The Information Security Advisor role focuses on supporting Periodic Access Certifications, ensuring the quality and compliance of identities, applications, and entitlements, while providing strategic support for IAM processes. Responsible for the delivery of strategic network security, access control, and secure transaction/messaging solutions. Ensures security solutions involving the use of technologies are well-conceived, designed, and implemented in compliance with enterprise standards. How you will make an impact: Provides first-level engineering design functions. Ensure that identity, application, and entitlement data utilized in periodic system access reviews meet our internal controls for completeness and accuracy, adhering to policy requirements. Lead internal control transformation efforts and offer valuable feedback for process alignment and improvement. Leads or plans implementations for access management and network security technologies. Develops testing plans to ensure quality of implementation. Leads the investigation and reporting of data security events and incidents. Support the Periodic System Access Certifications in compliance with internal policy requirements and external standards like SOX, SOC1, SOC2, Hi-Trust, PCI-DSS, and statutory audits. Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards, and technologies. Advocate for best practices in Centralized Access Provisioning/Termination, Modern Authentication, Role-Based Access Control, and Periodic Access Certifications, enhancing IAM posture and customer delivery. Represents major upgrades and business system replacements in change control. Partner with internal and external IAM stakeholders to analyze and improve Identity Management System data points. Maintain standard templates for audit process consistency and address data gaps with IT/business teams. Oversees Enterprise mix of vendor services; may act as a key contact for setting vendor strategy. Designs & engineers repetitive technical solutions based on business requirements and defined technology standards. Monitor progress on projects and KPIs, providing timely reports to leadership and facilitating effective escalations with stakeholders. Leads level 1 & 2 incident recoveries and may organize the efforts of other analysts as part of incident recovery; Leads root cause analysis efforts. Regularly participate in Agile ceremonies to facilitate project alignments. Provide on-the-job training to peers for new processes or tools. Articulate a clear vision for supporting organizational security and compliance, inspiring high standards and continuous improvement across the team.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees