Job Title: Identity and Access Management Engineer
Location: Rockville Maryland
Duration: 12 Months
Job Profile Summary:
Under general supervision and/or direction the incumbent is responsible for the planning building delivery and support of the Identity and Access Management (IAM) program. This position will provide direction and guidance to the development specifications and communications of the IAM application and architecture and provide in-depth technical consultation to the College units departments and OIT management and assist in developing plans and direction for the integration of information security requirements.
Essential Functions:
- Identity and Access Management:
- Design implement and manage identity services solutions including authentication authorization and identity lifecycle management to provide a strong IAM program.
- Ensure the integrity and security of the Colleges identity data.
- Identify and evaluate complex business and technology risks internal controls that mitigate risks and related opportunities for internal control improvement.
- Develop and maintain Role-Based Access control (RBAC) Attribute-Based Access control (ABAC) and least-privilege models to reduce access risk.
- Integrate systems with Single Sign-on (SSO) and Multi-Factor Authentication (MFA) using SSO and MFA technologies.
- Implement and manage Privileged Account Management (PAM) controls including credential vaulting and session monitoring.
- Monitor investigate and respond to IAM-related incidents abnormal login behavior and security alerts.
- Maintain detailed documentation of IAM architecture configurations integrations and process flows.
- Ensure IAM alignment with regulatory audit and compliance requirements across the organization.
- Identify the broader impact of current decisions related to user access data access and information security
- Strategic Leadership
- Envisions organizational outcomes and facilitates alignment with them.
- Aligns IAM processes across the organization and develops and documents standards for organizational use.
- Understands business and information technology management processes and demonstrates advanced understanding of business processes internal control risk management IT controls and related standards.
- Lead the planning development and execution of IAM projects ensuring they are completed on time and within budget and aligned with IAM best practices.
- Collaborate with security architecture application owners and infrastructure teams to design scalable and secure IAM solutions.
- Define and track IAM metrics KPIs and maturity indicators to support continuous improvement.
- Advise senior management on IAM-related risks and security posture.
- Awareness Training and Other Communications
- Fosters an understanding of the need for and application of the IAM system and facilitates decision making with the end users.
- Builds and nurtures positive working relationships with College units and departments.
- Identifies opportunities to improve engagement with the College units and departments.
- Perform other duties as assigned.
Required Knowledge Skills and Abilities
- Broad knowledge of computer security issues requirements solutions and trends especially in the higher education environment.
- Knowledge of applicable business processes and operations of customer organizations.
- Knowledge of new and emerging information technology (IT) and information security technologies.
- Knowledge of risk management processes including steps and methods for assessing risk.
- Knowledge of system lifecycle management principles including software security and usability.
- Knowledge of critical information technology (IT) procurement requirements.
- Strong interpersonal and communication skills plus the ability to achieve goals through influence collaboration and cooperation.
- Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse.
- Ability to think critically and analyze information and situations present findings and make recommendations; ability to turn data into information and present it in a meaningful manner.
- Ability to analyze issues and solve sensitive and complex problems under pressure. Skilled in interpersonal communication and conflict resolution.
- Excellent written and verbal skills.
- Excellent presentation skills and experience in public speaking or training.
Required Education and Experience
- Bachelors degree from an accredited college or university with course work in computer science information systems cybersecurity or a related field and/or any combination of
- education training and experience that provides the required knowledge and expertise to perform the essential functions of the position.
- Four years of progressively responsible experience in the management of identity and access management or similar experience managing complex applications projects or systems.
- Proven experience in designing and implementing IAM solutions in a complex organization.
- Experience dealing with complex risk-related issues with managing vendor relationships information security or regulatory compliance programs and audits.
Competencies:
- Decision Making
- Decisions may affect a work unit or area within a department. May contribute to business and operational decisions that affect the department.
- Problem Solving
- Problems are varied requiring analysis or interpretation of the situation. Problems are solved using knowledge and skills and general precedents and practices.
- Independence of Action
- Results are defined and existing practices are used as guidelines to determine specific work methods and carries out work activities independently; supervisor/manager is available to resolve problems.
- Communication and Collaboration
- Contacts and information are primarily within the jobs working group department and/or campus.
- Contacts and information sharing are external to the jobs department but internal to the campus/campuses (i.e. other departments/campuses central administration/services such as Human Resources Payroll Finance Facilities Mail Services Student Services etc.)
- Contacts and information sharing are internal/external to the College for the primary reason of scheduling coordinating services collaborating etc.
Required Industry Certifications
- At least one relevant certification e.g. Certified Identity and Access Manager (CIAM) Certified Identity Management Professional (CIMP) Certified Identity Governance Expert (CIGE) Certified Information Systems Security Professional (CISSP)
Job Title: Identity and Access Management Engineer Location: Rockville Maryland Duration: 12 Months Job Profile Summary: Under general supervision and/or direction the incumbent is responsible for the planning building delivery and support of the Identity and Access Management (IAM) program. T...
