Apply agile delivery methodologies, including Kanban and Scrum, to manage work intake, improve execution efficiency, and deliver IAM initiatives at scale. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, or protected veteran status, or any other characteristic protected by law. Qualified applicants with criminal histories will be considered for employment in a manner consistent with all federal, state and local ordinances. Applies knowledge of business principles and technology practices to achieve successful outcomes in crossfunctional activities. Direct the alignment of systems to fulfil business needs. Spearhead the creation of essential documentation in support of systems. Convey and engage effectively through excellent oral and written interpersonal and communication skills. Strong experience of Microsoft Office products such as Word and Excel. Oversee the understanding and improvement of business processes. Ensure provision of superior customer service. Champion the application of systems development concepts. Demonstrate advanced working knowledge of all facets of systems development lifecycle and IT operations. Effectively maneuver multiple priorities and ensure deadlines are met. Display expert configuration knowledge of applicable applications, modules, and platforms. Deep expertise in configuration and integration points of relevant applications/modules/platforms. Solid understanding and design experience with Service Oriented Architecture (SOA). Ability to couple technology expertise with deep understanding of business requirements to design and deploy highly Three or more years of experience in cybersecurity with hands on focus in Identity and Access Management. Demonstrated ability to collaborate with cross functional partners and provide technical guidance to peers while contributing to shared security and delivery goals. Working knowledge of identity and access concepts including authentication, access governance, compliance requirements, Role Based Access Control, and lifecycle management of non-human identities. Relevant certifications such as CISSP, CISM, or IAM focused credentials, or equivalent practical experience in cybersecurity or information risk management.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees