaps, metrics, and other information describing the current and future of the IAM tool rationalization
  • Promptly responds to all inquiries and communicates evaluations and solutions in a timely manner
  • Effectively manages the vendors and partner with sourcing and procurement teams as necessary
  • Bachelor’s degree required, Masters or other post graduate degree a plus
  • Experience managing technical engineering teams in the Identity and Access Management discipline
  • Knowledge and hands-on experience in CA Administration, CA Identity Manager, Single Sign On, SAML, Federation PKI, SecureID , or other tokens ARCOT RiskFort & WebFort support knowledge preferred but not required
  • Experience working and troubleshooting in complex distributed global systems
  • Expertise in Microsoft Office Suite (Outlook, Word, Excel, PowerPoint) in the preparation of executive level reporting and metrics
  • Passionate, positive, and driven attitude
  • Excellent communication (written and verbal) and interpersonal skills is able to articulate to non-technical and technical audiences
  • Reliable time management and organization skills
  • Conscientiously practices continuous improvement of processes
  • Demonstrates effective management of multiple concurrent projects with high attention to detail
  • CA SSO (SiteMinder) CA Arcot RiskFort & WebFort Products
  • Five or more years developing and supporting security solutions for Identity Management and Access control. SSO, LDAP and Federation experience including system architecture, configuration, monitoring, and ongoing compliance
  • Two or more years supporting application integrations with CA SSO (SiteMinder) including SSO architecture, configuration, monitoring, and compliance
  • Experience with the following: web servers: IIS, Apache, or IBM
  • Experience with the following application servers: WebSphere, JBOSS, or Weblogic
  • Five or more years working with Infrastructure systems in a global environment across multiple data centers
88

SVP of Identity & Access Management Resume Examples & Samples

  • 4+ years of experience with attribute and role based access controls
  • Understanding of the principles of privileged and production access
  • Strong discipline regarding enforcement of access management core principles
  • Comfort with both Unix/Linux and Windows environments
  • Capable of designing configurations for privileged access control in tools such as PowerBroker
  • Strong attention to detail, confident enough to raise questions and escalate when necessary
  • Strong leadership skills and qualities which enable candidate to network, lead within the organization and influence
  • Experience deploying large-scale, global projects and programs
  • Familiarity with IT security and risk management practices
  • Understanding of financial services regulatory and legal environment
  • Ability to articulate technical and business issues and solutions effectively to business or technical staff across organizational layers
  • Excellent organizational skills, able to manage multiple workstreams simultaneously and respond to rapidly changing demands
  • Bachelor's degree in Information Technology or commensurate experience
  • 10+ years working in IT
  • Detailed, bank specific access administration knowledge in Windows, Midrange and Mainframe Platforms with emphasis on security and access controls
  • Ability to work with Technical and Non Technical business owners
  • Assist with internal efficiencies projects and development
89

VP Identity & Access Management Resume Examples & Samples

  • Strong analytical skills/problem solving/conceptual thinking
  • Understanding of and experience in the risk management domain
  • Experience with data acquisition, cleansing, processing, validation/QA
  • Experience creating models, datasets, and reports
  • Experience with tooling in the data analytics / data science domain (ex: R, SQL)
  • Ability to quickly learn and adopt new technologies and disciplines
  • Ability to apply statistical methods and analysis
  • Ability to operate independently and self-lead workload and projects
  • Ability to get consensus from and coordinate with stakeholders
  • Bachelor's degree in Information Technology or related field
  • A broad knowledge of information security principles (e.g. Identity and Access Management)
  • Additional programming skills (ex: Java, Python and / or other languages used to acquire, process, and analyze data)
  • Experience with formal testing methodologies and frameworks
  • Leadership and influencing skills required to manage and influence senior stakeholders
90

Identity & Access Management Manager Resume Examples & Samples

  • 10+ years of relevant experience in System Architecture & Design
  • 5+ years of experience in leading on-shore and off-shore Development Teams
  • Experience in Identity and Access Management
  • ForgeRock certification highly desirable
  • Experience in leading & building development teams
  • Solid hands-on experience in development and architecture of real-time server-side applications using Java, J2EE, Spring, Apache, Tomcat, Javascript, JSON, XML, Postgres, LDAP, etc
  • Experience with performance benchmarking
  • Excellent interpersonal skills with the ability to successfully interact across functions and at all levels of the organization
  • Experience working on large development efforts with many stakeholders across the organisation with the ability to multitask and strive to meet deadlines
  • Excellent analytical, documentation communication and presentations skills in English
91

Identity Access Management Resume Examples & Samples

  • Incident analysis, First and second-line customer liaison with the purpose of maximizing the first call resolution rate
  • First and second-line support : remote and on-site support
  • Recording & tracking incident information in SRM
  • Recording & tracking Problem information in SRM
  • Participate in reconfiguration/installation/maintenance of systems across DevOps environment
  • Document operational support procedure 7. Draft technical content for knowledge database
  • Definition, design, development and maintenance of ECR specific applications and Services, including production
  • Identification of requirements for interfacing with ECR Corporate applications, design and implementation of related interfaces with Upstream/Downstream internal applications and Web Services User support to LM automation infrastructure i.e. desktop, laptops and ECR based system aspects under Windows and Linux including advanced and in interfacing / exchanging data between these different systems
  • Operational support for generation of relevant data files, databases, reports, prints etc. in daily operations
  • Identity and Access Management and governance tools and technologies
  • Apache Directory Studio
  • LDAP Server
  • Microsoft ADFS
  • Monitoring tools/technologies including Introscope, Patrol, Microsoft SCOM, application availability and monitoring
  • Apache, Core Java, CSS, Eclipse, J2EE, JavaScript,Tomcat, XML, XSL, MY SQL, Oracle
  • Extensive knowledge of LDAP, Shell script and Site Minder support; IAM domain (CA-Identify Access Management); how to provide support on Unix and REHL
  • Site Minder incident management (handling P1 and P2)
  • Agile practices
  • How to resolve technical problems
  • Experience in Core Java and Web services
  • Good knowledge - Splunk monitoring tool configuration and release management
92

IAM, Identity & Access Management Resume Examples & Samples

  • Migration of applications from RSA SSO and Federation products to Ping Access and Ping Fed
  • On-boarding of Privileged identities into Lieberman ERPM tool
  • Good oral and written communication in order to interact effectively with Internal and External Business Partners
  • Excellent troubleshooting skills with the ability to resolve issues quickly and identify the root cause of the problem
  • Ability to articulate complex requirements and concepts based upon intended audience
  • Proficient at analyzing complex architecture documents and gather requirements through appropriate followup questions on conference callsSearch Jobs US
93

Identity & Access Management Intern Resume Examples & Samples

  • Contributing to a designated project or initiative to meet a KP business objective
  • Report development and analytics
  • Project management - planning, execution, and measurement
  • Job shadowing in other functional areas
  • Proven ability to build effective working relationships as well as strong interpersonal skills
  • Ability to learn quickly and experience producing high quality work in short periods of time
94

Senior IBM Identity & Access Management Specialist Resume Examples & Samples

  • Provide advanced software development, application administration, or database administration solutions to clients by
  • Develop Creating technical and conceptual specifications in support of the clients’ business needs and functional specifications overall solution
  • Install, configure and customize Develop data field mappings client-selected third-party middleware
  • Develop custom code and interfaces to other application systems, as defined by the technical specifications data conversion solutions
  • Develop interfaces to other application systems
  • Conduct Unit Testing
  • Perform unit testing of developed code sections
  • Resolve issues discovered during System/Integration Testing, and User Acceptance TestingTest applications, application server environments, or databases for data integrity, performance, and usability
  • Document detailed design and code completed technical work for clients
  • Maintain technical specifications throughout a project
95

Manager, Identity & Access Management Resume Examples & Samples

  • Communicates effectively with all levels of the organization: facilitates meetings; plans, designs and provides presentations; represents HM Health Solutions with outside entities; prepares divisional procedures, policies, reports and correspondence; spreads awareness of new and existing security threats; provides oversight regarding metrics, funding, budgets and resources
  • Serve as the point of escalation for the program’s project manager to help resolve any roadblocks and constraints in the process of project delivery
  • Develop, manage and monitor controls to correct situations that could lead to compliance deficiencies in the areas of user provisioning, recertification, and access management
  • Achieve IAM architecture compliance on requirements, including: Sarbanes-Oxley, global data privacy requirements, as well as state and federal regulations
  • Understand current as well as emerging security threats and design IAM architecture to mitigate threats where possible. Stay abreast of new IAM security technologies and integrate into security architecture design
  • Service Management: Price products and services based on an understanding of the benchmark service and pricing for products and services in the industry
  • Engage in the external benchmarking activities and communicate with IT strategy and architecture group related to his or her product line to understand where their products or services are heading in the general technology environment
  • Develop a strategic technology roadmap for services within area of responsibility and build plans to deliver on customer needs
  • Partners with strategic vendors and manages relationship with key resources to ensure optimal service levels and works with procurement on contractual requirements
  • 1-3 years' experience in staff management
  • Experience in leading process improvement initiatives
  • Demonstrated competency in project execution
  • Demonstrated abilities in relationship management
96

IdM / Identity & Access Management Resume Examples & Samples

  • A current SECRET or interim SECRET clearance. (must be able to obtain a SECRET clearance but may start work in advance of clearance being obtained)
  • Be technically proficient with IT tools, data formats, and effective IT management disciplines
  • Have experience with DoD Smartcard either at NOAA, or DoD
  • Be prepared to support the development of new processes and tools in support of the task
  • Be capable of explaining highly-technical information security concepts to non-technical audiences in both written and verbal forms
  • Working knowledge of National Institute of Standards and Technology (NIST)
97

