Identity & Access Management Resume Samples

4.7 (76 votes) for Identity & Access Management Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity & access management job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
EW
E Welch
Elmore
Welch
840 Stracke Orchard
Boston
MA
+1 (555) 579 6211
840 Stracke Orchard
Boston
MA
Phone
p +1 (555) 579 6211
Experience Experience
New York, NY
Identity & Access Management
New York, NY
Schmeler-Volkman
New York, NY
Identity & Access Management
  • Assist in the development of performance metrics/ measurements for the user access attestations
  • Work with the project teams on implementing the defined Policyies within Acsess & Identity Management (AIM) solution
  • Champion the improvement of identity and access management processes, controls and communications related to Policies across stakeholder groups
  • Champion the improvement of identity and access management processes, controls and communications related to Roles across stakeholder groups
  • Work with the project teams on implementing the defined business Roles within Access & Identity Management (AIM) solution
  • Work with team on project work to keep project going according to schedule
  • Work with Business Unit Information Security Officers (BUISOs), system owners, and other IAM colleagues to address audit and regulatory related issues
Detroit, MI
Manager, Identity & Access Management
Detroit, MI
Kuhic Group
Detroit, MI
Manager, Identity & Access Management
  • Understand and refine a Role Based Security framework. Produce schema designs and operational plans to enforce and maintain identity management workflows
  • Participate in development of roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Promote effective teamwork, mentor employees, and evaluate individual performance
  • Manages the strategy and roadmap implementation for Identity and Access Management Platform Tools
  • Manage identity and access management support to business and technical teams in the design of standardized products and customized solutions
  • Develop roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Hands-on architect and developer of a comprehensive IAM system that addresses the challenges of a very complex development and production environment
present
Chicago, IL
Identity & Access Management Specialist
Chicago, IL
Feest, Metz and Little
present
Chicago, IL
Identity & Access Management Specialist
present
  • Troubleshooting and resolving access management and provisioning workflow errors
  • Perform Identity and access management activities
  • Updating existing access management and provisioning workflows
  • Execute and track security process related activities including User ID management
  • Manage operations within the IAM environment at the client, including application patching and upgrades and certificate management
  • Establishes and maintains good working relationships with all IAM customers
  • Web Access Management (Quest Active Roles Server, SiteMinder, Oracle Access Manager, etc.)
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of San Francisco
Bachelor’s Degree in Computer Science
Skills Skills
  • Be able to work with application teams and assist in implementing and tuning services that are reliable, available and performing
  • Solid organizational skills including attention to detail and multitasking skills
  • Strong agent to drive change including the ability to facilitate new processes and standards
  • Strong sense of ownership and accountability
  • Excellent troubleshooting skills and the ability to logically think through problem resolution
  • Knowledge of associated technologies such as: Windows Server, Active Directory
  • Professional qualification of CISSP or attaining CISSP is desired
  • Knowledge of Oracle Waveset (ex - Sun Identity Manager), CA Siteminder, Unix (Solaris and RedHat)
  • Knowledge of an Enterprise Identity Management Product, experience on Sailpoint IIQ a definite
  • Self-motivated, responsible, conscientious, and detail-oriented and possess a passion for excellence
Create a Resume in Minutes

15 Identity & Access Management resume templates

1

AVP, Identity & Access Management Resume Examples & Samples

  • Define, build and lead an Identity & Access management team responsible for providing access capabilities throughout the firm
  • Develop strategies aligned to the policies and roadmaps to continue enhancing the control effectiveness of access management across the enterprise
  • Develop a strong road map that identifies a 2 year plan, aligned to the strategy that includes tangible projects that will drive short term incremental value
  • Ensure strong controls and discipline are in place to manage efficient services levels, and effective controls around Moves adds and changes, provisioning and de-provisioning, and attestation
  • Ensure processes are in place to monitor and report on the effectiveness of access management controls as well as alignment to policies, regulations and audits
  • Ensure sufficient teams are in place to manage the operational demands of provisioning, including size of team, coverage of business and appropriate degree of skillsets
  • Able to manage effectively in a highly matrixed environment
  • Highly motivated individual with a track record of successfully implementing solutions across line of business boundaries
  • Must be able to work with a pool of experts and ensure high levels of service even when the effort crosses organizational boundaries
  • Comfortable leading through change and recognized as a champion for continuous improvement
  • Outstanding people management, leadership and coaching skills
  • Ability to build for the future by attracting and developing the best people
  • Excellent customer service orientation and a professional approach; including ability to interact with all levels across the organization
  • Security accreditation CISSP, CISM or other specific vendor or industry certifications
  • The ideal candidate will have a strong academic background (e.g., computer science, engineering)
2

Director, Identity & Access Management Resume Examples & Samples

  • Manage and guide design, development and support of Identity and Access Management solutions including provisioning/de-provisioning workflows, Analytics, Highly Privileged Accounts, Single Sign On, Directory, API Management, ETL, Unix authentication
  • Build strategy for Identity and Access Management services that are robust and scalable to support the employees, contractors, partners and customers
  • Maintaining security and risk controls
  • Establish an Access Governance program to drive PCI/SOX initiatives forward and increase security posture
  • Work closely with Software Architects to propose solutions and provide strategic technical direction across the team
  • Overall accountability for team delivery and technical support
  • Responsible for managing capital and operational budgets
  • Lead and develop team members
  • Occasional off-hours support may be necessary to address outages, pressing system issues, or scheduled deployments
  • Bachelor's degree in Computer Science, Information Technology, or equivalent work experience
  • 6+ years working with Identity and Access Management solutions
  • 4+ years in business requirements gathering
  • 4+ years programming experience, preferably the Java platform
  • Experience working in Agile environments
  • Experience with Project Management duties (project planning, resource management, scope, schedule and status, documentation)
  • Ability to manage, lead and motivate cross-functional teams including QA, Architects, Business Analysts, Project Managers and Vendors
3

Senior Functional SME Identity & Access Management Resume Examples & Samples

  • Implements, tests, debugs, and documents new systems, or enhances existing systems
  • Reviews and coordinates test plans for new and existing environments
  • Works independently to implement complex hardware and software environments
  • Interfaces with peers, technical & business staff, vendors, customers, and all levels of management
  • Writes scripts, templates, interfaces, and utility applications as needed to maximize efficiency and target continuous improvement
  • Provides technology and process training within discipline
  • Create framework for the Identity and Access Management Program
  • Provide oversight of the Identity and Access Management Program
  • Create framework to manage life cycle of Identity and Access Management global processes
  • Architect Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC)
  • Directory schema architecture
  • Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC)
  • Consult on Directory schema architectures
  • Work closely with project teams and other architects to translate technology direction functional and technical roadmaps
  • Assist Project and Program Managers as needed
  • The ability to lead large groups and be a primary facilitator
  • Demonstrated written skills
  • Comfortable working in matrixed project and management based teams
  • Ability to lead and shape presentations and expectations
  • Help drive pursuits and engage in complex deals, matching outcomes to expectations
  • Ability to operate independently at times to provide domain area functional and technology leadership
  • Working knowledge of a broad range of current security appliances, tools, and applications and security methodologies
  • The architect needs a depth of knowledge and experience in Identity and Access Management; Application and Data security; Infrastructure and Endpoint and be able to talk at introductory and advanced audiences
  • Proficient at end to end business and technical process mapping
  • Proficient at technical requirements gathering
  • Proficient in minimum one directory technology, e.g. Active Directory, Oracle Directory, IBM Directory, etc
  • Proven expertise in minimum enterprise identity & access management system, .e.g. Sun Identity Manager, Oracle Identity Manager, IBM Tivoli Identity Manager, SailPoint Identity Manager, etc
  • Ability to work as part of a team and interact effectively with others
  • Displays willingness to accept responsibility, display initiative, good judgment and a positive attitude
  • Appropriate blend of sense of urgency, strong results orientation, and delivery focus
  • Understands and uses SLC methodology
  • Ability to transfer concepts across environments
  • Proficient on interface standards and interoperability
  • Proficient in common testing tools and methods
  • Experience with Control Objectives for Information and Related Technology (COBIT) or ISO (the International Organization for Standardization) ISO IEC 27002 2013 Information technology Security techniques Code of practice for information security controls
4

Identity & Access Management Resume Examples & Samples

  • Providing 24x7 production support to our GIAM products and services under the round-the-sun model with supports in three different time-zones
  • Partnering with the IT Infrastructure team to build and support the application servers and infrastructure
  • Partnering with Incident management team to resolve the production issues and service outage of those applications consuming our products and services
  • You will continue to work with a global team environment, face and accomplish challenging assignments to develop and enhance IT security domain of the banking field and gain exposure to the regulatory challenges of the different countries around the world
  • Computer Science or Computer engineering degree or 5+ years of working experience
  • Candidates must have experience in a large production support environment assisting large-scale mission critical applications
  • Candidates must be able to communicate and exemplify strong understanding of identity and access management
  • Financial / Banking environment is desired but most importantly
  • Background in IT Risk and Controls within global financial institution a big plus
  • Good knowledge on installing and supporting LDAP service and replication is highly preferable
  • Professional qualification of CISSP or attaining CISSP is desired
5

Identity & Access Management Resume Examples & Samples

  • Knowledge of Oracle Waveset (ex - Sun Identity Manager), CA Siteminder, Unix (Solaris and RedHat)
  • Knowledge of an Enterprise Identity Management Product, experience on Sailpoint IIQ a definite plus
  • Oracle identity server/Oracle Directory Server Enterprise Edition
  • Advanced knowledge of Relational DBMS (Oracle, Sybase), must have proven ability to write ad-hoc SQL scripts to extract and manipulate relevant data
  • Experience in Java, J2EE related technologies, Oracle 10g or higher
  • Knowledge of Application Server (Apache, Tomcat & Websphere etc)
  • Unix Shell and perl scripting
  • German knowledge is an added advantage
  • Proven ability to deliver under stressful situations
  • Proven ability to multitask and prioritise based upon the business requirements
  • Must be able to collaborate and effectively communicate with colleagues in disparate geographical locations
  • Must be able to effectively communicate with senior colleagues and other stakeholders in the organisation
6

Identity Access Management Provisioning Resume Examples & Samples

  • At least 1 year experience in IT skills
  • At least 1 year experience in Processes Mgmt (Develop/ Analysis, designing new processes and their validation)
  • At least 6 months experience in Microsoft Office
  • At least 1 year experience in Communication and teamwork skills
  • Basic knowledge in Windows/ Unix server Admin
  • Basic knowledge in Active Directory
7

Avp Identity & Access Management Resume Examples & Samples

  • Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement
  • Willing to own the required cross-section of industry and business function experience
  • Able to apply proven best practices for IAM, established methodologies, and baseline templates
  • Focus on IAM design, development, deployment, automation, testing and maintenance
  • Manage end-to-end technical (solution and development) delivery, from vision to implementation
  • Should be able to work effectively with senior business and IT management not only to define strategy, but to affect change
  • Participate in and actively support mentoring relationships within practice
  • Hands on architectural and development experience with Ping PingIdentity (PingFederate) and RSA (RSA Adaptive Authentication)
  • Technical architecture experience integrating identity management, access management and access governance
  • Experience with Role Mining, Role based access control and Access Certification with products such as RSA Aveksa Access Governance Suite, SailPoint
  • Identity Management familiarity in one or more of the following areas
8

Identity & Access Management Tower Lead Resume Examples & Samples

  • 10+ years of experience in Access Management and one or more of the following areas: Data Protection, Data Security, Cyber Security, Information Security or Technology Architecture and Engineering
  • Experience with Access Management methodologies
  • Experience with role-based and security-based entitlements models
  • Experience in federated authentication across companies
  • Strong functional privileged ID management skills; identification and remediation techniques
  • Solid understanding of toxic pairs and remediation efforts
  • Strong understanding of Public Key Cryptography / Key Management (i.e. PKI)
  • Proficient in SharePoint and other documentation management systems
9

Identity & Access Management Resume Examples & Samples

  • Ensure that user access on business owned applications are being reviewed
  • Work with Synchrony Financial functional teams to identify business applications that are newly on boarded & ensure that they are included in the scope of the user access reviews
  • Train the application owners on the Synchrony Financial user access attestation process
  • Ensure application owners have access to the relevant tools/ documents for performing user access reviews
  • Validate the HPA (Highly Privilege Account) user access attestations by performing a 100% sample check
  • Ensure that job changes/ terminations are incorporated into the user access reviews
  • Perform periodical checks to ensure accuracy, timeliness & obtaining applicable supporting documentation on the user access attestations
  • Assist in the development of performance metrics/ measurements for the user access attestations
  • Continuously identify process improvements and co-ordinate implementation of solutions
  • Develop applicable documentation to support the process including metrics to determine effectiveness of process
  • Bachelor’s Degree in Computer Science
  • Minimum of 5-6 years of experience in Information Technology
  • Thorough understanding of Identity Access Management fundamentals
  • Must have proven strong analytical and problem solving skills
  • Experience with working with remote teams
  • 18 months in Synchrony and 12 months in current role,
  • Should not be on active formal or final formal corrective action
  • 18 months in Synchrony and 12 months in current role for applicants with SYF to be updated in required skills
  • Understanding of Role Based Access Control Methodology/ Framework
  • Quality Assurance/ Quality Control
  • Audit experience
10

Identity & Access Management Lead Resume Examples & Samples

  • Provide SME in Identity & Access Management within RFT
  • Process – Develop, Implement and manage secure software life cycle processes to that will assist the application development teams in integrating security requirements within their applications and databases
  • Impact Analysis – Review proposed solutions, develop use cases to explain/demonstrate requirements/specifications to key stakeholders
  • Contribute to the development and implementation of security software, policies, standards, procedures, and guidelines
  • Provide baseline metrics and reporting, both during impact analysis and on-going execution of risk-driven projects, organize and deliver clear and accurate data for Technology and Executive Management
  • Information security certifications (such as CISSP, CSSLP, CEH/CPT or related certifications) would be preferred
  • A graduate degree or equivalent experience in computer science is also required
  • Very strong data analysis, both quantitative and qualitative
  • Good reasoning and logic, problem solving skills
  • Exposure to financial services systems and processes preferably in Investment Banking
  • Experience in working with diverse cross geography teams
  • Self motivated individual, comfortable working without close supervision and with ability to work to deadlines
  • Team player with proven ability to build strong cross-business relationships
  • Exposure to information security principles and relevant standards including Access Management, Change Management, Security Incidents and Business Continuity Management
  • Strong understanding of secure software development life cycle
  • Working knowledge of application assessment, application security vulnerabilities, code review methodologies, and secure coding practices
  • Exposure to information security vulnerability concepts, issues and mitigation methods
  • Experience in a similar risk role
  • Experience of technology projects and/or the Risk and Finance business a plus
11

Identity & Access Management Specialist Resume Examples & Samples

  • Have knowledge of password management, password expiry, basic minimum password guidelines
  • Execute and track security process related activities including User ID management
  • Oversee and report compliance with all User ID Management processes on a regular (at least quarterly) basis and review
  • Coordinate & track the completion of scheduled IAM related activities
  • Support peers and team leaders to achieve UID related SLA / KPI of IAM processes
  • Knowledge of Global Delivery framework / Quality Projects
  • At least 2 years experience in IAM, Identity and Access Management
12

Mgr, Identity & Access Management Resume Examples & Samples

  • Resource management, ensuring the team is meeting the organizational support and request SLA’s
  • Regular 1 on 1 meetings with direct report staff
  • Development and Performance reviews of direct report staff
  • Technical support as needed
  • Operational alignment with strategic direction of the organization
  • Providing consulting advice and guidance to customers and other AGT teams in their area of technical expertise
  • Escalation point involving potential troubleshooting and problem resolution assistance
  • Five years Computer Science or related degree, or equivalent work experience
  • 7 or more years of related work experience
  • Leadership competencies: Acting Courageously, Bringing Clarity, Energize the Organization, Exceeding Expectations, Strategy Focused, Working Together
  • Subject matter experts in technologies related to Identity and Access Management
  • Breadth of knowledge across technology disciplines
  • Understanding of current and future business needs met by infrastructure platforms
  • Results-driven
  • Ability to quickly learn and apply new concepts
  • Ability to drive and achieve consensus/support from large diverse groups
  • Strong written and verbal communication skills enabling effective articulation of strategy across varying technical backgrounds
  • Demonstrated project management and client relationship skills
  • Certifications in relevant technologies, methods, or platforms are a plus
  • This position is also eligible for an incentive bonus
13

VP, Identity & Access Management Resume Examples & Samples

  • Define, report on and execute against the vision, goals and critical success factors for this function
  • Develop business process mapping to assess and identify issues and gaps and implement appropriate solutions enterprise-wide
  • Interface with various internal groups including Operations, Compliance, Risk Managers, Line of Business contacts, internal/external audit and Legal as necessary
  • Successfully drive and deliver Identity and Access Management (IDM/IAM) initiatives from initial inception to implementation to operations
  • Improve current processes and drive positive change in: controls, data quality and regulatory compliance
  • Work with global operations management to promote risk awareness and compliance, in line with established Information Security standards
  • Lead IAM practices (Identity and Access Management), policies and procedures for the access management of Databases (i.e. DB2, Oracle, MSSQL, MySQL, Hadoop, etc.)
  • Have a global mindset and collaborate effectively within and across different teams
  • Be a thought leader in this space and take 100% responsibility and accountability of the IAM function
14

Identity & Access Management Resume Examples & Samples

  • The candidate must possess a strong background in technology with an understanding of Identity and access management and a minimum of 10 years of experience
  • The candidate will be required to interact with team members, various business unites, IT and senior management
  • Coordinate entitlement management processes both with the understanding of business nature and entitlement data
  • Work with Business Unit Information Security Officers (BUISOs), system owners, and other IAM colleagues to address audit and regulatory related issues
  • The candidate must be able to provide detail status as well as follow-up on issues
  • 10+ years of work experience in IT with prior technology management responsibilities
  • Working knowledge of Information Security and Entitlements
  • Technical understanding of entitlement management products and processes
  • Strong interpersonal, problem solving, organizational and time management skills
  • Managing client relationships and working as part of a distributed team
  • IT development background or experience
  • Ability to think strategically and provide insight into how to improve existing technology processes
  • Strong written and verbal communication skills and interpersonal skill
  • Prior experience in financial industry is beneficial
  • Proficient in project management and risk management
  • Strong agent to drive change including the ability to facilitate new processes and standards
  • Individual must be able to multi-task effectively
  • Ability to work under pressure due to regulatory timelines and senior management
  • Capable of thinking strategically and provide insight into how to improve existing business and technology processes
15

Identity & Access Management Lead Resume Examples & Samples

  • Define and execute on the service roadmaps for all components of IDaaS
  • This role will lead a large, geographically dispersed team of 70 IT professionals
  • Responsible for budget planning and management
  • Ensuring delivered services are competitive with external prices and meet the service levels expected from the firm
  • Strategically manage vendors
  • Build and maintain relationships across all functions of IT and EY globally
  • The role has 70 staff members. The direct reports are senior positions and don’t require day to day guidance
  • It also has a matrix approach with other teams like Information Security and Operations
  • Demonstrated skills in developing actionable roadmaps and implementing these efficiently
  • Strong understanding of key performance indicators relevant to the role
  • Extensive experience in financial management (such as budgeting and cost comparison) for the relevant services
  • Have worked at a global level is a large multi-national organization
  • Knowledge and experience of the following technologies at a strategic level
  • Identity Management: PKI, RSA, CA Siteminder, Federation services, Group and List management platforms, Oracle Account provisioning, Microsoft FIM
  • Directories: Active Directory, Azure AD, Virtual Directories
  • 10-15 years working a senior global role
16

Identity Access Management Resume Examples & Samples

  • Must have 2-4 years experience with two or more of the following systems: IDCert, ITRC, RSAM, ID-Integrate, ITRMs, PIRA, Service Center
  • Solid knowledge of Identity and Access Management controls, principles, methods, and regulatory related obligations preferred
  • Good understanding of the global banking business and operations
  • Strong knowledge of IT risk management frameworks/concepts preferred
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client and vendor relationships
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access and Visio)
17

Identity Access Management Resume Examples & Samples

  • Excellent documentation skills required
  • Excellent Written and Spoken Communication Skill
  • Excellent presentation skills and able to present to management
  • Ability to lead, multitask and work well in a team environment
  • Strong problem ownership and strong analytical skills
  • Candidate must be able to communicate with external and internal customers
  • Self-starter and innovative
  • Ability to work with process owners to fix problems and implement changes
  • Responsible for interfacing with other groups within the organization
18

Director, Identity & Access Management Resume Examples & Samples

  • Develop Identity and Access Management (IAM) strategies, architecture and implementation plans for all Time Inc. digital products and services
  • Lead development and operation team responsible for authentication and entitlement
  • Evangelize IAM services and technologies while ensuring business needs are proactively met
  • Identify and prioritize areas for digital authentication and entitlement services improvements
  • Responsible for gaining stakeholder acceptance of IAM initiatives, develops communication plans, produce status reports and other similar artifacts
  • Lead and manage architecture and implementation of Single Sign-On and Customer profile systems
  • Evaluate IAM-related new technologies for potential adoption
  • Collaborate with internal and external Consumer Marketing and brand clients to understand business requirements, ultimately define the overall system technical direction and roadmap
  • Lead IAM-related design meetings with technical development teams both internal and external to Time Inc
  • Manage on-going support for IAM production systems
  • 10+ years of work experience including architecture design and development with a proven record of success
  • 7+ years managing and leading technical development staff to deliver successful technology solutions
  • Strong ability to effectively communicate and partner with business and technical members
  • Ability to understand and follow Java EE development code. Experience with Jersey, JAX-RS and Spring is a plus
  • Working knowledge of relational database design and queries
  • Experience with Access Control processes and properties such as User Provisioning, Onboarding, Role-Based Access Control (RBAC), Authorization models, Single Sign-On (SSO), Active Directory
  • Experience with identity federation protocols such as Security Assertion Markup Language (SAML), Open standard for Authorization (OAuth), OpenID and Facebook Connect
  • Experience with Service-Oriented Architectures (SOA) and RESTful service development
19

