Responsible for the Identity Access Management and Lifecycle management for 2.6+ million associates globally. Develops strategies for IAM to allow for growth and expansion (for example, domestic and international, mergers and acquisitions) by partnering with cross functional stakeholders (for example, peer technologists, key customers, key suppliers); looking across the enterprise to identify solutions; engaging individuals or groups in developing and implementing synergistic solutions; engaging stakeholders to facilitate and expedite decision-making; developing and implementing safeguards to ensure business continuity while improving security posture; and ensuring implemented solutions are fully leveraged.
Responsible for establishing and meeting customer SLAs, operational KPIs, and program delivery commitments.
Develops cybersecurity strategies and rolling roadmaps to ensure IAM business continuity by creating migration paths away from aging or end-of-life technologies; communicating IAM strategies to leadership to gain buy-in; developing tactical, operational, and contingency plans to support strategic direction; leading and influencing teams in the implementation of the IAM cybersecurity strategy; identifying and implementing corrective adjustments as needed; and measuring progress and reporting it to leadership.
Responsible for mutli-million dollar budget with multiple 3rd party vendors.
Responsible for development, maintenance and support for multiple in-house and 3rd party solutions.
Leads teams of both direct and indirect reports. Develops and implements strategies to attract and maintain a highly skilled and engaged workforce by diagnosing capability gaps; recruiting, selecting, and developing talent; supporting mentorship, workforce development, and succession planning; and leveraging the capabilities of new and existing talent.
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.As permitted by applicable law, provide evidence of full vaccination as defined by CDC guidelines OR secure approval of medical or religious accommodation for the vaccination mandate., Bachelor’s degree in Information Technology, Computer Science, or related field and 10 years' experience in information technology or related field within the last 15 years OR 12 years' experience in information technology or related field within the last 15 years.
Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.At least five cybersecurity technologies: security incident and event management (SIEM), intrusion defense system (IDS), intrusion prevention systems (IPS), firewall, antivirus, web proxies, authentication, cryptography, Unix/Windows server administration, network administration, At least one of the following scripting/programming languages: Python, Perl, Powershell, VB Script, Ruby, PHP, Bash, C, C++, C#, or .Net, Consulting on, designing, or implementing technical solutions, Creating and presenting security technical strategies and technical solution recommendations, GIAC Security Expert (GSE) certification, Certified Intrusion analyst (GCIAs), GIAC Reverse Engineering Malware (GREM), GIAC Penetration Testing Certification (GPEN), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Cisco Certified Internework Expert (CCIE), Offensive Security Certified Professional (OSCP), and/or Security Cisco Certified Networking Professional – Security (CCNP-Security), Leading cross-functional teams in information technology or related field, Presented at a cybersecurity conference (for example, Security B-sides, InfraGard, ISSA, ISACA)