Intern, Identity Access Management Resume Examples & Samples

  • As an intern member of the Identity Management team, you may be involved in IT infrastructure projects that optimize current services and deploy and integrate new technologies for Constellation including Identity and Access Management, Active Directory and core reporting
  • Support and maintain Active Directory & Identity Management System standards
  • Participate in project and strategy meetings
  • Document maintenance processes and issue / resolution procedures
  • Proactively Monitor/Maintain Identity Management servers and Active Directory domains and software
  • Research technology to broaden knowledge of current and future issues and technologies
  • Handles additional duties as assigned
  • Maintain, monitor and practice departmental standards, policies, and procedures
  • Enrolled in a BS program in computer science or equivalent
  • Ability to work in a dynamic team environment where change is the norm
  • Must be able to learn new computing technologies quickly
  • Must work effectively with a team and be self-directed
98

Manager, Identity & Access Management Resume Examples & Samples

  • This leader will own and drive the global rollout of a more robust and formal approach to managing access and governance of user and administrator rights. The structure of the program will be based on the goals, principles and strategy of the overall Global Information Security Enterprise Security Strategy at SCJ. At its core, the service ensures appropriate access and rights management while driving breakthrough performance in governing business appropriate risk to data access. The Manager will optimize team processes to ensure efficient and effective delivery of services in a 24x7 ‘follow the sun’ operating model
  • The Manager provides access/account management leadership and governance services across a diverse range of business applications, while adhering strictly to compliance and operational risk controls in accordance with SCJ and regulatory standards, policies and practices
  • Responsible for the operation and support of the technology, services, and processes of the identity management, provisioning solutions, and access systems at SCJ, including identity administration, rights management lifecycle, governance, and reporting
  • Provide daily customer support in order to ensure customer satisfaction
  • Ensure communication is customer-focused and professional
  • The ideal candidate will be an individual with proactive, demonstrated strong customer service skills with expert experience in the Identity and Access Management discipline. In addition, the candidate selected must advocate secure computing practices and procedures, and communicate Information Security best practices throughout the company
  • Manage, as needed, the global demand for services and provision resources to ensure a smooth and timely delivery of services
  • Expertly apply functional or technical knowledge to process innovation and complex problem solving
  • Insightfully select, combine, or invent appropriate tools or technology for tasks; improve or redesign processes, tools, or technologies
  • Work deliverables include achieving established SLAs, performance metrics analysis and reports, periodic operational audits to ensure adherence to standards, status reports, accurate time reporting, and project documentation
  • This person will act as the subject matter expert, responsible for leading others in collaborative efforts with business, technology, security, and compliance teams to refine, enhance, and align solutions based on SCJ’s overall IAM strategy. The candidate will be capable of developing system requirements, processes and design specs based on organizational needs, security/compliance policy, and industry trends
  • Develop complete “solutions” leveraging product features, custom code, or vendor partnerships. Conduct product evaluations per leadership requirements, driving vendor direction and feature enhancements based on SCJ needs
  • Education – Bachelor’s degree experience required
  • 3+ years leadership in identity and access management
  • 2+ years leadership and subject matter expert in SAP access and authorizations
  • 3+ years leadership in service delivery of Active Directory authorization services
  • 3+ years management experience in large enterprise environments
  • 5+ years recent experience with centralized user provisioning in a role based provisioning environment
  • Demonstrated experience with implementing and maintaining a large, complex Identity and Access Management system
  • Demonstrated experience in developing and leading User Access Governance
  • Ability to pass a detailed security background screening
  • Strong leadership skills and the ability to work effectively with business managers, IT engineering and IT operations staff
  • The ability to interact with SC Johnson personnel, build strong relationships at all levels and across all business units and organizations, and understand business imperatives
  • A strong understanding of the business impact of IAM tools, technologies and policies
  • Strong leadership abilities, with the capability to develop and guide IAM team members and IT operations personnel, and work with minimal supervision
  • Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management and business personnel; in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies
  • Experience working with legal, audit and compliance staff
  • Experience developing and maintaining policies, procedures, standards and guidelines
  • Experience with common information security management frameworks, such as International Standards Organization (ISO) 2700x and the IT Infrastructure Library (ITIL)
  • Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation
99

Lead Director, Identity & Access Management Resume Examples & Samples

  • Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization for relevant IAM technologies as much as possible
  • Design deployment architectures
  • Participate in capacity planning and HW / SW specification recommendation efforts
  • Participate in all technology deployment activities ranging from design to architecture to configuration and custom development
  • Design, implement and educate on code deployment, code migration, and source control use
  • Provide knowledge transfer and post production support activities as necessary
  • Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a leader of a project team
  • Remain current on relevant IAM market-related trends, tools, and methodologies
  • Provide feedback on internal processes required to help train and mentor other professionals as needed
  • Minimum Experience: 5 years / Preferred Experience: 10+ years
  • At least 5 years’ experience managing IAM implementation projects or services
  • Understanding of IAM products and services. Ability to communicate with technical and executive audiences
  • Experience in gathering requirements, documenting and assessing information while developing enterprise strategies for IAM
  • Experience in successfully leading and executing large enterprise complex IAM initiatives from inception to steady state
  • Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as ISO 17799, COSO, ITIL, and NIST SP 800-53
  • Proven success in leading and managing high-performing teams, including but not limited to a history of recruiting and motivating talented and diverse staff
  • Record of building and maintaining relationships with a consultative and engaging style
100

Head of Identity & Access Management Services Resume Examples & Samples

  • Designing and implementing appropriate operational processes and controls which are aligned with key stakeholders and regulatory requirements to help assure that information created, acquired or maintained by NYL and its authorized users, is used in accordance with its intended purpose
  • Proactively identifying associated risks and protecting NYL’s information and infrastructure from external / internal threats
  • Lead the engineering, implementation and management of a shared service which covers
  • Seasoned leader of global professionals and cross functional teams, who can attract, develop and retain top talent in the field
  • Direct experience leading the design, implementation and management of Information Security solutions and services for a global corporation (Fortune 1000)
  • Ability to deal with ambiguity very dynamic and high speed and complex business environment
  • 15 years of leadership experience in the information security field with specific demonstrated success in the IAM domain and related process design
  • Excellent understanding and broad knowledge of all IT Architecture, Operations, Information Security & Risk Management, strategic planning and the related tactical initiatives needed to achieve the plan
  • Bachelor’s degree; concentration in Computer Science, Management Information System, or equivalent Business experience desired Sound understanding of financial management and departmental budgeting required
  • Demonstrated ability to serve as a respected member of a senior management team and effectively communicate security-related concepts to a broad range of technical and non-technical management and staff, including executive management
  • Demonstrated ability to meet objectives, deliver quality results in a high performance environment
  • Excellent skills interacting and mediating sensitive situations at all levels of the organization and with external customers and auditors
  • Ability to easily defuse critical situations and manage escalations appropriately
  • Ability to communicate effectively both orally and in writing; ability to communicate with customers, associates and management in a cross functional matrix organization; solid teamwork and interpersonal skills
  • Strong presentation skills; ability to present and discuss business issues, strategies as well as technical information in a manner that establishes rapport, persuades others, and gains understanding at all levels of the organization
  • Good business and financial planning, analytical, and conceptual skills to evaluate business risks and apply knowledge to identify appropriate solutions
  • Solid project management skills including the ability to effectively deploy resources and manage multiple projects of various diverse scope in a matrix and cross-functional environment
  • Solid knowledge of information security principles and practices
  • Excellent interpersonal, communication and collaboration skills to successfully interact and influence employees and key business partners and providers at all levels
  • Excellent track record communicating, managing complex projects and influencing others, in a diversified and international matrix organization. Adept at proposing, implementing and managing change while prepared to question the “Status Quo”
  • High level of personal integrity with the ability to professionally handle highly sensitive and confidential situations with Executives, Customers and 3rd parties
  • Certification in Information Security relevant areas such as Audit (CISA), Security Management (CISM), Security Professional (CISSP) and/or equivalent business experience in a matrix Organization desired
101

Identity Access Management Resume Examples & Samples

  • Ensure efficient delivery of IAM services and high user satisfaction. Strong experience in the Service management areas are must
  • Bachelor or similar graduate degree field in Engineering, Computer Science, Business Administration combined with additional relevant IT and business experience
  • 6+ years of experience working within the IT Infrastructure
  • Strong vendor management and communication skills
  • Proactive mind set, self-driven and willingness to take ownership of tasks
  • Possess a strong technical background and excellent problem solving skills
  • Be able to travel for business engagements
  • 3+ years of experience in managing IAM solutions
  • 3+ years of experience developing identity management strategies and supporting architecture and implementation plans
  • Good general understanding of Microsoft infrastructure and connectivity concepts. These include Active Directory, Federation, SSO, provisioning, security and encryption standards and protocols, authentication and authorization
102

Manager, Identity & Access Management Resume Examples & Samples

  • Working with the Chief Information Security Officer and associated team members to align Identity Lifecycle Management with IT/Security compliance and governance, platform development and business operations
  • Provide strategy and road map for attaining effective and efficient identity and access management controls
  • Manage the development, implementation and continuous refinement of identity policies, standards and procedures to ensure ongoing strengthening and maintenance of identity lifecycle practices
  • Understand and refine a Role Based Security framework. Produce schema designs and operational plans to enforce and maintain identity management workflows
  • Participate in the development and deployment of interfaces between the directory, source and target systems
  • Protect against new types of security threats by ensuring that solutions are in place to guard against such threats, and that incident response capabilities are implemented and maintained
  • Develops, implements and maintains identity technology infrastructure and software platforms
  • Monitor controls and perform periodic risk assessments to identify compliance issues
  • Hire and coach information security professionals
  • Minimum 10+ years of hands-on experience deploying role-based directory/security models within the framework of a highly complex organization model
  • Experience with identity lifecycle management platforms (e.g., SailPoint, NetIQ, Oracle Identity) modeling directory enabled applications, LDAP schemas, automating user account and group membership and security risk management
  • Excellent written and oral communication skills with the ability to effectively communicate and collaborate with information technology professionals, senior management, auditors and vendors
  • Strong customer-interaction skills
  • 5+ years experience creating custom schema, installing and debugging issues with active directory enabled custom or third party applications
  • Working knowledge of SAML, Web Services, API Gateways, multi-factor and adaptive authentication methods and virtual directories
  • Experience in the concurrent management of multiple development projects, multiple development managers and a team of developers/analysts/technical staff
  • Ability to occasionally work remotely anticipated
  • The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions
103

Identity & Access Management SME Resume Examples & Samples

  • Design and engineer solutions to facilitate improved management of Macquarie’s privileged and system accounts
  • Provide consultancy to technology teams and account teams regarding integration with Macquarie’s Privileged Account Management (PAM) services
  • Provide technical leadership to assist with the delivery of key IAM projects
  • Assist with integrating PAM services into the broader IAM ecosystem in order to improve the overall Identity Lifecycle Management at Macquarie
  • Provide 3rd level support for the Macquarie PAM platforms
  • 3-5 years IAM experience in large enterprises, preferably in financial services industry
  • Good working knowledge of Windows and Linux platforms
  • Experience with Dev/Ops and Agile methodologies
  • Knowledge in management of generic and privileged identities (system and shared identities)
  • Basic understanding of common scripting/programming languages e.g. Java, Python, PowerShell
  • Experience with Dell Total Privileged Access Management (TPAM) and/or CyberArk
  • Experience with Active Directory, Oracle DSEE and/or other directory products
  • Experience in IAM functions related to cloud-based technologies, especially Amazon AWS
  • Knowledge of SailPoint IIQ and/or other IAM products
  • Knowledge of Database technologies (e.g. MSSQL Server, Oracle and Sybase)
104

Identity & Access Management Systems Senior Engi Resume Examples & Samples

  • Minimum 5 years of extensive and applied experience with Enterprise Access and Identity Management, working with Active Directory and Group Policy Object management, LDAP, Federations, SSO, including design, configuration, and deployment
  • Minimum 2 years of experience with supporting various authentication protocols (Kerberos, SAML, OAUTH, LDAP, etc.)
  • Education (degree): Bachelor-level degree in engineering, information technology, computer science, or equivalent educational or professional experience
  • Excellent troubleshooting skills, including the troubleshooting and debugging Active Directory technologies as well as troubleshooting network connectivity issues as they pertain to authentication and authorization
  • Must be able to think out of the box. Must have the ability to troubleshoot non-standard issues/undocumented issues, to look at the big picture and see how a problem fits in and determine a solution that fits within the existing framework
  • Provide input to assist with continual improvement
105

Identity Access Management SME Resume Examples & Samples

  • Experience architecting and supporting IAM solutions within the IBM suite
  • Experience with Directory Integrator is highly desired (Federation/Access side of the stack)
  • Other IAM tools are a bonus (Sailpoint, Cyberark, Ping, etc)
106

Identity & Access Management Student Assistant Resume Examples & Samples

  • Experience using XML to manipulate Java Beans
  • Java programming
  • JSP programming
  • Java properties files
107

Digital Identity Access Management Lead Resume Examples & Samples

  • Manages the digital experience for web and mobile specific to identity management
  • Coordinates impact assessments across all major programs impacting the digital experience for identity management
  • Effectively partners with Marketing for communication to constituents (internal and external)
  • Accountable for defining voice of the customer capability requirements and prioritizing requirements for delivery based on customer, market, and business value
  • Assesses key market factors, including competitive landscape, mobile/digital landscape, constituent insights, and unmet customer needs to develop innovative solutions specific to identity management
  • Expert knowledge in designing digital experience solutions with demonstrated experience in one or more native mobile OS (iOS, Android) and web technologies
  • Direct experience with mHealth (mobile) application strategy, design, and/or development is also a plus
108

Manager, Identity & Access Management Resume Examples & Samples

  • Be a thought leader in IAM strategy and methodology
  • Hands-on architect and developer of a comprehensive IAM system that addresses the challenges of a very complex development and production environment
  • Align team objectives and outcomes to ensure safe, reliable, efficient, and compliant execution of IAM functions
  • Establish a long-term vision for the IAM group and ensure that the team progresses towards that vision
  • Positively interface with stakeholders and client users to integrate services with minimal disruption and to prioritize IAM requirements for the enterprise
  • Extend the IAM function to several other recently-combined, company divisions
  • Ensure compliance with an evolving regulatory environment, including SOX and PCI-DSS compliance
  • Identify and mitigate risks identified through internal and external audits
  • Recruit, develop, and retain a high-performing team of IAM personnel
  • Promote effective teamwork, mentor employees, and evaluate individual performance
  • BA/BS in Computer Science, Information Security or equivalent experience
  • Deep understanding of the methodology, techniques, and technology used to plan and implement a comprehensive IAM system in a complex IT environment
  • The ideal candidate will have at least 8 years’ information security work experience with a minimum of 4 years experience as an IAM engineer or manager
  • Proven track record of driving projects to completion and making continuous improvements
  • Strong familiarity and experience with access management methodologies and technologies to include
109