Head of Identity & Access Management Resume Examples & Samples

  • Strategic Leadership
  • Develop global enterprise wide strategy and standards for IAM programs ensuring alignment with business objectives and compliance with Access governance framework and operating model
  • Maintain in-depth awareness and understanding of current and emerging trends in IAM in order to inform strategy
  • Provide thought leadership in the development of identity management operational risk management practices
  • Develop, recommend, and partner with corporate support groups to enhance access security practices
  • Provide subject matter expertise and guidance on Access Governance framework to ensure compliance and adherence to bank’s operational risk-taking philosophy, policy, procedures and processes
  • As a member of the leadership team, contribute to the overall strategic planning and direction of the GITRM
  • Operational Leadership
  • Oversee the Access Management support team provisioning 7X24 support of IAM programs and services including certification and security services, privileged and non-privileged ID, and access management of employee and customer accounts acting as escalation point as required
  • Lead the execution of complex global enterprise wide IAM programs utilizing a deep specialized knowledge of IAM practices as the subject matter expert
  • Oversee the automation of user access activities including access request, approval, provisioning and de-provisioning, and certification/re-certification
  • Develop IAM programs and establish new quality assurance processes to increase effectiveness
  • Monitor metrics to measure program effectiveness, and compliance against standards and deliver reporting to provide assurance to senior management
  • Provide identity reporting to business groups to facilitate access to application and data resource decision making
  • Evaluate effectiveness of IAM programs, analyzing areas of deficiency and developing recommendations to resolve
  • Work with vendors to resolve deficiencies identified in audits
  • Research IAM tool sets and products in the market place and determine suitability for BMO’s environment
  • Provide oversight of the use of external resources involved in identity management programs, including selection of vendors, and management of contract costs
  • Risk and Compliance
  • Oversee the governance structure of IAM programs providing regular progress reports and updates to senior management
  • Manage the relationship with vendors and provide oversight of service implementation and execution
  • Ensure overall consistency and suitability for meeting objectives of all IAM programs across the enterprise
  • Manage risk through audit monitoring and control functions, ensuring compliance requirements, audits, and verifications are completed
  • Develop, monitor, and review policies related to IAM program
  • Monitor and escalate issues related to Identity Management
  • Monitor and report on the compliance and effectiveness of logical access controls
  • Manage access governance through development of access rule definitions that align with the bank’s policies and standards and oversight of access rule operationalization
  • Communication and Awareness
  • Promote Access control best practices across the organization through oversight of education and awareness programs
  • Lead the development of education and training programs concerning IAM related risks to the business
  • Conduct requirement reviews with technology partners, assisting in ensuring processes, procedures and documentation requirements are fulfilled
  • Liaise cross-functionally to ensure clear program communication and understanding of IAM policies, processes, and requirements for user access management by all levels of management
  • Recruit, lead, mentor, and develop a world-class technology team, providing opportunities for growth to ensure continuity of the department’s leadership
  • Establish a culture and work environment that attracts, retains and motivates a diverse, skilled workforce in order to maintain a high degree of employee professionalism, commitment and desire to maintain updated skills and knowledge in support of a high performance culture
  • Provide leadership and direction by setting context, defining accountabilities, tasks and assignments, and establishing boundaries for decision-making and approvals
  • Coach, motivate, develop and evaluate performance of direct reports and provide guidance and mentoring in the resolution of complex issues
  • Provide development opportunities to direct reports, including the identification of training needs, creation and implementation of appropriate development plans, monitoring, documenting and providing regular feedback on performance
  • Provide managerial direction, guidance, context setting and translate strategic picture for direct reports
  • Ensure necessary succession plans are in place for all key positions, identify and promote Top Talent, and actively implement solutions to resolve Single Points of Knowledge
  • Interacts with internal and external contacts and groups
  • A Minimum of 10 years of experience in a progressively responsible IAM program management, security operations, and/or risk management, preferably within the financial services industry
  • Completion of a University degree in Computer Science or equivalent work experience
  • Thorough up to date knowledge of the current IAM trends and best practices
  • Experience in vendor and contract management
  • Solid project management and budget management experience
  • Completion of critical security certification
  • Industry certification in related areas of specialty i.e. CISSP, CISA, ITIL, ISO17799, ISSAP, ISSMP, PMP, etc. is an asset
  • Solid knowledge of fiscal and budgetary management
  • Advanced knowledge of security systems, access controls, network security, security management, security architecture, risk management, and security governance framework
  • Strong awareness of emerging security technologies and IAM tools
  • Advanced knowledge of organizational, process, and business models
  • Strong understanding of policies, cross-organizational roles, and governance structures/processes within the Bank
  • Advanced understanding of ITIL processes and ISO Certification
  • Broad understanding of the financial regulatory and legal environment, especially in Canada and the US
  • Strong project management, problem solving and analytical abilities
  • Exceptional and proven leadership capabilities – communication, influence, negotiation, conflict resolution, people management, relationship management (internally/externally), and multitasking
  • Advanced level of critical thinking and sound judgement
  • Strong strategic enterprise wide vision and planning skills
  • Proven ability to successfully partner and consult with clients to identify business challenges and to develop effective strategies and alternatives to mitigate them
  • Ability to effectively lead change management initiatives
  • Strong conceptual skills; ability to deal with ambiguity; creativity; lateral thinker
  • Strong service management and service delivery orientation
  • Possesses expert written, oral, and interpersonal communication skills
  • Ability to present complex information in a manner suitable for technical and non-technical audiences
  • Highly self-motivated, self-directed, and attentive to detail
  • Ability to prioritize and execute tasks in a high-pressure environment
  • Strong team orientation and building skills, and ability to foster a collaborative environment
20

Identity & Access Management Professionals Resume Examples & Samples

  • Manage and deliver projects, including development of project plans, project goals and objectives, tasks, required resources, and associated budgets and timelines for completion
  • Establish relationships with client personnel at appropriate levels
  • Remain current on new developments in information security services and industry knowledge
  • Analyze regulatory requirements and compliance issues related to IAM
  • Perform current state assessments of IAM, including benchmarking/maturity assessments, developing strategies and roadmaps for improvement
  • Develop IAM policies & procedures, architectures, use cases, test and implementation plans
  • Define Role Based Access Control (RBAC), Entitlement, and Segregation Of Duty models
21

Identity Access Management Resume Examples & Samples

  • 5 years experience in developing detailed process workflows with automation orientation
  • Solid understanding of the operations and global banking business
  • Outstanding analytical, communication and problem-solving skills with the ability to develop solutions to complex analytical/data-driven problems
  • Strong experience with Oracle, SQL, and Microsoft Office products: Visio, Excel, PowerPoint, Access, Word
  • 2- 4 years working knowledge of access certificaton and provisioning tools and processes
  • Knowledge of Identity and Access Management controls, principles, methods, and regulatory related obligations preferred
22

VP, Identity Access Management Resume Examples & Samples

  • Design, implement, support and continuously improve IAM technologies and supporting processes
  • Lead and influence teams consisting of cross-functional, onshore/offshore personnel and virtual groups; directly supervise staff, assign responsibilities to team members, monitor progress and hold teams accountable
  • Act independently to deliver program to schedule, budget and scope; support provided as required and requested, and is self-driven and motivated
  • Ensure business goals are met for business stakeholders
  • Creating a written plan and strategy for meeting targets
  • Develop and execute reporting mechanisms to keep stakeholders well informed
  • Work with vendor team members (engineers, project managers) to deliver milestones
  • Bachelor Degree in Computer Science or other related field
  • 5 years’ experience with various IAM solutions
  • Successful background in deploying and managing IAM solutions
  • Deep understanding of Authentication & Authorization technologies such as Active Directory, LDAP, 2-Factor Auth & various Single Sign On solutions
  • Deep knowledge of proven IAM procedures and best practices
  • Expert knowledge with integrating IAM technologies with diverse directories and infrastructures
  • Effective in project management
  • Excellent with communication skills
23

Director, Identity Access Management Resume Examples & Samples

  • Define, design, build, testing, and rollout of the enterprise IDM and Access Management solutions in collaboration with internal and external resources
  • Serve as a trusted adviser to the business stakeholders and understand their core business processes, business priorities which can be enhanced using IDM solutions
  • Provide technical Engineering and vision for customers' application platforms
  • Ability to support negotiations on scope of work as well as manage work with outside vendors / integrators. This includes SOW, MSA, NDA's, along with full financial tracking and defining business benefits
  • Contribute and review IDM and Access Management solution design: ensure innovation, security, and business requirements are met, while also keeping a keen eye on improving the associate's experience with technology
  • Define an enterprise IDM Engineering strategy, with a roadmap of key deliverables and timelines, and deliver consistently
  • Mentor other members of the team on IDM best practices
  • Maintain up-to-date knowledge by researching new technologies and software products, participating in educational opportunities and conferences, and reading professional publications
  • Foundational knowledge of Identity Management technologies such asSailPoint, PingID, CA Minder Suite
  • Significant experience working with large tier security vendors leading RFI/RFP's and contributing to industry standards and working groups
  • A true technical director that inspires creativity and technical leadership from his/her team. A leader focused on the execute component that is agile and understands how to map the business needs to
  • Participating in the definition and leading technical programs that support the IIS security strategy and architecture for security services, mechanisms and safeguards for a broad reaching information security program
  • Working in active partnership with stakeholders (Office of the Global CISO, IIS Security Strategy and Architecture teams, IIS Policy and Compliance Organizations, Network Engineering Organization, and the Business| parallel technical teams) to understand often unique business requirements and develop supporting security domain expertise and technical objectives that will enable the growth and evolution of Comcast's CybrSecurity Identigy Management program
  • Ensuring that operational and incident trends and observations are considered with regard to the evolution of the company's enterprise security architecture capabilities
  • Communicating and working through conceptual design (CCD-HLD) and (SLD) system level design to design in compensating controls, increase visibility/telemetry and IR capabilities
  • Designing and evaluating platforms and structure for integrating diverse security toolsets and technologies
  • Providing consulting function to IIS leaders in addressing their IDM and Access Management posture
  • Promoting a consistent risk vocabulary for application risk and controls and aligning that vocabulary with related compliance and business risk disciplines within the organization
  • Developing metrics that demonstrate current technology implementation roadmaps, indicators of progress, and alignment across IIS teams for those activities
  • Supporting other senior leaders in Information Risk Management in leveraging those metrics as part of the overarching risk and operational dashboard
  • Formally and informally responding to customer and regulatory requests with regard to application security services, mechanisms and safeguards (this includes regular communications with regulatory, privacy and legal stakeholders and active participation in both internal and external audit activities)
  • A true technical director that inspires creativity and technical leadership from his/her team. A leader focused on the execute component that is agile and understands how to map the business needs to viable technology solutions. An extremely technical leader and SME Identity Management Technologies and their implementation in large scale environments
  • Working under extreme pressure and tight deadlines in a calm and collaborative fashion leading from the front
  • 5+ years of experience leading IDM Engineering teams and building Access Management Platforms and Solutions
  • 10+ years of leadership and mentoring experience in hands-on and rolling up your sleeves management
  • 10+ years of experience managing and providing technical leadership for complex enterprise security projects/programs for a large enterprise organization
  • 10+ years of experience with Identity Management technologies and implementations
  • Specific experience managing projects / programs from concept through implementation (supporting oversight processes) using a structured project management methodology across the entire project life cycle (not a project manager)
24

Identity Access Management Resume Examples & Samples

  • Develop and maintain business process maps and supporting documentation
  • Work with a Global team to ensure Certification tasks and responsibilities are completed in a timely basis
  • Act as the liaison between the CIB IAM teams, business units, various technology and support teams in discovery efforts to produce audit related deliverables
  • Assist in the design, development and testing of new reports from CIB IAM
  • Ability to respond to ad hoc requests and queries from internal sources regarding Certification, Termination and Transfer processing
  • Support reporting associated to CIB IAM project status, control and service metrics, other internal reporting projects
  • Support project management efforts within CIB IAM – including (but may not be limited to) the following: aid in the creation of project charters, analysis for value capture, document business and functional requirements (BRDs/FRDs)
  • Support CIB IAM’s effort in partnering and coordinating with Information Owners, IRMs, ADMs and other JPMC control teams to identify/suggest efficiencies to CIB IAM control procedures
  • Provide expertise in technology control practices: information risk management, IT control policies, etc
  • Minimum 3-5 years experience in application development, production/customer support, information security operations and/or technology risk management
  • Strong ability to analyze and produce metrics for Senior Level Reporting
  • Strong knowledge of Identity and Access Management controls, principles, methods and regulatory related obligations preferred
  • Must have 1-2 years experience with two or more of the following systems: IDCert, IIQ, AACT CAR, ARMS, RSAM, IO Console, EURC, IBID/RMT, Phoenix, ITRC, Alacrity / Service Center (or a similar ticketing system)
  • Some experience with any of the following is highly desirable: IIQ, AACT CAR, VDS, DCR, DO, NEIM/FARS, EPV, GEI, ID Integrate, MIT, IRT, CRT
  • Proficiency with Sharepoint site administration / development desired
25

