Posted on: 08/12/2025
Job Description :
Role & Responsibilities :
- Lead the implementation and development process for the Identify and access Management (IAM) program with a security focus.
- Work with vendors and business partners to develop, implement and manage the IAM program.
- Lead program design and review working directly with business lines on the integration requirements including provisioning, de-provision, and identity lifecycle into the IAM platforms.
- Develop strategy roadmaps for the IAM systems and the IAM program, develop enterprise-wide standards for IAM.
- Implement or coordinate remediation required by policies, standards, reviews, and audits, documenting exceptions as necessary.
- Define the user access security model for all systems and platforms.
- Enforcing least-privilege model.
- Provide subject matter expertise in multiple domain focus areas including but not limited to : Privileged Access Management and Secrets Management tooling such as CyberArk, Delinea, HashiCorp.
- Operation and maintenance of the Privileged Access Management and Secrets Management platforms to support various business use cases, providing in-depth technical consultation to business application development team to ensure development of efficient application systems.
- Establish PAM Security Strategy including provisioning, password management and access policies, SSH key management, API key management and reporting.
- PAM implementation and operationalization.
- Support the operation of the PAM platform to ensure secure and efficient operation and usage for all lines of business.
- Lead IAM engineering strategy and execution, set the direction for engineering efforts, drive technology selection (Including bus vs build decision) and act as the functional technical leader during implementation.
- Design, configure, and maintain PAM solutions for Linux and Windows tools.
- Integrate PAM solution with various technologies.
- Provide security consultation on internal projects focusing on business needs, security's role in change management, and how data is transmitted internally and externally.
- Establish CIEM, ITDR, IGA strategy, implementation and operationalization.
- Evaluate and monitor project efforts, timelines, and task management.
Educational Requirements :
- Bachelor's degree in computer science, Information Systems, or equivalent combination of education and experience.
- Relevant Security Certifications.
Experience Required : A minimum of 10 years of experience.
Qualification , Knowledge & Skills Required :
- Experience designing, implementing, and managing complex IAM Solutions.
- 10+ years Information Security experience with at least 3 of those years focused on Privileged Access Management.
- Strong understanding on Identity and privileged constructs within Cloud environments.
- An understanding and demonstrated use of DevOps tools (Bit bucket, Gitlab, Github, Jenkins, Automated deployment tools) with CI/CD capabilities.
- Experience in designing and implementing PAM solutions such as (BeyondTrust, CyberArk, Delinea) for enterprise organizations.
- Experience with password safe tools such as BeyondTrust Password safe and Powerbroker for both Windows and Linux environments.
Did you find something suspicious?
Posted by
Posted in
CyberSecurity
Functional Area
IT Security
Job Code
1586037
Interview Questions for you
View All