The IAM Team Lead will play a pivotal role in ensuring that appropriate access to company resources is granted securely, efficiently, and in accordance with regulatory standards. This position is ideal for a leader with a strong technical background in IAM and a track record of supervising and mentoring teams to success.
The ideal candidate is technical and possesses at least seven years’ experience in technology and security administration across large heterogeneous networks, including third-party entities. Additionally, as a senior member of the team, the role requires leadership skills to coach and mentor less experienced staffers. The IAM Team Lead is expected to manage the team and execute the security strategy as directed by senior management. Consequently, the IAM Team Lead must identify and effectively communicate an actionable workload for team members that adheres to business initiatives – balancing business risk and IDAM security best practices. The IAM Team Lead is a subject matter expert for colleagues and is expected to deliver on line-of-business expectations.
Responsibilities:
- Lead and supervise the IAM team, including external partners when engaged, ensuring the delivery of effective identity and access management solutions across the organization.
- Direct employees to implement IDAM solutions that align with access policies and processes.
- Develop, implement, and maintain IAM strategies, policies, and procedures to support secure access to systems, data, and resources. Ensure employees maintain up-to-date configuration documentation for systems and processes. Rigorously maintain security systems and administer security configurations that reduce risk to enterprise systems and accounts.
- Working with the Security Compliance team, oversee routine access reviews that align with business requirements for access certification and re-certification.
- Attend related change and project management meetings and engage with other participants to deliver IAM solutions to production.
- Oversee user provisioning, role-based access control (RBAC), single sign-on (SSO), and multi-factor authentication (MFA) initiatives, privileged accounts, automation and behavior analytic systems.
- Ensure IAM services align with security standards, compliance requirements, and industry best practices.
- Collaborate with internal stakeholders, including IT, HR, and security teams, to ensure seamless IAM integration across systems and processes.
- Manage the lifecycle of user accounts, roles, and permissions within systems and applications.
- Contribute to the strategic vision for rigorous and scalable IDAM controls with key performance indicators. Support business metrics associated with IDAM initiatives
- Liaison with auditors, both internal and external, to maintain and implement access controls aligned with compliance and privacy laws. Perform regular activities and reviews of access controls, identifying and mitigating potential security risks.
- Act as the escalation point for complex access-related issues and incidents, providing technical guidance and problem resolution. Act as a primary point of contact for IAM disaster recovery and business continuity.
- Evaluate, recommend, and implement new IAM tools, technologies, and solutions to improve efficiency and security.
- Stay up-to-date with the latest IAM trends, threats, and regulatory changes, and apply this knowledge to improve the organization's security posture.
- Lead and mentor a team of IAM analysts, fostering a culture of continuous learning and professional growth.
Requirements:
- At least 5 years’ experience in cybersecurity, with at least 3 years in IDAM and 2 years in a leadership role.
- Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field.
- Certifications such as MS IAAA, CIGE, CIAM, CIMO, CAMS, CISSP, CISM, or similar are highly desirable.
- Highly technical and analytical, with a proven deep background in IDAM technology design, implementation and delivery.
- Hands-on experience with IAM tools (e.g., SailPoint, Okta, Microsoft Entra ID, MS AD, Ping Identity) both on-premises and in the cloud.
- Experience and understanding of various regulatory requirements and laws such as, but not limited to, Payment Card Industry (PCI), NIST 800-63, ISO27001, OSFI B13 and Integrity & Security Guideline. Additionally, experience in one is advantageous: ISO 17799 or ITIL.
- Extensive knowledge of SSO, MFA, Active Directory (AD), public key infrastructure (PKI), privileged accounts and application integrations related to Identity Management.
- Experience administering IDAM systems, access controls, security and risk management, as well as a security governance framework at scale.
- Track record acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.