Global Identity & Access Management Resume Examples & Samples

  • Support the development and management of the project/application's business case
  • Provide subject matter expertise advisory on relevant project plan and execution approach
  • Perform business analysis on regional requirements, identify compatible solution for adoption
  • Promote and drive business adoption of enterprise process and toolset eco-system
  • Work with stakeholders in the region and at global level to communicate approach
  • Monitor projects on an ongoing basis, evaluating progress and quality, managing issue resolution process and taking corrective action as necessary
  • Drive and lead regional access remediation
  • Lead audit and regulatory engagement and responses
  • Regional point of contact for major incident and problem escalation
  • Issue identification validation and substantiation
  • Regional demand management and prioritization
  • Drive reporting and metrics
  • Minimum of 5 years of Program and Project management experience interfacing with both technical and business teams, preferably in IT
  • Knowledge of regional regulatory requirements i.e MAS TRM guideline, Notice 644
  • Risk and Security Management, IT Risk, Identity and Access Management, Data Protection, Information Security knowledge and experience are all desired skills
  • Creation of Business Case experience are all desired skills
  • Experience with projects in multiple technologies, functions; Project Management Certification a plus
  • Experienced self starter that can take ownership of programs and projects, set timelines, work with sponsors, understand strategy or reasoning for completing the effort
110

Identity & Access Management Lead Resume Examples & Samples

  • Have relevant security accreditations (e.g. CISMP, CISSP)
  • CA Single Sign On
  • CA Advanced Authentication
  • CA API Gateway and Mobile API Gateway
  • Microsoft Active Directory
  • Oracle Identity Manager
  • Cyberark Privileged Account Security
  • A basic understanding of Security concepts, specifically Identity and Access management
  • A good appreciation of the BT Security policies
  • Good communication skills with the ability to talk to technical and non-technical audiences
  • The ability to think around a problems and take an E2E view
111

Identity & Access Management Resume Examples & Samples

  • Designs reusable service components, libraries and frameworks to support Enterprise-level IAM services
  • Ensures technical design and implementation complies with established guidelines and standards
  • Assists in the design of enhanced security authorization and authentication models
  • Participates in development of features for internal and external applications
  • Develops, participates and documents standard operating procedures, best practices and technical documentation in a technical repository
  • Maintains current knowledge of industry trends and standards
  • Ability to provide 3rd-level application support as necessary
  • Automates and optimizes operational processes as appropriate
  • Provides 24x7 on-call support of production systems on a rotation basis
  • Assists in other areas of the department and company as necessary
  • 3+ years experience in operating Enterprise-scale Policy Management or Federation Services Infrastructure
  • Experience defining Access Control Policy expressions in XACML or equivalent with WS-Policy
  • Knowledge of IBM TSPM (Tivoli Security Policy Manager.)
  • Knowledge and experience in the architecture and operations of core RESTful and SOAP Web Services
  • Experience with scripting and development (Java, JavaScript, Powershell)
  • Knowledge of associated industry standards and protocols: LDAP, Kerberos, SAML, Oauth/OpenID Connect
  • Knowledeable on Federation platforms such as PingAccess, PingFederate, and ADFS
  • Knowledge of associated technologies such as: Windows Server, Active Directory
  • Proven ability to manage to priorities and timelines
  • Proven ability to provide task estimates
  • Good understanding of design/development methodologies
  • Excellent troubleshooting skills and the ability to logically think through problem resolution
  • Able to work effectively and produce consistent results with minimum supervision
  • Self-motivated, responsible, conscientious, and detail-oriented and possess a passion for excellence
  • Broad Knowledge in associated Infrastructure services and concepts that rely on networking protocols, authentication mechanisms, encryption methods, and security concepts
  • Be able to work with application teams and assist in implementing and tuning services that are reliable, available and performing
  • Track and trend metrics for continuous service improvement to include capacity, monitoring, auditing, growth, and maintenance
  • Design, Build and Deploy experience with an understanding of the following concepts: high availability, load balancing, firewalls, topology models, performance testing, functional testing
  • Understanding of or experience with associated technologies such as: F5 Big-IP LTM and GTM, Axiomatics, Cisco EPM
  • Knowledge of WebSphere helpful
  • SAP knowledge desired
  • Familiarity with Retail Industry compliance requirements (PCI, SOX, HIPAA)
112

Identity Access & Management Site Lead Resume Examples & Samples

  • Administer identity & access management within a variety of systems and tools
  • Provide end user support and troubleshoot identity/access issues
  • Managed incident, problem, change and request within area of responsibility
  • Serve as site leader for team of information security administrators, handling escalations, planning, and other responsibilities as needed
  • Responsible for monthly Quality, Cost, and Delivery (QCD) metrics
  • Support audit requests
  • Ensure company projects/initiatives are not delayed due to identity & access issues
  • Coordinate development of polices, standards, and procedures within area of responsibility
  • Monitor compliance of information security procedures and policies and report infringement s to management
  • Audit and review Information Security issues in the organization
  • Ensure SOX compliance, initiating and updating documentation or procedures as required
  • Process identity & access requests using various systems tools
  • Process incident, problem, change, and request tickets
  • Provide site leadership/support of the team
  • Support customer and users requests and issues
  • Provide metrics and reports as requested
  • Attend team and project meeting as necessary
  • Updating documentation as required
  • Facilitate IAM onboarding of new applications with the various system owners as required
  • Working experience with IT provisioning in an enterprise environment
  • Hands on experience in identity / access administration tools including Tivoli Security Identity Manager (ISIM)
  • Working experience with Active Directory and Shared Files
  • Strong written and verbal communication skills and customer service experience
  • Experience with problem solving in an IT environment
  • Hands on experience with Microsoft Office Suite, incident management tools, problem management tools, and change control tools
  • Makes sound decisions (know when to escalate, and seek guidance)
  • Team leadership providing instruction & guidance to colleagues
  • Minimum of 3 years direct experience in information security administration
  • Minimum 1 year of Team Leadership experience
  • Must have experience with Identity Management tools including IBM Tivoli Suite
113

