About The Position

We’re unique. You should be, too. We’re changing lives every day. For both our patients and our team members. Are you innovative and entrepreneurial minded? Is your work ethic and ambition off the charts? Do you inspire others with your kindness and joy? We’re different than most primary care providers. We’re rapidly expanding and we need great people to join our team. The Manager, Identity and Access Management, in partnership with the Chief Information Security Officer (CISO), is responsible for the planning, building, delivery and support of the IAM program, including the use of technology-based tools or methodologies, that provide a strong IAM program balancing access with compliance, confidentiality, and business requirements. The Manager will lead and grow a team of experienced security professionals providing direction and guidance to the development, specifications and communications of the IAM application and architecture. The Manager will provide in-depth technical consultation to the business units and IT management and assist in developing plans and direction for the integration of information security requirements.

Requirements

  • Strong oral and written communication skills
  • Ability to lead and manage a team independently
  • Can translate security-related matters into business terms that are clear and understandable to non-technical colleagues
  • Can deliver under tight deadlines
  • Thinks outside the box when designing systems and solutions
  • Able to navigate a demanding and high-pressure environment
  • Can think strategically and incorporate business needs into technical roadmaps
  • Strong problem-solving and trouble-shooting skills
  • Advanced skills in Microsoft Office Suite products including Word, Excel, PowerPoint and Outlook, and other word-processing, spreadsheet, database, e-mail, presentation, and project management software
  • Ability to travel locally, regionally and nationwide up to 15% of the time
  • Spoken and written fluency in English
  • Bachelor’s degree in computer science, information systems, cybersecurity, or a related field.
  • Familiarity in one or more of the following areas: Identity management, PAM, SSO and MFA
  • 5 years of experience in technology implementation, including 3 years technical architecture experience integrating identity management, access management and access governance software into infrastructure and applications

Nice To Haves

  • A security-related certification, such as CISSP, SECURITY+ OR Master's Degree in related field preferred

Responsibilities

  • Provides subject-matter-expertise on all IAM disciplines including identity governance and administration, (IGA), Access Management, (SSO, MFA), privileged access management and identity verification, (ID Proofing, etc.)
  • Provides management status reporting to include accomplishments, plans for upcoming activities and overall completion status on a regular basis ensuring all milestones and deliverables are achieved within communicated deadlines
  • Owns the lifecycle management of all IAM technologies and its associated infrastructure
  • Aligns IAM processes across the organization, and develops and documents standards for organizational use
  • Leads an IAM selection process, evaluates existing and emerging technologies and tools in the selection of an IAM service offering for the business units
  • Understands business and information technology management processes and demonstrates advanced understanding of business processes, identity-first security, internal control risk management, IT controls and related standards
  • Fosters an understanding of the need for and application of the IAM systems, and facilitates decision making with the business users
  • Builds and nurtures positive working relationships with business partners
  • Identifies opportunities to improve engagement with the business partners
  • Stays up-to-date on current IAM threats and industry solutions
  • Identifies current and emerging technology issues including security trends, vulnerabilities and threats
  • Conducts proactive research to analyze security weaknesses and recommends appropriate strategies
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service