Identity & Access Management Services Specialist Resume Examples & Samples

  • Security Architecture fundamentals, Security Processes and Standards,
  • Microsoft Office Tools (Word, Excel, Visio, PowerPoint) - The ability to create high quality documentation such as Presentations, Reports and completing metrics and spreadsheets
  • IT Systems - A fundamental understanding of IT Systems and Services covering Virtualisation, Mainframes, Cloud Services, Hosting Services, Desktop
  • Systems Development - A fundamental understanding of IT Systems Development
  • Networking Technologies - An understanding of the fundamentals of IT networking technologies, the basic building blocks used and how they support a secure architecture
  • Czech: Fluent or Mother Tongue
  • Teamwork, Adaptability
  • Listening, High Integrity & work ethic
  • Communication, Positive demeanor
26

Identity & Access Management Engr-ping Federate Resume Examples & Samples

  • Bachelors degree or higher in engineering or a related field with 6-8 years of IT infrastructure integration experience with a recent focus on security
  • Minimum 3 years experience working with Ping Identity Ping Federate (or CA/Netegrity Siteminder or related WAM technology)
  • 5 years working with UNIX
  • Web Access Management, SSO, Authentication, Identity Federation, SAML
  • Candidate will support multiple projects requiring effective multi-tasking and time management skills
  • Candidate must have good communication skills and be able to work as part of a geographically dispersed team
  • Shell scripting
  • LDAP and/or database experience
  • Strong Authentication / PKI
  • Scripting experience desired as is programming knowledge to understand APIs and assist with prototype development
  • Web Servers, Application Servers, Internet technology, Information security
27

Cybersecurity & Privacy Identity & Access Management Manager Resume Examples & Samples

  • Supervision and development of staff on multiple projects, business development, and communications with executives
  • Identifying and addressing client needs: building solid relationships with clients; developing an awareness of relevant services; communicating with the client in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and resolving potential conflicts as a leader
  • Identifying and addressing client needs while displaying the ability to contribute to the development of a business vision and manage implementation efforts with complex project management capabilities
  • Managing and/or contributing to project planning, engagement administration, budget management, and successful completion of engagement workstream(s)
28

Manager Identity & Access Management Resume Examples & Samples

  • Candidate should have overall 2-8 years of information technology (IT) experience and specifically three to four years in implementing medium/large Identity and Access Management projects including the following product suites
  • CA R12 Identity Management
  • Sun Identity Management
  • IBM Tivoli Identity Management
  • Oracle Identity Management
  • Experience in following technologies would be an advantage: LDAP, PKI, SSL, JNDI, etc
  • Should have experience in delivering IT projects, including requirements analysis, defining architecture, and conducting detailed technical design, development, and lead solution delivery
  • Should have experience in carrying out application integration with the IAM solution
  • Should have experience in implementing at least one complete IAM SDLC engagements projects, including requirements gathering, analysis, design, development, testing, deployment, and application support
  • Should have had direct client experience, including working with client teams in an on-site and offshore mode
  • Should have ability to manage multiple project tasks within and across projects, as required
  • Should be focused on identifying and driving initiatives that are relevant for the project delivery and will help factor reusability as well as related benefits
  • Desirable to have certifications in security domain, such as CISSP and CISA
  • Strong programming background
  • Medium to advanced expertise in any of the following products
  • Oracle - Identity & Access Management
  • Tivoli Access/ Identity Manager
29

Manager, Identity & Access Management Resume Examples & Samples

  • Develop roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Partner with Architecture teams to develop solution designs
  • Maintain deep technical and business knowledge of industry directions and trends in the area of system engineering
  • Drive to deliver technology and products in the roadmap on schedule and with the highest quality
  • Provide advice, guidance and direction to carry out plans and procedures, ensuring schedule attainment, product development process adherence, performance and budget targets are met
  • Provide escalation support for operations and support teams, including root cause analysis and preventative analysis
  • Minimum of five years of experience in an IT environment with three years of experience managing and supporting projects
  • Bachelor's degree in computer science or related discipline from an accredited college or university
  • Experience with Microsoft Active Directory, X.509 Public Key Infrastructure Certificates and CRL, SCEP and Certificate Lifecycle Management tools
  • Firm understanding of authentication and authorization technologies and protocols such as Kerberos, certificate, basic, forms-based and multi-factor authentication etc
  • Understanding and experience with Cloud Identity as a Service such as Microsoft Azure Active Directory, Identity Federation protocols such as SAML2, WS-Federation, OAuth, OpenID Connect etc
  • Experience with Identity & Access management tools is a plus, such as IBM Security Access Manager for Web and Mobile, Tivoli Directory Server, Tivoli Federated Identity Manager, Tivoli Identity Manager and DataPower IND2016
30

Identity & Access Management Resume Examples & Samples

  • Support team functions by.
  • 5 + years professional Information Technology experience
  • General knowledge of Access Administration and /or IT Risk Management
  • Experience with internal tools such as ID-Cert, IBID, RSAM, EPV, SEAL, ARMS, TAMS and other standard access management tools is preferred
  • Knowledge and understanding of Identity and Access Management controls, principles, methods, and related regulatory obligations is preferred
  • Self-motivated with excellent analytical, communication and problem-solving skills with ability to independently develop solutions to complex analytical/data-driven problems
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing positive relationships
  • Must be able to execute in a challenging environment and handle a large volume of work
  • Highly proficient in Excel, Word, PowerPoint, SharePoint and Visio
  • Proficient in Project, and Access
  • Bachelor’s Degree in a business or information technology related field
31

Identity & Access Management Expert Resume Examples & Samples

  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role-based access control, authentication, and authorization, such as SailPoint, CyberArk, PowerBroker, Okta, Active Directory, or ForgeRock
  • Experience in devising IAM strategies and implementing IAM solutions for complex enterprise environments with diverse user populations
  • Experience with one or more IAM products, including directories, multi-factor authentication, provisioning tools, and single-sign-on tools
  • Ability to work with teams and be flexible to work for a diverse set of clients
  • Experience with Cloud-based systems and deploying IAM to Software as a Service solutions
  • Experience with designing and deploying IAM process workflow
  • BA or BS degree in CS, IT, Engineering, or a related field preferred
32

Identity & Access Management Cyberark Manager Resume Examples & Samples

  • Requirements analysis, strategy, design, implementation, operations and application/business integration
  • Performing as a team member: understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback; providing guidance, clarification and feedback to less experienced staff
  • Contributing to business development opportunities and/or engagements from pre-sale and initial scoping through final delivery and sign-off
  • Leading teams to generate a vision, establish direction, and motivate team members
33

Identity & Access Management Resume Examples & Samples

  • Provide support and deliver on requirements for Identity and Access Management initiatives as required to support the planning ,design and execution of the initiatives and on-going access control activities
  • Support CIBC's key Identity and Access Controls as required
  • Develop a sustainable Policy Management practice as it relates to Identity and Access Management
  • Facilitate discussions with business groups across the enterprise to gain understanding of access management business rules, such as segregation of duties, to enable definition of Access Management Policies
  • Work with business groups and their supporting technology teams on defining mapping between Policies and business applications; identifying required entitlements per Policy
  • Maintain Policies and all associated data, rules , and processes. Ensure proper governance of Policies; Policies verification on a regular basis
  • Maintain risk and operational metrics related to Policies
  • Work with the project teams on implementing the defined Policyies within Acsess & Identity Management (AIM) solution
  • Support the integration of new subsidiaries to CIBC’s Identity and Access Management solutions and processes
  • Research the latest methodolgies and approaches for effective and efficient Policy Management practices
  • Champion the improvement of identity and access management processes, controls and communications related to Policies across stakeholder groups
  • Where required, consult with Technology and LOBs regarding access control related issues
  • Prepare management and/or executive reporting and other presentation materials
34

Identity & Access Management Resume Examples & Samples

  • Develop a sustainable Role Management practice as it relates to Identity and Access Management
  • Facilitate discussions with business groups across the enterprise to gain understanding of business functions and roles & responsibilities to enable definition of business Roles
  • Work with business groups and their supporting technology teams on defining mapping between business Roles and business applications; identifying required bundling of entitlements per role across multiple business applications
  • Maintain business Roles and all associated data, rules including access bundling rules, and processes. Ensure proper governance of Roles; roles verification by Role owners on a regular basis
  • Maintain risk and operational metrics related to Roles
  • Work with the project teams on implementing the defined business Roles within Access & Identity Management (AIM) solution
  • Research the latest methodologies and approaches for effective and efficient Role Management practices
  • Champion the improvement of identity and access management processes, controls and communications related to Roles across stakeholder groups
  • Lead a small group of roles, policies, and access management specialists
  • Relationship Management--Ability to establish, build and maintain healthy working relations and partnerships with clients, vendors and peers
  • Written Communications--Ability to produce a variety of business documents that demonstrate command of language, clarity of thought and orderliness of presentation
  • Interpersonal Relationships--Knowledge of approaches, tools and techniques for working with individuals and groups in a constructive and collaborative manner
  • Leadership--Knowledge of approaches, tools, and techniques for gaining the cooperation and support of others
  • Service Excellence—Act as a service ambassador across CIBC and classify, summarize and prioritize client/partner feedback in a continuous service enhancement capacity
35

Identity Access Management Specialist Resume Examples & Samples

  • 1Conduct functional testing of the IDM Solution
  • 2Conduct integration testing of the IDM Solution
  • 3Conduct regression testing of the IDM Solution
  • 4Conduct capacity and performance testing of the IDM Solution
36

Manager, Identity & Access Management Resume Examples & Samples

  • Participate in development of roadmaps and participate in the standards process for Identity and Access Management (IAM) solutions
  • Partner with architecture teams to develop solution designs
  • Provide advice, guidance and direction to carry out plans and procedures, helping to ensure schedule attainment, product development process adherence, performance and budget targets are met
  • Five years of experience in an IT environment with three years of experience managing and supporting projects
  • Experience with the IBM suite of access management tools preferred including: IBM Security Access Manager for Web and Mobile, Tivoli Access Manager, Tivoli Directory Server, DataPower, IBM Security Access Manager for Mobile, and Tivoli Federated Identity Manager
  • Experience with the IBM suite of identity management suite of tools preferred including: Tivoli Identity Manager and IBM Security Identity Manager; experience with Microsoft Active Directory
  • Experience with other identity and access management systems is a plus
  • Firm understanding of authentication and authorization technologies and protocols including: Kerberos, SAML, OATH, OAuth, federation, certificates, multi-factor authentication and XACML IND2016
37

Identity & Access Management Lead Resume Examples & Samples

  • Oversee the daily and timely operation of IAM applications and related systems, including identity provisioning and administration, configuration maintenance, log monitoring, and incident investigation
  • Support the CISO and SRI staff in developing and executing strategy for the continual evolution of information security practices. Assist the CISO in the communication and distributed implementation of such strategies
  • Support the development and engineering of security technologies and management tools including but not limited to infrastructure and application vulnerability assessment and management, endpoint protection, logging and monitoring, and data loss prevention
  • Manage development of information security architecture and supporting patterns in alignment to information security and IT strategies and compliance requirements
  • Support the execution of information security policies and standards, including development of appropriate technical standards, guidelines, procedures and configurations
  • Create and communicate technology roadmaps to enable SRI and gain buy-in from key stakeholders
  • Support requirements definition, planning, technology selection, and implementation of role based access control, multi-factor authentication, authorization control, and mobile device management (MDM)
  • Plan and manage activities of technical implementation teams and provide accurate estimates and timely updates to project management
  • Coordinate with business divisions to review and restructure security classes, groups, and profiles to ensure accuracy and compliance with requirements
  • Develop, implement, and administer access control processes that support the creation, modification, and termination of system level user accounts and associated access rights
  • Perform analysis, design, documentation, and testing to ensure system performance and functionality
  • Measure and report on the effectiveness and efficiency of IAM activities
  • Manage end user requests and act as liaison between end users and application developers
  • Monitor service requests received through the IT Service Desk to facilitate timely resolution
  • Document the design, architecture, and operating procedures of information security systems
  • Participate in risk assessments, audits, IT incident response, disaster recovery, and business continuity planning
  • Develop program and processes for user awareness, user account provisioning, and workflow automation
  • Determine, develop/acquire, implement, maintain and utilize processes and tools that adequately control and monitor the security environments of ITS supported platforms
  • Extend to divisional IT organizations the utilization of monitoring and control processes and tools as appropriate for use in application systems security environments
  • Develop, implement, and administer access control processes that support the creation, modification, and termination of machine level user accounts and associated access rights
  • With line-of-business coordinators, review and restructure security classes, groups, and profiles to ensure accuracy and compliance
  • Bachelor’s or Master’s degree (preferred) degree in Computer Science, Management Information Systems, Engineering or other related field. Professional certifications such as CISSP, CISA, CISM, and PMP preferred
  • 6+ years of combined experience in the following areas: IT operations, application development, identity administration, and/or information security operations
  • 2+ years of experience with managing and configuring enterprise level identity and account management platforms including entitlement and workflow management, as well as target system provisioning configuration
  • Must be a highly motivated, self-reliant team player who is comfortable with managing and prioritizing multiple tasks and deadlines
  • Demonstrated ability to design and configure policies and workflows to achieve system objectives, including audit and regulatory requirements
  • Solid understanding and working knowledge of Identity & Access Management applications, including MS Active Directory and Okta platforms
  • Familiarity with the SAML protocol, Single Sign-On systems, PKI, SOA, and web technologies and services
  • Operational experience with monitoring and analyzing performance and capacity metrics to determine current health and proposed platform growth
  • Knowledge of applicable security and privacy practices, standards, and regulations such as NIST, FIPS, FERPA, HIPAA, ISO 27001/2, COBIT, and SANS
  • Analytical and problem-solving skills and ability to apply those skills to information security privacy issues
  • Working knowledge of current project management principles, processes, methodologies, and tools
  • Fluent in IT security terminology and frameworks (e.g. ITIL)
  • Prior hands-on professional experience must include combination of: VPN, IDS/IPS, DLP, digital certificates, smart cards, biometrics, content/e-mail filtering, data encryption, and application security
  • Experienced in promoting and executing based on software and systems development methodology
  • Ability to establish and maintain effective work relationships with all levels of personnel both internally and externally; e.g. leadership, executives, clients, vendors, and business division staff
  • Ability to prioritize and handle multiple tasks simultaneously
  • Attention to detail and follow through including the ability to document work
  • The ability to provide support after normal business hours as needed
  • History of and commitment to ethical behavior and ethical full disclosure
  • Experience managing enterprise-wide IAM systems, including integration with ERP, HCM, and SaaS
  • Knowledge of leading governance, risk, and compliance (GRC) and data privacy laws and practices
  • Knowledge of compliance auditing and evaluation techniques, technologies, and methodologies
  • Knowledge of leading web, application, and database security practices
  • Experience with MS SharePoint
38

Identity & Access Management Specialist Resume Examples & Samples

  • Act as subject matter expert, responsible for the developing and enhancing Morgan Stanley’s RADIUS infrastructure as well as architecture
  • Development of tooling and software extensions
  • Work as a member of the global RADIUS engineering team
  • Debug and solve native RADIUS protocol issues as well as system integration issues
  • Design, develop, test and deploy Nokia RADIUS server side extensions
  • Maintain, patch, build, test and deploy Nokia RADIUS components
  • Excellent understanding of RADIUS protocol and its implementation
  • Thorough understanding of core network and security concepts, specifically Identity and Access management concepts including authentication, authorization and accounting (AAA)
  • Strong Java development experience
  • Development experience for Perl, Python
  • Good communication and technical documentation skills
  • Good Understanding of UNIX / Linux operating system as well as basic system administration skills
  • Excellent understanding of Software Development Lifecycle Management concepts
  • Experience operating in a large, global, compartmentalized enterprise environment
  • Established track record of process analysis optimization and automation
  • Certifications desired - CISSP, CCNA
39

Identity & Access Management Resume Examples & Samples

  • Become a tech SME for our flagship products family of Identity and Access Management
  • Analyze customer problems & service requests and resolve them within agreed service levels
  • Use troubleshooting/ debugging techniques and tools to analyze technical problems
  • Engage Development teams for issues that need a resolution through code fixes
  • Increase IBM's Self-Help knowledge base, by creating knowledge articles wherever needed
  • Provide feedback to the Development Team on Product feature enhancements. Provide Test cases to the Test Team
  • Product related assistance to Pre-Sales / Sales/Deployment Teams
  • Create wikis, blogs, tech-notes, technical trainings, webcasts for educating Customer and Business Partners
  • Provide technical support for critical issues on Weekends/ Public holidays on rotation basis
  • Especially for Unix / Linux. Troubleshooting computer setups, networking issues. Strong OS concepts, OS security, Inter-Process communication, shell scripting
  • Clear and effective communication skills(oral and written English)
  • Excellent email and telephone etiquette
  • Listening skills. Analytical and problem solving skills
  • Ability to work as a part of a global team, despite the diversity(cultural, geographic and other differences)
  • Readiness to work in morning / evening shifts. Weekend of rotation basis
40

Director of Identity Access Management Resume Examples & Samples

  • Ability to provide strategic leadership in the development and implementation of solutions to support access authentication, authorization and provisioning while standardizing and streamlining IT security administration processes
  • Ability to govern and continually improve processes and procedures that focus on risk-based access controls; i.e., providing the least allowable access required for business operations, including role-based access models
  • Ability to lead the IAM team which includes delivering automated access security services, managing the quality of services delivered, developing team skills and fostering a high performance culture
  • Ability to generate innovative ideas and appropriately challenge the status quo. Identify opportunities to improve logical access provisioning processes
  • Ability to collaborate with control owners and stakeholders across enterprise to develop and maintain logical access controls to safeguard MGMRI data and consumer information
  • Ability to monitor automation performance by including bench-marking and tracking performance against service improvements
  • Ability to provide IAM program direction, subject matter expertise and training to control owners and stakeholders
  • Ability to execute all responsibilities based on a solid knowledge of IT security and access management best practices and processes
  • Ability to supervise staff in delivering IAM services
  • Ability to deliver Role Based Access Models (RBAC), entitlement review and certifications process
  • Ability to manage a phased-release approach to product development and testing; implements, manages tools for
  • Ability to Work closely with development teams and technical leads to build automation standards
  • Ability to oversee automating application deployment and environment configuration management
  • Working knowledge in Security Administration, Identity and Access Management along with one or more of the following governance and compliance concepts, practices and procedures, which includes but is not limited to ISO, COBIT, NIST, PCI-DSS, SOX, Gaming MICS
  • Strong problem solving, logical thought processes and analytic abilities
  • Exhibits a strong interest in and aptitude to be an IT security advocate for Information Technology
  • Highly ethical and discreet, with ability to maintain confidentiality and objectivity
  • Excellent interpersonal skills, including the ability to support all clients and stakeholders, while ensuring adherence to the company’s logical access and security administration standards and policies
  • Maintains a professional, neat and well-groomed appearance, adhering to MGM Resorts International standards
  • At least 10 years’ experience in IT Security with focus on user access management and/or security access automation tools
  • Prior leadership experience including working directly with executive management
  • Ability to lead and prioritize in a high pressure environment
  • Familiar with IT governance and compliance concepts, practices and procedures, which includes IT General Controls, PCI-DSS, SOX and Gaming MICS (Minimal Internal Control Standards)
  • Excellent communication, interpersonal, facilitation and presentation skill
41

Senior Identity & Access Management Specialist Resume Examples & Samples

  • ​Design, deploy and implement internal Privileged Identity Management and Identity & Access Management Tools
  • Develop and maintain operational framework for Privileged Account Management
  • Provide expertise in workflow, policy and external integration with IAM tool
  • Acts as an escalation point for the team and helps remove barriers that prevent IAM policies and processes from moving forward
  • Java & REST Development with the IAM Tool Framework
  • ForgeRock IDM knowledge
  • Java Programming or other Language
  • Bachelor's degree preferred and 5-7 years of related work experience or an equivalent combination of education and experience
  • Excellent written and verbal communication skills. Ability to explain technical concepts to technical or non-technical personnel
  • Ability to read, write and interpret business and technical documents
  • Basic math functions such as addition, subtraction, multiplication, division and analytical skills
  • Strong leadership profile and 4/5+ years hands on experience with implementing and supporting Identity and Access Management and Governance software and solutions, such as SailPoint, Hitachi, EMC, Oracle, Ping and CyberArk
  • Ability to work a flexible schedule based on department and company needs
  • This position involves regular ambulating, sitting, hearing, and talking. May occasionally involve stooping, kneeling, or crouching. May involve close vision, color vision, depth perception, and focus adjustment. Involves use of hands and fingers for typing on keyboard and using a mouse. May be a need to move or lift items under 10 pounds
42

Identity Access Management Resume Examples & Samples

  • Excellent knowledge of Microsoft Active Directory, including DHCP, DFS, DNS and WINS
  • Excellent knowledge of Microsoft Forefront Identity Manager / Microsoft Identity Manager
  • Working knowledge of Windows Server 2012R2 or higher version
  • Knowledge of Microsoft AD integration with Microsoft O365 Cloud/ Microsoft Azure Active Directory
  • Working knowledge of Visual Basic and Visual Studio preferred
  • Previous experience implementing Role-Based Access Control (BHOLD) preferred
43

Senior Manager Identity & Access Management Resume Examples & Samples

  • Responsible for the reliability and uptime of the Rackspace Identity and Access Management systems
  • Ensure that Rackspace systems can conduct the following: automate access requests, enforce policies, ensure compliance, enable delegated administration, as well as ensure Role Based Access Controls
  • Leverage change management procedures to ensure high uptime and consistent results
  • Accountable for providing information to complete security and compliance audits
  • Manage teams of technical engineers
  • Leverage project management skills to facilitate medium to large projects to ensure projects are completed on time and according to quality standards
  • Research and identify system areas that need to be advanced in a proactive manner; this includes solutions that can be deployed off the shelf and creating new solutions via our Software Development teams
  • Assess and communicate risks based on product complexity, resource and/or timeline constraints
  • Work closely with other groups throughout the company, including being a technical resource for internal groups and communicating frequently with engineering and development teams to help them improve the operational efficiency of the systems you manage
  • Focuses time on hiring, coaching, and developing a solid team in order to accomplish the above tasks
  • Helps set development goals for your employees and provide regular feedback to them so that they always know where they stand in your organization
  • Continuously finds ways to improve the business through better processes and people
  • Able to assist in planning the strategic vision of the organization for the next 5 years
44

Identity & Access Management Specialist Resume Examples & Samples

  • They will liaise with our client and third parties in respect of patching, maintenance and capacity issues for the systems in question
  • Maintain Identity and Access Management strategies and solutions within our client’s environment for both corporate as well as external facing applications
  • The resident would work closely with the Infrastructure Security and Risk Management teams to ensure all design and development activities across platforms adhere to industry best practices and regulations related to data security, Access Control or Security initiative
  • Manage operations within the IAM environment at the client, including application patching and upgrades and certificate management
  • Design and implement standards and processes for access enforcements (authentication and authorization protocols) and access governance (role management, certification, logging monitoring etc.)
  • Establish an automated process for full user lifecycle management (provisioning/de-provisioning) of systems, ensuring process will comply with regulatory standards, including PCI DSS
  • Implement procedures and controls to ensure password settings, administration and delegation of rights, privileged access management in compliance with the client's security standards
45

Identity & Access Management Solutions Resume Examples & Samples

  • Develop complex IAM components required to manage legacy (non-web based) applications, including but not limited to custom adapter using TDI development
  • Document and train team to support solutions architected and developed
  • Provide IDM developers with technical development direction and coaching
  • Recommend, document, and socialize design of underlying technical solutions
  • Work with technical teams and partner organizations to validate that technical components have been configured appropriately
  • Assist with the prioritization of managed system / application rollouts
  • Monitor and assess stakeholder needs and priorities for management of user profiles and access rights
  • Assist with the development and implementation of policies and procedures across IDM System instances
  • Ensure appropriate review of issues encountered in steady state production environment, consolidating all information from team members, and communicating root cause and proposed resolution to management
  • Contribute to the development of components to report on performance against defined SLAs
  • Ensure that the level of error handling required to ensure that all solution issues are identified and reported upon to the appropriate parties has been built into all components, facilitating alignment with SLAs
  • Contribute to the maintenance of IDM System configuration, including Policies, Services, Reports, and Lifecycle Rules
  • Establish the design, and contribute to the maintenance connectors and resource adapters to managed resources
  • Develop and manage SSO implementations from an associate, B2B, B2C perspectives
  • Assist with the management of configuration and ongoing support
  • Review code and configuration developed for workflows, adapters and business rules, validating alignment with overall solution design
  • Support bulk user loads for processing large scale user adds, modifications, and/or revocations
  • Troubleshoot complex technical issues being encountered by end-users, and work with the team to ensure that the appropriate actions are taken to address such issues
  • Escalate incident recurrences to Management for review
  • Architect, configure and maintain the IDM System components
  • Review and approve / reject change requests based upon the validation that all necessary change management requirements have been fulfilled from a Technical standpoint
  • Diagnose and resolve hardware, software, and user application issues
  • Monitor IDM System performance and collaborate with hardware and software support to align processing and storage capacity accordingly
  • Implement IDM System policies, procedures, and configuration standards
  • Monitor the IDM System infrastructure for potential security vulnerabilities and taking appropriate resolution steps
  • Monitor IDM System alerts and error conditions
  • Propose IDM System enhancement and/or integration designs
  • Implement appropriate data classification controls, user groups, and roles within the IDM System, addressing local privacy and data protection requirements
  • Support testing of IDM System enhancements and integrating with managed platforms and applications, resolving technical issues as appropriate
  • Coordinate IDM System upgrades and the application of security patches
  • Monitor IDM audit data regularly for security and policy violations
  • Notify management of continued issues being introduced through current processes, or due to potential lack of clarity around appropriateness, resulting in inappropriate actions being taken by the team
  • Participate in information gathering sessions with business users, collecting requirements, and communicating the appropriate design to meet collected requirements to team members
  • Participate in cross-team design reviews, providing teams with guidance and direction based upon best practices for Sysco
  • Train team members on the appropriate means of dealing with specific requests and/or issues, from a technical, procedural, and communication perspective
  • Ensure that significant and/or questionable requests and/or issues are appropriately escalated to management
46

Dir, Identity & Access Management Resume Examples & Samples

  • Be an expert in building, executing and managing enterprise I&AM initiatives in a complex organizational environment
  • Drive the development and implementation of standard processes that result in effective methods for transferring implemented solutions to security operations
  • Demonstrated experience managing the demand/supply of project resources and tracking allocation
  • Demonstrate an ability to influence all project and portfolio stakeholders; communicate highly relevant information to both executive leaders and individual contributors in an effective manner
  • Be recognized as an Industry Expert in the field of Identity and Access Management
  • Bring a deep background and broad experience in Identity Management, Information Security or related business areas and expert understanding of business process, scope and risk management, and scorecard/dashboard development
  • Demonstrate the ability to effectively collaborate with Directors, Managers and Team Members in the pursuit of measurable outcomes and results
  • Manage and lead a team of high performing individuals who create I&AM solutions to meet current and future needs for Nike
  • Develop and manage a project portfolio that ensures consistency and transparency for approximately $5 million/year in technology project spend
  • Have the ability to effectively work cross-functionally with and through business and IT Leaders to build consensus and drive results
  • Need to demonstrate a proven track record of successfully delivering large I&AM project-portfolios in a fast-paced environment with accountability for deadlines and value propositions
  • Manage project budgets and scope, and conduct resource planning for risks that are proactively identified
  • Develop and employ strategies to bring strategic alignment between technology and business stakeholders at NIKE
  • This role reports to the Senior Director of NIKE Corporate Information Security Architecture and Engineering
  • A Bachelor's degree in Business, Project Management, Information Technology or related field. MBA and/or CISM, CISSP preferred
  • 8-12 years' experience leading and managing teams that deploy large-scale I&AM projects; should include comprehensive experience as a business/process leader or as a leader in an IT role
  • Demonstrated experience managing direct reports, as well as teams within large cross functional projects
  • Proven track record of being results orientated with demonstrated ability to achieve aggressive goals
  • Exceptional communication skills, including the ability to gather relevant data and information, actively listen, dialogue freely, verbalize ideas effectively, negotiate tense situations successfully, and manage and resolve conflict
  • Proven presentation and facilitation skills
  • Budget management experience of a multi-million dollar portfolio
  • Demonstrated expertise of building a consensus across business partners and technology leaders, and influencing successful outcomes
  • Must excel working in team-oriented roles that rely on ability to collaborate with others
  • Experience working successfully in a high matrix organization
47

Identity & Access Management Solutions Resume Examples & Samples

  • Provide direct leadership and management of all IAM functions
  • Actively lead and manage IAM programs to ensure on time delivery, budget and quality goals are met
  • Analyze service offerings, program portfolios and define success / failure metrics and ensure the tracking and reporting, status updates of all metrics
  • Lead and drive definition, implementation and closure of IAM projects, including requirements, project plans and resource needs with stakeholders and within team resource
  • Assist in the development and execution of the overall enterprise security roadmap as it pertains to IAM Lead the innovation and championing of IAM processes/methodologies at all levels across the firm
  • Ensure understanding and implications of third party technologies solutions that control access
  • Assist in maximizing investment decisions by understanding the capabilities of existing IAM solutions and aligning with business strategy
  • Ensure that ongoing training/awareness of IAM is delivered to internal employees and team members
  • Lead the optimization of processes and controls, with a goal of reduce vulnerabilities and mitigation of IAM risks
  • Partner with business leads to drive the adoption of IAM services Manage staff in accordance with organization’s policies and applicable regulations
  • Responsibilities include planning, assigning, and directing work; appraising performance and guiding professional development
  • Bachelor’s Degree in Computer Science or related field; Graduate degree highly desired
  • 10 years IT management experience 5 years developing/supporting/architecting processes, policy and or tools for large scale Identity and Access Management solutions
  • Minimum of 5 years of progressive experience managing security operations initiatives, experience in successfully deploying IAM programs
  • Knowledge and experience in infrastructure, networking, databases, authentication and authorization and directory services Advanced security certifications a plus (CISSP Preferred)
  • In-depth knowledge and solid experience of the IAM discipline across multiple IAM functions
  • Demonstrated track record of developing and implementing an IAM roadmap that meets security requirements and appropriate industry standards
  • Demonstrated success in the design and development of security solutions that adhere to applicable policies and standards
  • Extensive knowledge across a broad range of identity and access management technologies
48

Identity Access Management Resume Examples & Samples

  • Responsible for analysis, design and development of the access request workflows in the firm approved request tools, in comformity to audit set standards
  • Ensures application workflow onboarding requests are initiated, processed timely and accurately
  • Document access workflow onboarding requirements, initiate calls/meetings, prepare an onboarding plan and manage the lifecycle of the process
  • Work with a team of workflow developers/project administrators, partners and report to managers in a global team environment
  • Analysis of the access control gaps across the application workflows in request tools, documentation of the RCA and submission of the attestation evidences
  • Data extraction from databases of various in-house tools
  • Access provisioning failures monitoring and remediation
  • Identify ways to increase efficiencies of processes
  • Gather operational metrics and update progress in trackers
  • Document and update related procedures in SharePoint environment
  • Act as the liaison between the Application Developers, Database Administrators, Business Units, various technology and support teams
  • Partner and coordinate with Information Owners, Technology Control Officers and Application
  • 2-3 years of hands on analysis & development experience is preferred
  • Bachelor’s Degree in Engineering in information technology related field or equivalent experience in the Identity and Access Management field
  • Must have 1-2 years experience with one or more JPMorgan Identity and Access Management tools OR atleast 1 role based access management tools in the market
  • Project Management experience including solid knowledge of Identity and Access Management controls, principles, methods, SOX/SSAE16 and regulatory related obligations preferred
  • Solid understanding of the global banking business and operations
  • Solid knowledge of IT risk management frameworks/concepts preferred
  • Ability to facilitate meetings among stakeholders with diverse and sometimes conflicting points of view, including strong negotiation skills and developing strong client relationships
  • Highly proficient in MS Office Suite (Excel, Word, Project, PowerPoint, Access, SharePoint and Visio)
  • Working knowledge of SQL/Oracle queries is a must
49

Identity & Access Management Director Resume Examples & Samples

  • 8+ years of IT security and/or Governance Risk and Compliance related experiences
  • 4+ years working with Identity and Access Management solutions
  • 4+ years of experience in People/Personnel Management
  • Experience interfacing with executive leadership and making case for strategic change/improvements
  • Ability to manage, lead and motivate cross-functional teams including Engineers, Business Analysts, Project Managers, Administrators and Vendors
50

Service Manager Identity Access Management Resume Examples & Samples

  • You will be the first point of contact for all operational issues
  • Responsible for the IAM service, including ensuring continuous improvement and management
  • Ensure efficient delivery of IAM services and high user satisfaction
  • Manage service level agreements and contracts with vendors
  • Manage software updates, patching and testing
  • Support and define IAM implementation and upgrade projects
  • Ensure quality compliance with regard to following processes and documentation
  • Ensure timely communication and involvement of all relevant stakeholders including vendors, project teams, customers and architects
  • Bachelor or similar graduate degree in Engineering, Computer Science, Business Administration combined with additional relevant IT and business experience
  • 6+ years of experience working within IT Infrastructure
  • Very strong knowledge within IAM processes and governance
  • Strong ITIL process experience and understanding, such as with change and incident management
  • 2+ years of relevant experience in managing deployments of IAM solutions. Experience in managing Sailpoint is particularly valued
  • 2+ years of experience developing identity management strategies and supporting architecture and implementation plans
  • Strong broad understanding of security concepts, deployments and implications
51

Identity & Access Management Manager Resume Examples & Samples

  • Governs the identity lifecycle processes around roles, monitoring access control processes to ensure they are effective, efficient and in compliance with standards and control objectives
  • Manages and implements procedures to control information workflow for the addition, modification, and removal of user access across in-scope applications and resources
  • Provides advisory and consultation to system development projects around identity and access management requirements/controls
  • Create, update, and look for opportunities to continuously improve standards and procedures
  • Create and update access request forms to ensure a smooth, effective and compliant request process
  • Enforce policies and procedures to ensure an effective, efficient, and compliant operating environment
  • Ensure all access certifications are completed on time and accurately
  • On board additional applications as needed, including access certifications
  • Serve as the escalation point for all questions / issues impacting the Provisioning team from internal or external sources
  • Participates in internal and external audits
  • Complies with all applicable federal and state regulations
  • 31
52

Identity & Access Management Resume Examples & Samples

  • Edge commercial tools, assessing a client's current state and gaps, developing processes, and using excellent communication expertise to interact with executive leaders, business unit managers, and IT staff. Support a federal department by assessing current IAM capabilities, exploring the impact of new technologies and capabilities, developing strategies, deploying new IAM products, and integrating them with existing products to improve business operations, reduce security risks, and meet regulatory requirements. Provide support to unify the agency's identity management solutions, including credential management, identity management, public key infrastructure, access management, and identity federation using Active Directory Federated Services (ADFS), Dir SyncAzure Active Directory Sync (AADSync), eDirectory/Novell Identity Vault (IDV), Novell Secure Login (NSL), ActivIdentity ActivClient, Novell Identity Manager Password Sync Filters, Novell Identity Manager Drivers, and miscellaneous scripts
  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role
  • Based access control, authentication, and authorization, such as Active Directory Federated Services (ADFS), Dir SyncAzure Active Directory Sync (AADSync), eDirectory/Novell Identity Vault (IDV), Novell Secure Login (NSL), ActivIdentity ActivClient, Novell Identity Manager Password Sync Filters, Novell Identity Manager Drivers, and miscellaneous scripts
  • Experience with devising IAM strategies and implementing IAM solutions for complex enterprise environments with diverse user populations
  • Experience in consulting and communicating with clients at multiple levels of an organization
  • Experience with one or more IAM products, including directories, multi
  • Factor authentication, provisioning tools, and single
  • Sign
  • On tools
  • Knowledge of the engineering life cycle and change management
  • Ability to work with teams and show flexibility towards working for a diverse set of clients
  • Based systems and deploying IAM to Software as a Service solutions
  • Experience with testing
  • Experience with Web development
  • Knowledge of solution protocols, including SSL/TLS, HTTP, SAML, Kerberos, S/MIME, SCIM, and oAuth
53

Manager, Identity & Access Management Resume Examples & Samples

  • Minimum 7+ years of experience supporting or administering packaged or custom IAM solutions
  • Minimum 7+ years professional work experience in a large organization
  • Industry-adopted security certifications preferred (CIAM, CIPA, Security+, etc…)
  • Bachelor degree in a technical field preferred (e.g. Computer Science, CIS,MIS, Engineering)
  • Experience with User Provisioning \ Onboarding, RBAC \ Authorization models, SSO \ Active Directory
  • Proven ability to work in a Global Account Security or Identity Access Management program
  • Experience with Behavioral Analytics tools is a plus
54

Senior Director, Identity & Access Management Resume Examples & Samples

  • Strategic Planning– Develop and maintain a comprehensive vision and strategy of how IAM services can and will be used to accomplish department objectives of protecting our systems and data while facilitating new and existing business models highly dependent on technology
  • Program Management -Manage a large portfolio of IAM operational services and the pipeline of projects/tasks to create, evolve, and change them as needed. Various peers and partners will provide support from the Information Security and Risk Management (ISRM) and Enterprise Technology Services (ETS) organizationsincluding risk management alignment, project management, financial planning, and human resources
  • Operations– Build and lead a team (15-20 staff?) that delivers business critical control sets including
  • 8 + years cybersecurity/information security experience including 4+ years managerial experience
  • Minimum of 8 years’ experience in IAM services, security engineering, other IT, and/or technical risk management
  • Deep technical understanding of IAM and service lifecycles including capacity planning and change management
  • Strong management skills planning, organizing, leading, and measuring service driven teams
  • Strong interpersonal and communications skills to build/ maintain ongoing business relationships
  • Experience with compliance regulations/laws, security frameworks and standards (e.g., NIST, HIPAA, ISO, COBIT, OWASP, ITIL, etc.)
  • Ability to exercise and mentor others on good professional judgment and security-related ethics
  • Knowledge of the healthcare, distribution, or software industries is a plus
  • Experience with law enforcement, defense, or intelligence community a plus
  • OSCP, SANS/GIAC, CISSP or other similar professional certifications are a plus
55

Director of Identity & Access Management Resume Examples & Samples

  • Managing multi-functional teams responsible for service delivery
  • Strategic direction for Microsoft IT’s Identity and Access services
  • Lead direction, discussions, and decisions on end to end lifecycle management products and services
  • Identify service improvements and develop and design tools that will streamline the service to improve end-user experiences and lower operating costs
  • Understand the business and define what is technically needed to meet strategic objectives and the day-to-day running of the service. This includes identification and innovation of new service capabilities that meets customer and security requirements
  • Provide technical leadership to a cross functional operations team
  • Initiate and provide on-going technical leadership for projects within the team and department-wide as appropriate
  • Work closely with engineering groups providing feedback on pre-released software, and driving improvements into their products and services
  • Collaborate with other service teams to assist in solving their service problems when related to your services
  • Evaluate service feature requests, assist in prioritization, and analyze them for impact to operations and delivery cost
  • Communicate on a deeply technical level with product engineering and operations teams to improve and optimize both the product and the infrastructure
  • Provide recommendations and guide engineering and operations counterparts through technology adaptation stages of engineering and pilot deployment including but not limited to
  • Future technology
  • Product Group perspective
  • Complex business case/risk analysis for technology adoption/retirement
  • Maintaining working relationships with product group contacts, other business partners, and cross-company stakeholders
  • Development of technology solutions that satisfy and meet security requirements
  • Proof of concept technology analyses and production pilots
  • Technology solutions that satisfy & complement the business capabilities and requirements
  • Changing market conditions
  • Worldwide legal and regulatory requirements
  • Advances in technology
  • Lifecycle management
  • Technology standards
  • Business architecture requirements
  • 10-15 years’ experience in the IT industry with solid experience in security, systems engineering design and operational support roles interfacing with customers
  • Proficient understanding of Microsoft products, software lifecycle methodology. Moderate to deep knowledge of Identity Products
  • Previous experience deploying IT, Security or related solutions
  • Practical experience with ITIL/MOF - PMI/PMP is a plus
  • Strong problem resolution, judgment, communication and decision making skills
  • PowerShell, C++ Ability to adapt to a changing, fast-paced, team environment and multi-task assignments
  • Ability to approach problems with a sense of ownership, enthusiasm and innovation (out-of-the-box thinking)
  • Excellent judgment, decision-making skills, and the ability to work under continual deadline pressure when the situation is ambiguous
  • Track record of leading technical teams across stages of service development and delivery using agile methods
  • Demonstrate strong prioritization, time management and organizational skills
56

IdM / Identity & Access Management SME Resume Examples & Samples

  • Possess an active Secret clearance, or have a security clearance in process
  • Have demonstrable strong knowledge of US Government ICAM
  • Have experience working across multi-disciplinary Enterprise environments
  • Have experience with Active Directory Authentication, Enterprise Single Sign-on, Public Key Infrastructure, SAML, SSH, Radius, LDAP
  • Have experience with software development in multiple languages
  • Have web development experience
  • Have an interest in identity management and access management in the enterprise and evolving standards
57

Identity & Access Management Lead NC Resume Examples & Samples

  • Define, develop, and enforce the IAM control framework
  • Ensure adherence to ISO standards and active involvement in process enhancement and development
  • Documentation creation, update, and maintenance (including process documents, user guides and procedures)
  • Identification of control gaps and recommended remediation and improvements for User Transfer and Exit process
  • Assistance in user re-certifications, reconciliations, system profile review, third party applications validation and other IAM related reviews
  • Liaise with IT Security groups worldwide
58

Manager, IT Identity & Access Management Resume Examples & Samples

  • Manage the implementation of standards and process for access enforcement and access governance across the enterprise
  • Real world experience with IDM platforms and authentication technologies such as SAML, LDAP, SPML, OAuth, WS-Federation, Kerboros, NTLM, Sales Force Identity, and Azure Active Directory
  • BS or higher degree in Computer science, Information Security, or equivalent experience
  • 5+ years of professional experience in IT security, compliance and risk management, including privacy, data protection, security controls, etc
59

Manager, Identity & Access Management Resume Examples & Samples

  • Develops and applies policies impacting business methods and integrated security restrictions, weighing complex requirements form the business with industry best practices for security
  • Identifies, evaluates and develops opportunities for process improvement, training and awareness materials to educate users on security policies and practices
  • Implements department policies and procedures; reviews for relevance and monitors associates to ensure compliance
  • Ensures team members maintain necessary documentation for assigned systems, projects and tasks
  • Defines entitlement requirements for application security
  • Supports the implementation of applications
  • Analyzes application security to ensure standard or preferred methods are followed
  • Acts as intermediary and facilitator to help resolve ongoing and/or complex technical issues
  • Creates team goals that align with the Information Technology (IT) and IT Security strategies
  • Manages the daily workload and distributes assignments to associates based on varying skill sets and abilities
  • Supervises project work by team
  • Plans, assigns, monitors, reviews, evaluates and leads the work of associates
  • Coaches and mentors subordinates, identifies training needs and recommends development programs
  • Minimum of a Bachelor’s degree in Computer Science, MIS or related degree and seven (7) years of related experience including leadership or management experience or a combination of training, education and experience
  • Experience in operational task fulfillment, business process improvement and improving operational efficiency
  • Knowledge of Identity and Access Management (IAM) best practices
  • Experience in project management, enterprise implementation, strategic planning, business acumen and change management
  • Financial services industry experiences a plus
  • CISSP certification or ability to obtain within agreed upon timeframe
  • Provides feedback, empowerment and coaching to help others excel in current and future job responsibilities
  • Builds strategic partnerships within the organization to collaboratively execute business goals
  • Interacts with others in a way that promotes openness & trust and gives confidence in one’s intentions
60

Manager of Identity & Access Management Resume Examples & Samples

  • Bachelor’s degree in computer science, electrical engineering, and business administration or other relevant field, or equivalent experience
  • 5-7+ years' managing IT personnel, systems, and platforms
  • Familiar with ITSM operations, technologies, and processes
  • Extensive experience and expertise working in customer-service focused organizations
  • Proven experience in IT leadership, planning, organization, and development
  • 5+ years proven experience with implementing and managing an enterprise Identity and Access Management Solution/Suite
  • Master’s degree in computer science, electrical engineering, and business administration or other relevant field, or equivalent experience
  • 10+ years managing IT personnel, systems, and platforms
  • 5 + years’ experience in strategic planning, execution, policy development and ITIL or ITSM
  • 5 + years’ experience working in the Retail industry preferred
  • Minimum of 5+ years of Identity/Access Management technical experience (process design, implementation, support)
  • Experience working with 3rd party suppliers and/or managing outsourced resources
  • CISM or CISSP
  • Knowledge of IBM and Microsoft security tools/processes
  • Comfortable working across geographies and a variety of national and corporate cultures
  • Excellent organization and planning, proven management/supervisory, and communication skills
  • Exceptional service orientation
  • Superior analytical, evaluative, and problem-solving abilities and comfort with ambiguity
  • Ability to motivate in a team-oriented, collaborative environment
  • Ability to serve as a catalyst for change in the organization
  • Ability to set and manage priorities independently
  • Excellent written and oral communication and listening skills
  • Strong aptitude and proven ability for developing professionals and future leaders
  • Ability to articulate ideas to both technical and non-technical addressees
61