Identity & Access Management Solutions, VP Resume Examples & Samples

  • Point of contact and subject matter expert for IAM program information across all business lines / business partner areas
  • Highly experienced in stakeholder management and working across groups to effectively deliver the identity and access management programs to stakeholders and customers
  • Drives results in the execution and delivery of initiatives and processes
  • Works across groups to effectively communicate IAM risk matters to stakeholders
  • Demonstrates excellent knowledge of information, identity, access, cyber, security, and technology risk concepts, with a strong ability to articulate those risks in business terms
  • Interprets and drives enforcement of information risk policies, standards, and regulatory requirements
  • Leads by influence and building alignment
  • Works with representatives from the business/business partner areas
  • Clearly communicates any business impacts resulting from new identity and access risks, policies, standards, and controls
  • Participates in the recruitment and management of a strong, cohesive team
  • Participates in the development of team goals and objectives
  • Participates in both strategic and tactical planning that helps enable and drive the business
  • Identifies initiative business requirements, technical requirements, resource requirements, budgets, and schedules
  • Manages work load, project plans, deliverable, and supervises staff and/or project team members
  • Develops and drives the implementation of key metrics (KRIs, KPIs) and communicates results to stakeholders
  • Bachelor's Degree or equivalent work experience preferred
  • 1 or more of GSEC, CISSP, CISM, CISA, CRISC, CGEIT preferred, but not required
  • Demonstrates a solid understanding of systems architecture, hardware, operations, development, system life cycle, and information security along with investigative principles, information security practices and effective risk management
  • Deep and recent experience with multiple vendor solutions for the full lifecycle governance and control of identity, access, authentication, authorization, and privileged access
  • Excellent experience in providing expertise and knowledge of current industry trends in technology and information risk standards to improve controls across a firm
  • Proven technical leadership skills
  • Ensures the core competency responsibilities, e.g., identity management, access management, Roles Based Access Control, federation, single sign-on
  • Proven awareness and understanding of identity and access risk management, compliance, information protection, regulatory concepts, and requirements
  • General knowledge of technology security systems and applications
  • Understanding of industry best practices and working knowledge of industry standards (e.g., NIST, ISO, COBIT, OWASP, ITIL)
  • Excellent knowledge of the financial services industry and its regulations / laws is required, along with operational aspects of the business and a thorough understanding of control and risk management concepts
  • Proficient in the use of MS Office; strong verbal and written communication skills
  • Able to assist in communicating related policies, procedures, and guidelines
114

Manager, Identity & Access Management Resume Examples & Samples

  • Leads and implements execution of the IAM area and provides leadership for assigned on-shore and off-shore team members
  • Assist clients in understanding the benefits of centralized access and identity management services through development of a strategic vision and roadmap that is based on business needs
  • Operates across both technical and management leadership capacities
  • Remains current on industry trends in cyber risk with industry standards and regulatory requirements
  • Works collaboratively with information security team members and business stakeholders – Responsible for navigating and crossing organizational boundaries, networking with business and other stakeholders, in order to manage project deliverables and timeframe
  • Presents and obtains buy-in for overarching identity and access management strategies from Executive Leadership
  • Builds solid, trust-based relationships with client stakeholders
  • Works collaboratively with the client to identify and solve key constraints, risks, and issues
  • Develops meaningful, high-quality deliverables that suit specific client needs
  • Communicates with clients in an organized and knowledgeable manner
  • Demonstrates flexibility in prioritizing and completing tasks
  • Conducts presentations and workshops internally on program benefits and value
  • Possesses demonstrated experience in creating strategies, roadmaps, and execution plans for successfully delivering these identity and access capabilities at other organizations (IAM experience preferred) and Contributing to ongoing evolution and development IAM strategies, roadmaps and plans
  • Strong experience in technology-based tools or methodologies to review, design and/or implement enterprise programs
  • Strategically bridges the IAM program with the overall business needs by driving meaningful collaboration and developing strategic financial budgets and operational plans
  • Acts as a business liaison between the CSO/Senior Management and the day-to-day IAM Architect and team, effectively communicating the benefits of IAM in security, technology administration efficiency, compliance, and business agility while still managing realistic and achievable project plan timeframes
  • Responsible for hiring and retaining valuable IAM employee assets
  • Ensures that IAM services perform according to defined processes and comply with applicable information security requirements
  • Ensures that IAM projects are accomplished in a timely manner and within budget
115

