Information Security Advisor - Identity Access Management

Elevance HealthCincinnati, OH
4dHybrid

About The Position

The Information Security Advisor role focuses on supporting Periodic Access Certifications, ensuring the quality and compliance of identities, applications, and entitlements, while providing strategic support for IAM processes. Responsible for the delivery of strategic network security, access control, and secure transaction/messaging solutions. Ensures security solutions involving the use of technologies are well-conceived, designed, and implemented in compliance with enterprise standards. How you will make an impact: Provides first-level engineering design functions. Ensure that identity, application, and entitlement data utilized in periodic system access reviews meet our internal controls for completeness and accuracy, adhering to policy requirements. Lead internal control transformation efforts and offer valuable feedback for process alignment and improvement. Leads or plans implementations for access management and network security technologies. Develops testing plans to ensure quality of implementation. Leads the investigation and reporting of data security events and incidents. Support the Periodic System Access Certifications in compliance with internal policy requirements and external standards like SOX, SOC1, SOC2, Hi-Trust, PCI-DSS, and statutory audits. Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards, and technologies. Advocate for best practices in Centralized Access Provisioning/Termination, Modern Authentication, Role-Based Access Control, and Periodic Access Certifications, enhancing IAM posture and customer delivery. Represents major upgrades and business system replacements in change control. Partner with internal and external IAM stakeholders to analyze and improve Identity Management System data points. Maintain standard templates for audit process consistency and address data gaps with IT/business teams. Oversees Enterprise mix of vendor services; may act as a key contact for setting vendor strategy. Designs & engineers repetitive technical solutions based on business requirements and defined technology standards. Monitor progress on projects and KPIs, providing timely reports to leadership and facilitating effective escalations with stakeholders. Leads level 1 & 2 incident recoveries and may organize the efforts of other analysts as part of incident recovery; Leads root cause analysis efforts. Regularly participate in Agile ceremonies to facilitate project alignments. Provide on-the-job training to peers for new processes or tools. Articulate a clear vision for supporting organizational security and compliance, inspiring high standards and continuous improvement across the team.

Requirements

  • Requires BS/BA degree in Information Technology or related field of study and a minimum of 5 years experience in systems support, system administration, system engineering, system security, access management, network security, network communications, computer networking, telecommunications, systems development and management, hardware, software, and/or data; or any combination of education and experience, which would provide an equivalent background.
  • Requires experience in planning and designing highly complex systems.
  • Must be capable of providing top-tier support for 4 or more of the information security technology common body of knowledge skill sets: Access Control, Application Security, Business Continuity & Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal / Regulations, Compliance & Investigations, Operations Security, Physical (Environmental) Security, Security Architecture & Design, Telecommunications & Network Security

Nice To Haves

  • Proven experience with system access certifications, privileged access controls, and audit support is highly preferred.
  • Proficiency with IAM tools and systems, including SailPoint, ServiceNow, Jira, DataGrip/Toad, Tableau, MS Office Suite, and other relevant tools for data management.
  • Strong communication and collaboration skills, able to engage effectively with both technical and non-technical teams.
  • Detail-oriented with strong problem-solving abilities, capable of managing complex priorities and driving results in a dynamic environment.

Responsibilities

  • Provides first-level engineering design functions.
  • Ensure that identity, application, and entitlement data utilized in periodic system access reviews meet our internal controls for completeness and accuracy, adhering to policy requirements.
  • Lead internal control transformation efforts and offer valuable feedback for process alignment and improvement.
  • Leads or plans implementations for access management and network security technologies.
  • Develops testing plans to ensure quality of implementation.
  • Leads the investigation and reporting of data security events and incidents.
  • Support the Periodic System Access Certifications in compliance with internal policy requirements and external standards like SOX, SOC1, SOC2, Hi-Trust, PCI-DSS, and statutory audits.
  • Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards, and technologies.
  • Advocate for best practices in Centralized Access Provisioning/Termination, Modern Authentication, Role-Based Access Control, and Periodic Access Certifications, enhancing IAM posture and customer delivery.
  • Represents major upgrades and business system replacements in change control.
  • Partner with internal and external IAM stakeholders to analyze and improve Identity Management System data points.
  • Maintain standard templates for audit process consistency and address data gaps with IT/business teams.
  • Oversees Enterprise mix of vendor services; may act as a key contact for setting vendor strategy.
  • Designs & engineers repetitive technical solutions based on business requirements and defined technology standards.
  • Monitor progress on projects and KPIs, providing timely reports to leadership and facilitating effective escalations with stakeholders.
  • Leads level 1 & 2 incident recoveries and may organize the efforts of other analysts as part of incident recovery; Leads root cause analysis efforts.
  • Regularly participate in Agile ceremonies to facilitate project alignments.
  • Provide on-the-job training to peers for new processes or tools.
  • Articulate a clear vision for supporting organizational security and compliance, inspiring high standards and continuous improvement across the team.

Benefits

  • We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service