Manager, Cybersecurity Engineering – Identity and Access Management
Job Type: Full Time / Permanent
OVERVIEW: The Manager, Cybersecurity Engineering – Identity and Access Management will drive strategic support, engineering, and operations of critical cybersecurity technologies covering identity governance and administration, privileged access management, authentication, access control, and federation to assure the security posture of the organization’s networks and endpoint systems, all while acting as a security liaison to business and technology stakeholders. Inclusive of the core technology engineering work will be facilitating the audit, reporting, monitoring, and analytics involved with the overarching identity and access management capabilities. This role requires the ability to translate the technology risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The role coordinates the technology organization’s technical activities to consult and assure the security posture of the organization via identity and access management infrastructure while providing regular status and service-level reports to management. An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. Expertise in leading project teams and developing and managing projects is essential for success in this role. As well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting. Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position. The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the position. Technology personnel responsible for managing technical security infrastructure may report directly to the role or may report to other areas of Technology (for example, networking, servers or database management), with their security-related activities coordinated by the role.
ROLE RESPONSIBILITIES: Strategy and People Leadership: Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements. Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals and objectives. Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members. Security Liaison: Assist resource owners and technology staff in understanding and responding to security audit failures reported by auditors. Provide security communication and awareness for audiences, which may range from senior leaders to field staff. Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums. Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support for legal and regulatory compliance efforts, including audit support. Security Engineering: Consult with technology and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software. Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with technology management to align existing technical installed base and skills with future architectural requirements. Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory, and audit requirements. Operational Support: Coordinate, measure and report on the technical aspects of security management. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Support operational components of incident management, including detection, response and reporting. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other technology projects. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of networks and endpoint systems, and manage the remediation of identified risks.
QUALIFICATIONS: Bachelor’s Degree or equivalent experience in management information systems, computer science, information security/cybersecurity. 3-5 years of experience in identity and access management, security threat detection and risk management, technology controls, security frameworks, DevSecOps, staff mentorship & development CISM (preferred) CISSP (preferred). Operating Systems such as Windows and Linux Identity management familiarity across: single sign-on (SSO), data management, identity federation, enterprise directory architecture and design, including directory schema, directory services, namespace and replication topology experience, resource provisioning, ITIL, and process integration. Identity and access governance includes role-based access control, access request and certification, user life cycle management processes, and organizational change management. Understanding of web security standards, architecture, web security best practices and application security best practices Experience with administrating authentication technologies, such as Microsoft Active Directory/Windows authentication, OpenLDAP, Shibboleth, SimpleSAMLphp, Kerberos, OpenID Connect, OAuth, and federated identity management Cloud security. Expert understanding of IAM concepts, including federation, authentication, authorization, access controls, access control attacks, identity and access provisioning life cycle. Strong understanding and implementation of Technology best practices, policies and procedures. Assessing risk and business impact of technical changes to our environment. Proactively identifying and evaluating problems, determine root cause. Public and private cloud engineering and strategic view of cost-effective hosting. Translating a service interruption into an impact analysis and execute a corrective plan of action Contract negotiations, vendor management, project management and financial management. Effective leadership and management during crisis. Ability to effectively plan, organize, schedule and coordinate among competing priorities across multiple entities. Ability to effectively communicate complex technical issues. Good interpersonal skills with staff, end-users, peers, management, and vendors. A strong understanding of the business impact of security tools, technologies and policies. In-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies. Experience working with legal, audit and compliance staff. Experience developing and maintaining policies, procedures, standards and guidelines. An understanding of operating system internals and network protocols. Familiarity with the principles of cryptography and cryptanalysis.