Director, Identity & Access Management Resume Examples & Samples

  • Provide expertise and understanding of the Corporate Identity Management landscape working with leadership to mold, shape and expand the IDM service footprint
  • Define, design, build, testing, and rollout of the enterprise IAM solutions in collaboration with internal and external resources
  • Serve as a trusted adviser to the business stakeholders and understand their core business processes, business priorities which can be enhanced using IAM solutions
  • Contribute and review IAM solution design: ensure innovation, security, and business requirements are met, while also keeping a keen eye on improving the associate's experience with technology
  • Have prior experience in a global, distributed, de-centralized organization, with a large number of employees
  • Partner with other internal or supplier teams as needed (e.g. architecture, information security, network)
  • Collaborate cross-functionally with other technology teams and security policy organization
  • A true technical director that inspires creativity, innovation and technical leadership from his/her team. A leader focused on the execution component that is agile and understands how to map the business needs to viable technology solutions and achieve desired results. An extremely technical leader and SME in identity management and authentication technologies, and their implementation in large scale environments
  • Experience with roadmap ownership, use case creation, strategy development, KPI development, and customer relationship management
  • Minimum of a Bachelor’s degree in Computer Science/Information Systems Management, IT Security
116

Senior Identity Access Management Resume Examples & Samples

  • Process requests for user access to applications and systems using predefined procedures based on contractual turnaround time requirements
  • Manage Active Directory accounts for 6,000 - 8,000 users including
  • New User Account Creation
  • New User Account Activation
  • ID password Issuance - Password Resets
  • User Deactivation
  • Account lifecycle changes
  • Account transfers and Moves
  • Grant Email and AD Account Extensions
  • Manage Incidents and ServiceNow tickets relating to Provisioning and Management of Accounts
  • Monitor and provide reports for performance metrics
  • Periodically evaluate Access management processes, identify process improvements and provide recommendations for addressing systemic issues
  • Assist in defining policies for access management
  • Provide Tier 2 support for Provisioning and Access Management and Governance Issues
  • Maintain account templates within the Avatier tool
  • Accurately report on all Access Control Service Level Agreement metrics
  • Assist with updating Process and Procedure documentation for Access Control
  • Conduct quality checks of documentation during account processing
  • Perform assigned tasks independently
  • Five+ (5) years of previous hands on experience with managing user accounts in Active Directory
  • Associate's or Bachelor's degree in Computer Science, Information Systems or related field preferred. Seven (7) years of equivalent work experience in-lieu of education will be considered
  • Advanced knowledge of Microsoft Active Directory
  • Knowledge of Directory synchronization in the cloud
  • Extensive experience working within Federal Government Environments
  • Proficient in the Microsoft Active Directory Management console
  • Working Knowledge of Group Policy Objects (GPOs)
  • Experience using IT Service Management software (example: ServiceNow or Remedy). - Experience maintaining technical data and documentation
117

Identity & Access Management With Siteminder Resume Examples & Samples

  • Good working experience of SiteMinder Domains, Realms, Rules, Responses and Policies
  • Experience with handling Red Hat Enterprise Linux, IIS and Apache based web servers
  • Good working knowledge and experience of Single Sign On concepts using SiteMinder
  • Good implementation knowledge and experience of federation SSO using SAML 2.0, WS-Federation and OpenID Connect
  • Good understanding of modern authentication and authorization standards/flows
  • Good Experience on implementation, installation, configuration & administration of Web Agents and Policy servers
  • Good knowledge on upgrading SiteMinder infrastructure to latest versions
  • Troubleshoot issues with SiteMinder
  • Good working knowledge of Wily monitoring tool
  • Perform root cause analysis on Incidents/problems
  • Implement changes through change management process
  • Contribute to customer internal Knowledge Management System
  • Service Improvements and best practices
  • Experience on Enterprise architectures and solution designing for IAM projects will be a plus
  • Knowledge of cloud solutions (IDaaS) is preferred
  • JAVA development skills will be a plus
118

Senior Identity Access Management Resume Examples & Samples

  • Associate’s or Bachelor’s degree in Computer Science, Information Systems or related field preferred. Seven (7) years of equivalent work experience in-lieu of education will be considered
  • Experience maintaining technical data and documentation
  • Manage Active Directory accounts for 6,000 – 8,000 users including
  • ID password Issuance
  • Password Resets
119

Lead Identity Access Management Resume Examples & Samples

  • Eight (8) years of previous hands on experience with managing user accounts in Active Directory
  • Five (5) years of Team Leadership experience
  • Associate’s or Bachelor’s degree in Computer Science, Information Systems or related field preferred. Ten (10) years of equivalent work experience in-lieu of education will be considered
  • Experience working with Avatier
  • Working knowledge of PIV/CAC card implementation
120

Identity & Access Management Specialist Privileged User Access Resume Examples & Samples

  • Provide and remove accesses
  • Identify and solve problems
  • Work on complex environment
  • Implementation of changes
  • Coordination of implementations and system management
  • Analytical problem-solving and root cause analysis skills
  • Service oriented behavior and good communication skills to internal and external clients
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Management Information Systems or equivalent experience is benefit
  • At least 1 year practical experience in Unix administration