What you’ll do:
- Lead the management of user identities and access privileges within the organization's systems and applications.
- Drive the implementation and maintenance of the IAM framework, policies, and procedures.
- Oversee user onboarding, offboarding, and access revocation processes.
- Collaborate with various teams to gather access requirements and define access control rules.
- Design and manage user access roles and permissions based on job functions and organizational policies.
- Conduct periodic access reviews and audits to ensure compliance with security standards.
- Lead the monitoring of user access activities and investigate security incidents or access violations.
- Administer and support advanced IAM tools and technologies, such as identity governance and privileged access management.
- Collaborate with IT teams to integrate IAM solutions with existing systems and applications.
- Demonstrate a strong understanding of comprehensive authentication methods and related protocols.
- Develop user access matrix from scratch, considering the organization's structure and access needs.
- Implement segregation of duty controls to ensure compliance and reduce security risks.
- Understand the technical architecture required to integrate with IAM System, Single Sign-On (SSO) system, Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Key Management System (KMS), and sophisticated access management systems.
What you’ll need:
- 8+ years of work experience in Identity Access Management roles, preferably in banking or payment companies.
- Strong understanding of information security fundamentals.
- Familiarity with network security and information systems security principles.
- In-depth understanding of identity and access management concepts, principles, and frameworks.
- Extensive experience in administering IAM tools and technologies.
- Analytical mindset and strong problem-solving skills.
- Strong attention to detail and ability to handle sensitive information securely.
- Proven track record in designing and implementing robust cryptography key management systems.
- Successful development and implementation of comprehensive IAM governance frameworks.
- Experience in conducting access reviews, audits, and delivering IAM training programs.
- Demonstrated expertise in comprehensive authentication methods and related protocols.
- Proven ability to develop user access matrices from scratch.
- Experience implementing segregation of duty controls.
- In-depth understanding of the technical architecture needed for integration with IAM System, SSO, MFA, PAM, KMS, and sophisticated access management systems.
It would be great if you have:
- Security, audit, and compliance-related certifications (e.g., CISSP, CISA, CRISC).
- Expertise in multi-factor authentication methods and implementation.
- Deep familiarity with identity lifecycle management and role-based access control concepts.
- Experience with industry regulations and compliance standards relevant to the organization.
- Strong project management skills to lead IAM initiatives and coordinate with stakeholders.