Job Title: Identity and Access Management Engineer
Location: Rockville Maryland
Duration: 12 Months
Job Profile Summary:
Under general supervision and/or direction the incumbent is responsible for the planning building delivery and support of the Identity and Access Management (IAM) program. This position will provide direction and guidance to the development specifications and communications of the IAM application and architecture and provide in-depth technical consultation to the College units departments and OIT management and assist in developing plans and direction for the integration of information security requirements.
Essential Functions:
- Identity and Access Management:
- Design implement and manage identity services solutions including authentication authorization and identity lifecycle management to provide a strong IAM program.
- Ensure the integrity and security of the Colleges identity data.
- Identify and evaluate complex business and technology risks internal controls that mitigate risks and related opportunities for internal control improvement.
- Develop and maintain Role-Based Access control (RBAC) Attribute-Based Access control (ABAC) and least-privilege models to reduce access risk.
- Integrate systems with Single Sign-on (SSO) and Multi-Factor Authentication (MFA) using SSO and MFA technologies.
- Implement and manage Privileged Account Management (PAM) controls including credential vaulting and session monitoring.
- Monitor investigate and respond to IAM-related incidents abnormal login behavior and security alerts.
- Maintain detailed documentation of IAM architecture configurations integrations and process flows.
- Ensure IAM alignment with regulatory audit and compliance requirements across the organization.
- Identify the broader impact of current decisions related to user access data access and information security
- Strategic Leadership
- Envisions organizational outcomes and facilitates alignment with them.
- Aligns IAM processes across the organization and develops and documents standards for organizational use.
- Understands business and information technology management processes and demonstrates advanced understanding of business processes internal control risk management IT controls and related standards.
- Lead the planning development and execution of IAM projects ensuring they are completed on time and within budget and aligned with IAM best practices.
- Collaborate with security architecture application owners and infrastructure teams to design scalable and secure IAM solutions.
- Define and track IAM metrics KPIs and maturity indicators to support continuous improvement.
- Advise senior management on IAM-related risks and security posture.
- Awareness Training and Other Communications
- Fosters an understanding of the need for and application of the IAM system and facilitates decision making with the end users.
- Builds and nurtures positive working relationships with College units and departments.
- Identifies opportunities to improve engagement with the College units and departments.
- Perform other duties as assigned.
Required Knowledge Skills and Abilities
- Broad knowledge of computer security issues requirements solutions and trends especially in the higher education environment.
- Knowledge of applicable business processes and operations of customer organizations.
- Knowledge of new and emerging information technology (IT) and information security technologies.
- Knowledge of risk management processes including steps and methods for assessing risk.
- Knowledge of system lifecycle management principles including software security and usability.
- Knowledge of critical information technology (IT) procurement requirements.
- Strong interpersonal and communication skills plus the ability to achieve goals through influence collaboration and cooperation.
- Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse.
- Ability to think critically and analyze information and situations present findings and make recommendations; ability to turn data into information and present it in a meaningful manner.
- Ability to analyze issues and solve sensitive and complex problems under pressure. Skilled in interpersonal communication and conflict resolution.
- Excellent written and verbal skills.
- Excellent presentation skills and experience in public speaking or training.
Required Education and Experience
- Bachelors degree from an accredited college or university with course work in computer science information systems cybersecurity or a related field and/or any combination of
- education training and experience that provides the required knowledge and expertise to perform the essential functions of the position.
- Four years of progressively responsible experience in the management of identity and access management or similar experience managing complex applications projects or systems.
- Proven experience in designing and implementing IAM solutions in a complex organization.
- Experience dealing with complex risk-related issues with managing vendor relationships information security or regulatory compliance programs and audits.
Competencies:
- Decision Making
- Decisions may affect a work unit or area within a department. May contribute to business and operational decisions that affect the department.
- Problem Solving
- Problems are varied requiring analysis or interpretation of the situation. Problems are solved using knowledge and skills and general precedents and practices.
- Independence of Action
- Results are defined and existing practices are used as guidelines to determine specific work methods and carries out work activities independently; supervisor/manager is available to resolve problems.
- Communication and Collaboration
- Contacts and information are primarily within the jobs working group department and/or campus.
- Contacts and information sharing are external to the jobs department but internal to the campus/campuses (i.e. other departments/campuses central administration/services such as Human Resources Payroll Finance Facilities Mail Services Student Services etc.)
- Contacts and information sharing are internal/external to the College for the primary reason of scheduling coordinating services collaborating etc.
Required Industry Certifications
- At least one relevant certification e.g. Certified Identity and Access Manager (CIAM) Certified Identity Management Professional (CIMP) Certified Identity Governance Expert (CIGE) Certified Information Systems Security Professional (CISSP)
View more
View less