Identity & Access Management Specialist Resume Examples & Samples

  • Maintains a good understanding of IAM service offerings
  • Establishes and maintains good working relationships with all IAM customers
  • Captures customer objectives and develops support strategies that map to IAM service offerings
  • Measures and reports on value delivered to customers
  • Advocates for new/enhanced IAM services on behalf of customers
  • Contributes requirements to technology selection process
  • Serves as technical resource on select IAM initiatives
  • Adhering to all policies, rules, regulations, and procedures
  • Performing other duties or functions as requested by management
62

Identity & Access Management Expert Resume Examples & Samples

  • Ensure that business requirements & IT solutions meet GRC security requirements providing guidance and professional input for security architecture, process change, standardization and harmonization
  • Own and update GRC related process documentation (SoD matrix, role catalogue)
  • Develop GRC regulations (SoD management regulation)
  • Develop Cyber Risk & Compliance under the umbrella of Identity & Access Management Programme of MOL Group with a special focus on Segregation of Duty compliance covering business critical applications
  • Run enterprise wide Entitlement Review process (mini projects with ) for business critical applications (special focus on MOL Nyrt ’Office environment’, in 2017 run trial within ’industrial environment&#8217
  • Mediate between IT and the business functions in order to harmonise the IT solution with the business and security requirements ensuring that IT solution meets the GRC security requirements
  • Support Cyber compliance activities
  • University / college degree in Computer Science, Engineering or related field
  • Thorough understanding of security principles, practices and standards and how they translate into real world process solutions
  • Ability to communicate the essence of SoD & GRC concepts both at high level as well as on technical level
  • 5+ years of progressive experience in the information security industry covering identity & access management area
  • Ideal candidate have ERP & project management background
  • Information security industry recognized certifications from relevant certification bodies: Offensive Security, GIAC, EC-Council, ISECOM, (ISC)2, etc
  • Excellent English communication skills (written and oral)
  • Driving licence (desired)
63

Manager, Identity & Access Management Resume Examples & Samples

  • Manages the strategy and roadmap implementation for Identity and Access Management Platform Tools
  • Identify and implement process enhancements utilizing different tools and methodologies
  • Owner of the Application Onboarding Process for bringing applications in the IAM space for administration & access governance
  • Owner of the annual SOX Access Review certification
  • Responsible for the continuous improvement of the RBAC Program
  • Develop reporting metrics for team in order to monitor productivity and quality
  • Evaluate new and proposed IAM technologies
  • Liaison to business and technology partners and act as an IAM advocate for strategic projects
  • Accountable for meeting increasingly rigorous compliance requirements
  • Responsible for risk detection and remediation
  • Identifies, evaluates and develops opportunities for training and awareness materials to educate users on security policies and practices
  • Implements department procedures; reviews for relevance and monitors associates to ensure compliance
  • Minimum of a Bachelor’s degree in Computer Science, MIS or related degree and seven (7) years of relevant experience including leadership or management experience or a combination of training, education and experience
  • Strong understanding of current IAM technologies with an interest in emerging technologies
  • Solid understanding of Identity Lifecycle, SSO, authentication models, and security concepts
  • Experience in project management, enterprise implementation, strategic planning, business acumen, and change management
  • Strong Relationship & Collaboration skills
64

Identity & Access Management Consultants Resume Examples & Samples

  • You must have an IT consulting background with at least 1 year of working experience in project management and/or delivery
  • 2+ years of expertise of Identity and Access Management
  • Degree majoring in Computer Science, IT or Electrical Engineering – M.Sc./civ.ing. preferred, with excellent academic record
  • Experience from project management and/or work in team-oriented environments
  • Relevant consulting, communication and interpersonal skills
65

Intern, Identity Access Management Resume Examples & Samples

  • Exposure to a wide variety of IDM/IAM responsbilities
  • Areas you may be exposed to are CyberArk, ServiceNow development, SecureID, to name a few
  • Conduct research related to ESI and its clients
  • Perform data analysis and assist in data reporting as needed
  • Makes or assists in making oral or written presentations to management
  • Collaborate with other functional areas on various projects as needed
  • Full-time student in an accredited 4 year college, graduate program or Pharm. D. Program; Preference given to students with 3.0 GPA or above
  • Motivated self-starter; Excellent verbal and written communication skills; Attention to detail; Excellent analytical skills; Creative and resourceful; Strong business aptitude; Knowledge of the PBM or healthcare industry preferred; Dates of Internship are May 14th-Aug 3rd, 2017; Students must be available to work M-F 8am-5pm during this time frame
66

Identity & Access Management Specialist Resume Examples & Samples

  • You should have a Bachelor's degree in Computer Science, Engineering, or equivalent experience
  • You should be able to translate business needs into technical requirements that can be implemented on the identity and access management platform
  • You should be experienced with PowerShell or any other scripting language
  • You should have a methodical approach to problem solving and troubleshooting
  • You should have previous experience with Dell Quest ActiveRoles server is advantageous
  • You should have knowledge and experience with Microsoft Active Directory is desirable
67

Manager, Identity & Access Management Resume Examples & Samples

  • Manage the work direction and resource needs for Identity & Access Management (IAM). Determine, manage and track budget and staffing needs for these divisions. Define team goals and manage performance to meet those goals
  • Define, publish and maintain a strategic plan for assigned business areas. Manage activities relative to the day-to-day operations of access control and authentication; determine business and technical requirements for account requests and provisioning efforts. Serve as key respondent and facilitator for internal and external security events and incidents
  • Manage identity and access management support to business and technical teams in the design of standardized products and customized solutions
  • Stay abreast of industry and technology trends and best practices to advise leadership and direct teams on when to innovate and when to use traditional approaches. Maintain awareness of current and potential threats and risks for security related information protection
  • Develop and maintain a working relationship with 3rd Party service providers. Work with business unit executives and service providers to introduce required Cyber Security functionalities into the environment
68

Identity & Access Management Specialist Resume Examples & Samples

  • Function as a subject matter expert for successful design and implementation of IAM solutions in a complex environment
  • Act as a liaison to business, technology and project management partners and act as an IAM advocate for technology initiatives
  • Conduct maturity assessments and technology gap analysis for the IAM program
  • Look for ways to optimize IAM processes and recommend opportunities and solutions for improvement, automation and streamlined integration
  • Provide implementation leadership for IAM procedures and products
  • Evaluate new and proposed IAM systems and technologies
  • Ensure adherence to compliance regulations and policies
  • Collaborate with IT, Audit, and other oversight teams to understand and remedy audit findings
  • Analysis of requests for potential risk before action
  • Answer general inquiries regarding information security practice or security access
  • Make recommendations for implementing desired level of access controls
  • Assist in implementing action plans to address system access issues
  • Follow process and procedures to ensure compliance with policy
  • Develop reporting methods and ensure that metrics are captured and reported for the team, in order to monitor productivity and quality of service
  • Identify, define/approve and implement continuous process enhancements/improvements utilizing various tools and methodologies (i.e. creation of automation scripts)
  • Provide metrics in order to monitor productivity and quality of service
  • Recommend procedural changes to enhance the functionality of Identity Access Management Team
  • A passion for and deep understanding of technology risk and information security
  • Bachelor's or Master's degree in Information Systems, Computer Science, Engineering or equivalent work experience
  • Experience in risk management, including privacy, data protectin, security controls, etc
  • Demonstrated understanding in formulating strategies, alternatives and recommendations in information security management
  • Knowledge of industry regulatory environment and risk management practices
  • Demonstrated ability to think critically about risks and clearly articulate prevention and detection mechanisms to key partners
  • Analytical, problem solving and organizational skills with a focused attention to detail
  • Verbal and written communication skills, including the ability to effectively lead discussions and meetings
69

Deloitte, Identity & Access Management Resume Examples & Samples

  • Service management for our CyberArk managed service
  • Provide system security advice and reporting to senior management, system staff and users
  • Acting as an escalation point for the Security Analysts in event of a major security Incident
  • Run a continual service improvement program for the managed service
  • Serve as liaison with various customers (internal and external)
  • Produce and present Service line reports to clients
  • Manage business processes and solutions to ensure that Privileged Access Management (PAM) services perform according to defined processes, meet defined policies and comply with applicable information security requirements
  • Communicate to clients and partners aspects of both the product and the PAM service at the technical and functional level appropriate for the situation
  • Post-sales requirements gathering, analysis and documentation
  • Manage operational project scope, schedule, status and documentation
  • Identify opportunities to improve engagement profitability
  • Execute advanced services and supervise staff in delivering basic services
  • An understanding of the leading IAM product CyberArk
  • Experience of the Identity and Access Management industry
  • Understand complex business and information technology management processes
  • A degree in computer science or equivalent is preferred
  • Have excellent oral and written communication skills and be self-motivating
  • Demonstrable experience of security related incidents and work requests
  • Experience of working within a change control and incident management environment
  • Ability to hold at least BPSS national security vetting
  • A proven track record of delivery in a multi-disciplined environment
  • Advanced understanding of business processes, internal control risk management, IT controls and related standards
  • Experience of developing and enhancing information security processes and policies
  • Understanding of IT security fundamentals and systems including Multiple operating systems
  • Client / Server applications, Firewalls, IPS/IDS
  • Malware / Forensic product sets
  • Networking principles and Internet protocols
  • Patch management
  • To qualify for the role you should have one or more of the following certifications or extensive security operations experience
  • CISSP
  • CISM
70

Identity & Access Management Specialist Resume Examples & Samples

  • Configuring, customizing, setting up and deploying of Identity and Web Access suite, as well as performing solution integration activities
  • Participating in project activities including Requirements, Design, Testing, Documentation, Support, Troubleshooting, etc, as needed during the appropriate phases
  • On boarding of applications to the identity and access management platform
  • Implementing and managing access policies on user, group and computer objects
  • Updating existing access management and provisioning workflows
  • Defining and implementing access management workflows as needed to meet business requirements
  • Managing user, group and computer objects in Active Directory
  • Troubleshooting application authentication and authorisation errors
  • Troubleshooting and resolving access management and provisioning workflow errors
  • Ongoing monitoring and optimisation of access policies and workflows
  • Creating and updating access management system documentation
  • Supporting entitlement review processes and co-ordinating access reviews with the appropriate stakeholders
  • Reviewing application access requests and managing the approval process
  • Optimising log management and log reviews relating to IAM events
  • Bachelor's degree in Computer Science, Engineering, or equivalent experience
  • The candidate should be able to translate business needs into technical requirements that can be implemented on the identity and access management platform
  • Directories (Active Directory, LDAP & X500)
  • Web Access Management (Quest Active Roles Server, SiteMinder, Oracle Access Manager, etc.)
  • Single Sign-on and Federation (SAML 2.0, ADFS, OAuth 2.0, Kerberos, etc.)
  • Privileged Access Management
  • Two-factor Authentication (especially One-Time Password solutions and Certificates on Smart Cards)
  • Adaptive & Device Authentication
  • Identity Management (automated provisioning, de-provisioning, certification, etc.)
  • Public and Private Cloud IAM
  • Windows Security
  • Unix and Linux Security (especially privileged command management)
  • Public Key Infrastructure (PKI)
  • Experience with Pow